6th International Science, SocialSciences, Engineering and Energy Conference 17-19 December, 2014, Prajaktra Design Hotel, Udon Thani, Thailand I-SEEC 2014 http//iseec2014.udru.ac.th The Increasing of Security in Log in System Kritsanapong Somsuka,e1, Karaphat Kounlaxayb, Chalida Sanemueangc,e2 a Department of Electronics Engineering, Faculty of Technology, Udon Thani Rajabhat University, Udon Thani, Thailand b Department of Computer Engineering, Faculty of Engineering, Souphanouvong University, Laos Language Center, Udon Thani Rajabhat University, Udon Thani, Thailand e1 kritsanapong@udru.ac.th, e2Chalida.sanemueang@gmail.com, Abstract Log in system is a system which is used for the authentication. The disadvantage of this system is that, if the attackers can trap information which is transported over the insecure channel, they can use the application of the user to access into the system. In 2010, the applying RSA with login system was proposed to increase the security by encryption and decryption. However, the attackers can recover the private key whenever the modulus is factored. In this paper, applying modified RSA, is called MMCS, with the login system is presented to increase more security when compared with the login system which is applied with RSA. The security of this system is based on the difficulty of integer factorization and discrete logarithms. The experimental results show that the security of the log in system which is applied with MMCS is more secured than the security of the log in system which is applied with RSA. However, the computation time of the proposed system is too long. Keywords: Log in System, RSA, Security, MMCS 1. Introduction Data Transmission on a network system is very popular nowadays. However, the network system is not a secure channel for data transmission. Therefore, the information security is an important issue. At present, there are many methods for the information security and one of the information securities that are very popular nowadays is the cryptography. The cryptography is an information security process for data transmission. In this process, a message or data must be encrypted first and sent to through a network system. Hence, if the attackers get the information on the network system, they cannot access into that formation because it is encrypted. Besides, if the attackers want to get the initial message, they have to decrypt the encrypted message through the decryption process which uses secret keys. It means that, the attackers must use secret keys to decryption. The cryptography is divided into two categories which are Symmetric Cryptosystem and Asymmetric Cryptosystem. The Symmetric Cryptosystem refers to encryption methods in which both the senders and receivers share the same key, is called “secret key” to encrypt and decrypt the message. The disadvantage of the Symmetric Cryptosystem is a problem with exchanging of secret key between the senders and receivers. The other system is Asymmetric Cryptosystem, also known as Public-key Cryptosystem. This system requires two separate keys, one of which is published, called “public key” and one of which is kept secret, called “private key”. The information or message which is encrypted by the public key must be decrypted by the private key only. On the other hand, the information or message that is encrypted by the private key, it must be decrypted by the public key. The advantage of the Asymmetric Cryptosystem is to be able to solve the problem with exchanging of the secret key because the private key is kept secret. At present, there are many methods that are developed for the Asymmetric Cryptosystem and one of the most popular methods that are used nowadays is the RSA algorithm. RSA algorithm is a method which computes the product of two prime numbers by this process is very easy. In contrast, to compute factors of the modulus by this process is very difficult. Thereby, the information security will depend on the difficulty of the factoring modulus. The login system is a system that uses to prove the identity of users. This system will prove the identity of users from the evidences and examine the accuracy in order to prove that this user is existent. However, to send the evidence or message from the channel to the server is not secure. Therefore, if the attackers can trap or get the signal or evidence, then the attackers will find the personal information of the users and can use them to access into the user’s account. In 2010, Li Ming-xin and Kang Feng [2] presented the way to increase the security for the login system. They used the RSA algorithm and applied it to the login system in order to make the security to be safer. Two years later, in year 2012, Rasmi and Varghese Paul [3] presented the MMCS algorithm, which is a way to increase the security in RSA process. Due to the security of RSA depends on the difficulty of factoring modulus only. If the value of the modulus can be factorized, then the RSA is no more secure. However, the modern RSA algorithm is harder to attack because it depends on the difficulty of the computation of Discrete Logarithm. This research aims to emphasize the developing of login system which is applied from the MMCS algorithm in order to increase the security of the login system. Due to the comparison of the difficulty of the computation of secret key between the login systems, applied from MMCS algorithm is more difficult than the system, applied from RSA algorithm. 