Design and Construction of Computer Control Switches System

advertisement
Secure Information Exchange System for
Criminal Cases
Aye Mya Thwe
Abstract - For electronic data transmission system, the
adequate security demand grows high over the decades.
There are many distinctive security algorithms to support
the security requirements. The aim of this work is to provide
secure information exchange system for criminal cases. The
culprit record in criminal cases may be text, image and
audio files. To provide confidentiality of these files, different
kinds of symmetric algorithms such as Blowfish, Twofish
and AES are used. The encrypted files (text, image and
audio) of culprit record are organized by using Ionic
compression method to transfer over the communication
medium. This system is implemented by C# programming
language.
Keywords
-
compression, cryptography, encryption,
security, symmetric encryption algorithms
I. INTRODUCTION
The computer and communication technology’s today
are very important parts for a strong economy, thus it is
important to have suitable security standards systems and
technologies to meet that security needs [1]. To provide
the security requirement, cryptography plays a major role.
Cryptography underlines many of the security
mechanisms and builds the science of data encryption and
decryption. Cryptography enables us to securely store
sensitive data or transmit across insecure networks such
that it cannot be read by anyone except the intended
recipient. By using a powerful tool such as encryption we
gain privacy, authenticity, integrity, and limited access to
data [1].
Many encryption algorithms are widely available and
used in information security. They can be categorized
into Symmetric (private) and Asymmetric (public) keys
encryption [3]. Symmetric key algorithms are the fastest
and most commonly used type of encryption [4].
Encryption is applied by combining other techniques in
order to attain a high degree of data security system. This
paper aims to develop an efficient and secure information
exchange system between communities. In this work,
three different kinds of symmetric encryption algorithms
are used to achieve good security and a compression
technique is applied to be more convenient in data
transfer.
II. RELATED WORKS
In the present, several security features have applied to
make the data secure from various attacks and for the
integrity of data. In [2], the authors carried out a research
to optimize the existing standards of cryptography (AES)
for the images and text data encryption. The basic aim of
their work is to modify AES to provide less computation
and better security for data.
First Author Name, Department of Information Technology, Aye
Mya
Thwe,
Mandalay
Technological
University,
(email:
ayelaymtu@gmail.com),
Mandalay,
Republic
of
Myanmar,
+959423660204.
Then, encryption and decryption of images using
secret-key block cipher called 64-bits Blowfish was also
described in [6]. The main aim of this work is to get the
best security/performance tradeoff over existing ciphers.
After that, Bismita and his fellow presented about
encryption on MP3 compression. In their approach, they
proposed the encryption technique at the time of
compression to provide security to the online music
transmission and distribution in [5]. For providing more
security to MP3 data transfer, they applied the AES
encryption algorithm to the whole quantized audio data.
According to the literature from these papers, this
paper is proposed a multimedia data security system
using symmetric cryptographic algorithms and
compression technique for criminal cases.
III. OVERVIEW OF CRYPTOGRAPHY AND
ENCRYPTION
Cryptography is the science of information security.
The word is derived from the Greek kryptos, meaning
hidden. Cryptography is closely related to the disciplines
of cryptology and cryptanalysis. Cryptography includes
techniques such as microdots, merging words with
images, and other ways to hide information in storage or
transit. However, in today’s computer-centric world,
cryptography is most often associated with scrambling
plaintext (ordinary text) into ciphertext (a process called
encryption), then back again (known as decryption).
Individuals who practice this field are known as
cryptographers.
Modern cryptography concerns itself with the
following four objectives:
1. Confidentiality_ the information cannot be
understood by anyone for whom it was
unintended
2. Integrity_ the information cannot be altered in
storage or transit between sender and intended
receiver without the alteration being detected
3. Non-repudiation_ the sender of the information
cannot deny at a later stage his or her intentions
in the creation or transmission of the information
4. Authentication_ the sender and receiver can
confirm each other’s identity and the
origin/destination of the information [7]
In cryptography, encryption is the process of encoding
messages (or information) in such a way that third parties
cannot read it, but only authorized parties can. Encryption
doesn’t prevent hacking but it prevents the hacker from
reading the data that is encrypted. In an encryption
scheme, the message or information (referred to as
plaintext) is encrypted using and encryption algorithm,
turning it into an unreadable ciphertext. This is usually
done with the use of an encryption key, which specifies
how the message is to be encoded. Any adversary that
can see the ciphertext should not be able to determine
anything about the original message. An authorized party,
however, is able to decode the ciphertext using a
decryption algorithm that usually requires a secret
decryption key, that adversaries do not have access to [8].
There are two general categories for key-based
encryption – symmetric (secret key) and asymmetric
(public-key).
In symmetric-key schemes, the encryption and
decryption keys are the same. Thus communicating
parties must agree on a secret key before they wish to
communicate. In public-key encryption schemes, the
encryption key is published for anyone to use and encrypt
messages. However, only the receiver party has access to
the decryption key and is capable of reading the
encrypted messages [8].
message is first divided into 32 bits. The left 32 bits are
XORed with the first element of a P-array to create a
value called P´, run through a transformation function
called F, then XORed with the right 32 bits of the
message to produce a new value called F´. Then F´
replaces the left half of the message and P´ replaces the
right half, and the process is repeated 15 more times with
successive members of the P-array. The resulting P´ and
F´ are then XORed with the last two entries in the P-array
(entries 17 and 18), and recombined to produce the 64-bit
ciphertext.
Because Blowfish is a symmetric algorithm, the same
procedure is used for decryption as well as encryption.
The only difference is that input to the encryption is
plaintext; for decryption, the input is ciphertext [12].
IV. SYMMETRIC ENCRYPTION ALGORITHMS
Symmetric encryption is the oldest and best-known
technique. It uses a single secret key to encrypt and
decrypt the message. A secret key, which can be a
number, a word, or just a string of random letters, is
applied to the text of message to change the content in a
particular way [9]. As a basis, there are two types of
symmetric encryption: stream cipher and block cipher.
Stream ciphers encrypt the bits of information one at
time - operate on 1 bit (or sometimes 1 byte) of data at a
time (encrypt data bit-by-bit) [10].
Block cipher is a symmetric cipher which encrypts a
message by breaking it down into blocks and encrypting
data in each block [11].
There are various kinds of block cipher algorithms:
AES, Blowfish, CAST5, DES, IDEA, RC6, Serpent,
Triple DES and Twofish. At the proposed system,
symmetric block cipher algorithms are used. Blowfish is
used for text encryption, Twofish is applied for image
encryption and AES is for audio.
B. AES Encryption Algorithm
AES is a non-Feistel cipher that encrypts and decrypts
a data block of 128 bits. It uses 10, 12, or 14 rounds. The
key size, which can be 128, 192 or 256 bits, depends on
the number of rounds [13]. The input data is 16 bytes, and
the resulting encrypted data is also 16 bytes. The larger
the key size is used, the more difficult it is to break the
algorithm and obtain the encrypted data.
A. Blowfish Encryption Algorithm
Blowfish is a symmetric encryption algorithm,
meaning that it uses the same secret key to both encrypt
and decrypt the message.
= XOR
Plaintext
Plaintext
Round 1
Expand Key
Add Round Key
Substitute Bytes
Inverse Sub Bytes
Shift Rows
Inverse Shift Rows
Mix Columns
Add Round Key
Round 10
W[0,3]
Inverse Mix Columns
W[4,7]
Add Round Key
Inverse Sub Bytes
Round 9
Add Round Key
Inverse Shift Rows
Shift Rows
Mix Columns
Add Round Key
Inverse Mix Columns
W[36,39]
Round 10
Inverse Shift Rows
Shift Rows
Add Round Key
Add Round Key
Inverse Sub Bytes
Substitute Bytes
Round 1
Round 9
Substitute Bytes
W[40,43]
Add Round Key
Ciphertext
Ciphertext
Figure 2. Structure of AES algorithm
Plaintext
64
32
32
P1
P1'
F
P1'
F1'
P2
P2'
P2'
F
F2'
( 13 more iterations)
P15'
F15'
P16
P16'
F
P16'
F16'
P17
P18
32
32
64
Ciphertext
Figure 1. Blowfish algorithm
Blowfish is also a block cipher, meaning that it divides
a message up into fixed length blocks during encryption
and decryption. The block length for Blowfish is 64 bits;
messages that aren’t a multiple of eight bytes in size must
be padded.
A graphical representation of the blowfish algorithm
appears in figure 1. In this description, a 64-bit plaintext
The structure of the AES is shown in figure 2. AES
operates on a 4×4 column-major order matrix of bytes,
termed the state. It consists of add round key at initial
round. Add round key operates each byte of the state is
combined with the round key using bitwise xor. The first
r-1 rounds (r is 10, 12 or 14) are similar and they consists
of 4 transformations:
1. SubBytes- a substitution step where each byte is
replaced with another according to a lookup
table.
2. ShiftRows- a transposition step where each row
of the state is shifted cyclically a certain number
of steps.
3. MixColumns- a mixing operation which
operates on the column of the state, combining
the four bytes in each column.
4. AddRoundKey- each byte of the state is
combined with the round key using bitwise xor.