2. Related Work 2.1 RSA RSA is public-key cryptography which uses two keys to encrypt and decrypt a message or data. One key will be published, is called “public key” and another key is called “private key” and the key generators will keep it secret. The RSA algorithm can be applied and used to encrypt the plaintext or to verify a digital signature for encryption. The RSA algorithm is divided into three procedures which are; key generation, encryption and decryption. 2.2 MMCS MMCS is a new algorithm which is developed from the RSA algorithm in order to increase the security to be more difficult to be attacked. The difficulty of the attacking the MMCS algorithm is that, the attackers must factorize the factors of the modulus and compute the value of the Discrete Logarithm. Then, they can compute the value of the private key. This algorithm is divided into three procedures as follows: The first procedure: Key generation The key generators compute the values of public key and private key to encrypt and decrypt the plaintext. 1. Randomly to compute the large prime numbers, which are identified as p and q and the size of p and q are equal. 2. Compute the value of the modulus n=p * q. 3. Compute the value of Euler φ(n) = (p-1)*(q-1). 4. Choose the public key as e, which e is coprime or relative prime numbers with φ and the e must be more than 1 and less than φ(n) in algorithm of the Extend Euclidean [4]. 5. Choose the private key as s, which s must be more than 1 and less than n. 6. Compute the value of t, which t n-1= ts mod n and t is the second public key. 7. Compute the r from r= ts mod n and r is the third public key. 8. Compute the private key of d, from e*d mod φ(n) =1. In conclusion, the MMCS algorithm can generate three public keys which are (e, r, t) and two private keys which are (d, s). After that, the key generators will publish the public key and identifies the value of n as public key and they will keep the private key secret. The second procedure: Encryption process When the senders want to send private data or secret data to the key generators (receivers), the senders will use the public key and the value of n from the receivers to encryption as follows: 1. Randomly to compute the integer of k in Zn*. 2. Compute ct = me mod n – rk mod n when m is an initial message. 3. Compute cs = tk mod n when cs and ct are cipher texts. The third procedure: Decryption process When the receivers get the ciphertext from the senders, they will decrypt the ciphertext by using the private key as follow: m = (ct+ css) mod n 3. Research Methodology The modified method of login system will be divided into two processes; the first process is on the part of the users. It consists of the value of public key, which is generated by the server and the encryption before sending the message to the server. The second process is on the part of the servers. It consists of the decryption of the message (password) and the examination of the accuracy in the database. 3.1 The users’ process The users’ process is a process to access into the system from servers Start Receive a public key from server Log in by usernames and passwords Encrypt the passwords by using MMCS Send usernames and encrypted passwords to the server Finish Figure 1 Process of the users Figure 1 shows a working process of new login system from the users. It can be described as follows. Access to the system that use login system by researchers, servers will send the public key and values of modulus to users. 1. Users fill in usernames and passwords before it sends to the servers. 2. After users send usernames and passwords to servers, the system will use only the password to encryption. In this process, it will use the public key from the process of MMCS algorithm. For encryption process, it can use the new process that shows in [6] to reduce the computation time. 3. Send usernames and passwords that have already been encrypted to the servers. 3.2 The servers’ process The servers’ process is a process to examine the users’ information in order to ask for permission and identify the terms of services for users. Start Receive usernames and encrypted passwords from clients Decrypt the passwords by MMCS algorithm Do the usernames and passwords appear on a database or not? Accept Reject Finish Figure 2 the servers’ process Figure 2 shows a working process of new login system from the servers. It can be described as follows. 