The last round has only 3 transformations
1. SubBytes
2. ShiftRows
3. AddRoundKey [14].
C. Twofish Encryption Algorithm
Twofish is a 128-bit block cipher that accepts a
variable-length key up to 256 bits. The cipher is a 16round Feistel network with a bijective F function made up
of four key-dependent 8-by-8-bit S-boxes, a fixed 4-by-4
maximum distance separable matrix over GF(2 8), a
Pseudo-Hadamard Transform, bitwise rotations, and a
carefully designed key schedule.
Figure 3 shows an overview of the Twofish block
cipher. Twofish uses a 16-round Feistel-like structure
with additional whitening of the input and output. The
only non-Feistel elements are the 1-bit rotates. The
plaintext is split into four 32-bit words. In the input
whitening step, these are XORed with four key words.
This is followed by sixteen rounds. In each round, the two
words on the left are used as input to the g functions.
(One of them is rotated by 8 bit first). The g function
consists of four byte-wide key-dependent S-boxes,
followed by a linear mixing step based on an MDS
matrix.
Plaintext(128 bits)
K0
K1
F
K2
g
K2r+8
S-box 0
S-box 1
S-box 2
K3
Input
whitening
<<<1
PHT
MD
S
S-box 3
One round
g
S-box 0
S-box 1
<<<8
S-box 2
MD
S
S-box 3
K2r+9
>>>1
15 more
rounds
Undo last
swap
K4
K5
K6
K7
Output
whitening
Ciphertext(128 bits)
Figure 3. Structure of Twofish algorithm
Original data
Original
data
Text
(.txt)
Image
(.jpg)
Secret
key
Encryption
Secret
key
Twofish
algorithm
Audio
(.wav)
Database
Image
(.jpg)
Text
(.txt)
Audio
(.wav)
Twofish
algorithm
Blowfish
algorithm
AES
algorithm
Database
Secret
key
Blowfish
algorithm
AES
algorithm
Secret
key
Secret
key
Decryption
Secret
key
Ciphertext
Encrypted data
Encrypted data
Compression
Ionic zip compression
Ionic zip compression
Decompression
Final data
Compressed data
Compressed data
Received data
Process of Sender
Process of Receiver
Ciphertext
Send
Figure 4. Proposed System Design
As illustrated in figure, the proposed system has two
portions: sender site and receiver site. From the sender
site, the culprit’s record (text, image and audio) are
loaded from the database. The text file (.txt) is encrypted
with a secret key using Blowfish encryption algorithm.
Then the image (.jpg) of culprit is encrypted with
Twofish algorithm and AES is used to encrypt the audio
file (.wav). All the ciphertexts (encrypted text, encrypted
image and encrypted audio) are compressed using ionic
zip compression method to obtain all in one. Then, the
compressed file is transmitted to the receiver through the
mail server.
At the receiver site, the received file is firstly
decompressed and then decrypted with the secret keys
using corresponding algorithms to get back the original
data.
VI. IMPLEMENTATION OF THE PROPOSED SYSTEM
The implementation of the proposed system is
presented with a series of interfaces. When the user starts
the system, the welcome window form will be appeared
as the shown in figure 5.
The results of the two g functions are combined using
a Pseudo-Hadamard Transform (PHT), and two keywords
are added. These two results are then XORed into the
words on the right (one of them is rotated left by 1 bit
first, the other is rotated right afterwards). The left and
right halves are them swapped for the next round. After
all the rounds, the swap of the last round is reversed, and
the four words are XORed with four more keywords to
produce the ciphertext [15].
V. PROPOSED SYSTEM DESIGN
To develop the proposed system, three symmetric
encryption algorithms which give good protection to the
culprit’s record (including text, image and audio) are used
and ionic compression technique is also used to compact
the encrypted culprit records’ files. In the proposed
system, 128-bit key length is chosen to use for three
algorithms. The proposed system design is illustrated in
figure 4.
Figure 5. Welcome Form
Firstly, the user has to click the go button to continue
the system. Then the log in form will be appeared as
shown in figure 6.
If the user wants to view the culprit’s image and
information in detail, he or she can easily search by
filling the culprit’s name and his other information in the
search form as illustrated in figure 10.
Figure 6. Login Form
In this form, the user has to fill the information such as
user name and password to log in the system. So, this
user must be registered person and he or she must be
authorized person to manage the system. Then, the user
can see the main window form.
Figure 10. Search Form
The user can transfer the culprit’s record from one
police station to another via email. To send the
information secretly, firstly the culprit’s record is chosen
from the database as shown in figure 11.
Figure 7. Main Form
This user can edit, update, delete or transfer the culprit
information from the database. The culprit information
form is shown in figure 8.