1. Receive usernames and passwords that have already been encrypted from the users. 2. Use a private key to decrypt, only for a password in order to get the correct password. In this process, it will use the MMCS algorithm to decrypt. 3. Examine usernames and passwords that have already been decrypted from the users whether they are appeared on the database or not. In case that they are on the database, the servers will give permission and identify the terms of services for users. If not, the servers will decline the permission for the users. 4. Results This research has been experimented with the values of n which are small sizes. However, if the researchers want to use this system, they should increase the sizes of n to be not less than 1024 bits. Figure 3 and 4 show a page of webpage before and after logging into the system. It can be seen that the system has sent the public keys e=17, r=870 and t=401 and modulus n=8509 to the system to encryption the password, and the value of secret key d (d=5381) and s(s=11) will be kept secret in the database. Figure 3 A page of webpage before logging into the system Figure 4 A page of webpage after logging into the system Table 1: A comparison between the time that use to encryption by using RSA algorithm process and MMCS algorithm process when n=8509, e=17, r=870 and t=401 Initial Message (passwords) 9 13 124 800 1234 2345 4000 6165 7999 Time to encryption by using RSA algorithm (seconds) 0.00000405 0.00000406 0.00000574 0.00000829 0.00000314 0.00000263 0.00000362 0.00000405 0.00000364 Time to encryption by using MMCS algorithm (seconds) 0.00113 0.00103 0.00131 0.00144 0.00103 0.00177 0.00131 0.00107 0.00114 From the table 1, it shows that MMCS takes longer time than RSA to encryption in any situations. It causes of the computation of MMCS algorithm is more complex than RSA algorithm. Then, if the system uses the MMCS to log in the system, it could be taken with a large key (at least 1024 bits) and the system will use very long time to process data. However, by the process of MMCS algorithm, it is much more secure than RSA algorithm because factoring prime numbers in MMCS is more difficult. Besides, to attack the MMCS algorithm, it also depends on the difficulty of the computation of Discrete Logarithm. 5. Conclusion This research aims to present the new login system which is more secure than the last one. This new login system is applied from the MMCS algorithm because the MMCS algorithm is a public key encryption process and it is also applied from the RSA algorithm. From this research, the process that applied from MMCS is safer than the process that applied from RSA. Due to the security of MMCS depends on two factors which are; 1. the difficulty of factoring the modulus 2. the difficulty of the computation of Discrete Logarithm At the same time, the security of RSA depends on the difficulty of factoring the modulus only. If the attackers can factor the modulus, they can compute the value of private key which has only d. On the other hand, from the MMCS algorithm there are two private keys, which are d and s. However, the attackers can compute the value of private key d (from the factoring the modulus), they cannot decrypt the password because they do not have the private key s. To compute the value of private key s, they have to compute the value of Discrete Logarithm. From the result, it shows that the new system takes longer time to process data than the system that applied from the RSA and the other systems because of the complexity of the computation. However, the new system which is presented, is more secure because the attackers have to factor the modulus and compute the value of Discrete Logarithm, then they can compute the values of private keys. 6. References [1] R.L. Rivest, A. Shamir, L. Adleman. 1978. A method for obtain digital signatures and public key cryptosystems. Communications of ACM. 21(1978): 164 – 158 [2] L. M.-xin and K. Feng. 2010. An improved sign-in scheme based on RSA cryptosystem. International Conference on Computer Application and System Modeling (ICCASM). 6(2010): 35 – 37 [3] P.S. Rasmi and V. Paul. 2012. An Implement of a New public key System based on RSA which leads hackers solve multiple hard problems to break the cipher. International Conference on Intelligent Systems Design and Applications (ISDA). (2012): 656 – 661 [4] J.Zhou, J. Hu, P.Chen. 2010. Extended Euclid Algorithm and Its Application in RSA. International Conference on Information Science and Engineering. (2010): 2079 – 2081 [5] A. Chhabra and S. Mathur. 2011. Modified RSA Algorithm. International Conference on Computational Intelligence and Communication Networks (CICN). (2011): 545-548 [6] A.J. Elbirt. 2008. Understanding and Applying Cryptography and Data Security. The United States of America : Taylor& Francis Group.