Figure 11. Send Form
Figure 8. Culprit Information
Before sending, the chosen culprit’s record must be
encrypted with corresponding encryption algorithms.
Figure 12: shows the encryption of text file with Blowfish
algorithm.
The user can update the culprit’s record as illustrated
in figure 9.
Figure 12. Text Encryption with Blowfish Algorithm
Figure 9. Update Form
Figure 13 illustrates the image encryption with
Twofish encryption algorithm.
At the receiver site, the original information of culprit
can be got back by processing the reverse order as the
sender site.
Our system is intended to save time, money and human
resources when transmitting the culprit’s information
from one police station to others. Moreover, because of
being a computer-based system, it also protects the
problems caused by paper-based system. Furthermore, it
also promises the information jumping while transmitting.
Figure 13. Image Encryption with Twofish Algorithm
The audio encryption using AES encryption is shown
in figure 14.
Figure 14. Audio Encryption with AES Algorithm
After that, these encrypted files are pressed tightly
together using ionic compression method.
VII. CONCLUSIONS
In today, various data exchange systems have been
developed to exchange text, image, audio and other
multimedia data between communities. Therefore,
security of multimedia data transmitted over the
unsecured medium is an imperative issue. Usually, fast
and powerful encryption algorithms are very attractive for
multimedia
applications.
Symmetric
encryption
algorithms are faster to encrypt multimedia data and
easier to implement than asymmetric encryption
algorithms. This system is intended to apply in the urgent
data transmission about culprit between police stations. In
this work, only symmetric encryption algorithms are used
to encrypt the data. As further extension, a more robust
security system can be developed by combining
symmetric and asymmetric encryption algorithms.
ACKNOWLEDGMENT
I wish to express my profound gratitude to Ministry of
Science and Technology for encouraging to perform
researches. The author would also like to express her
appreciation and thanks to Dr. Su Wai Phyo, Associate
Professor, Department of Information Technology,
Mandalay Technological University for her supporting
the facilities throughout the research. Moreover, the
author would also like to express her appreciation and
thanks to her all the respected teachers from Department
of Information Technology, Mandalay Technological
University, beloved parents and her close friends for their
invaluable suggestions and their kind help through this
work.
[1]
Figure 15. File Compression with Ionic Compression
[2]
Then, the compressed file is send to the intended
receiver through the mail server.
[3]
[4]
[5]
[6]
Figure 16. File Transmission to the Intended Receiver
[7]
[8]
REFERENCES
Malek Jakob Kakish, “Enhancing the Security of the RSA
Cryptosystem”,
www.arpapress.com/Volumes/Vol8Issue2/IJRRAS_8_2_14.pdf.
Sumira Hameed, F.Riaz, Riaz Moghal, G.Akhtar, Anil Ahmed and
A.G.Dar, “Modified Advanced Encryption Standard For Text And
Images”, Computer Science Journal. Volume 1, Issue 3, December
2011.
Diaa Salama Abdul.Elminaam, H.M.A.Kader and Mihie Mihamed
Hadmoud, “Performance Evaluation of Symmetric Encryption
Algorithms”, IJCSNS International of Computer Science and
Network Security, VOL.8 No.12, December 2008.
Ayushi, “A Symmetric Key Cryptographic Algorithm”, 2010
International Journal of computer Applications (0975-8887)
Volume 1-No.15.
Bismita Gadanayak and Chittaranjan Pradhan, “Encryption on
MP3 Compression”, MES Journal of Technology and
Management.
Irfan.Landge, B.Contractor, Aamna Patel and R.Choudhary,
“Image encryption and decryption using blowfish algorithm”,
World Journal of Science and Technology 2012, 2(3):151-156.
Margaret Rouse, “What is cryptography?”, January 2009.
“Encryption”,
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
[9] “Description of Symmetric and Asymmetric Encryption”,
support.microsoft.com/kb/246071
[10] “Stream Cipher: Stream Cipher vs Block Cipher”,
www.encryptionaddencrypton.com/...n/stream _cipher...
[11] “Block cipher encryption: Block cipher vs Stream cipher”,
www.encryptionaddencryption.com/.../block_cipher.html
[12] Bill Gatliff, “Encrypting data with the Blowfish algorithm”,
eetindia.com | August 2003 | EE Times-India.
[13] Behrouz Forouzan, “Cryptography and Network Security”.
[14] “Advanced
Encryption
Standard”,
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
[15] Bruce Schneier, J.Kelsey, D.Whiting, D.Wagne, C.Hall and Niels
Ferguson,
“Twofish:
A
128-Bit
Block
Cipher”,
http://www.counterpane.com/twofish.html, 15 June 1998.
Download