conference on â ADVANCED TRENDS IN. COMMUNICATION ENGINEERINGâ at Sri Ramakrishna. Institute of Technology. A member of ISTE (Indian Society.
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015.
A SECURE RSA FOR DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS 1
Dr.K.Sheela Sobana Rani, 2R.Abiya Neethu, 3R.Aiswarya, 4S.Archana, 5M.Divya Bharathi
1
Associate Professor, Department of Electronics and Communication Engineering, Sri Ramakrishna Institute of Technology,Tamil Nadu,India 2345
Student, Department of Electronics and Communication Engineering,Sri Ramakrishna Institute of Technology,Tamil Nadu,India between a source and destination pair, the messages from the source node may need to wait in the intermediate nodes for a substantial amount of time until the connection would be eventually established. Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of the data and new algorithms are evolving. Military cryptographic systems must meet number of practical considerations:
ABSTRACT This paper is based on data transfer in military networks through cipher text-hybrid algorithm. Usage of Random Symmetric Algorithm (RSA) is a effective means of time consumption and data security. In the existing system retrieval of information is done through an intermediate node and by providing key mechanism. In the proposed system transfer of the cipher text is obtained from Random Symmetric Algorithm directly from base station to soldiers, thereby minimizing the time consumed. In addition to it an alert system is also being provided to the soldier. Index termsRSA,encryption,decryption,alert system
I.
INTRODUCTION
1) An ideal cryptographic system for military purposes is a single all-purpose system which is practical for use from the highest headquarters to the individual soldier on the battlefield. It is secure no matter how much message traffic is sent using the system. It is easy to use without special training. It presents no logistics problems in keeping the users supplied with the system’s keys. It operates under all weather conditions, on all means of communication, and in the dark.
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant Network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. In many military networks scenarios, connections of wireless devices carried by the soldiers may be temporarily disconnected by jamming, environmental factors and mobility, especially when they operate in hostile environments. Typically end to end connection
2) Cryptographic system selection for military use depends on much more than its degree of security. While protecting information from unfriendly eyes, a system must still allow communications to take place rapidly,to be reliable and to be usable by all who need to communicate. It must be usable under all conditions. For example, a system requiring an hour of pains-taking encryption would go unused by a
272
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015. combat military force on the move. 3)A system that has no tolerance for errors in its use would be inappropriate for soldiers under fire in severe weather conditions. 4)A system that only supports a low volume of messages would be inappropriate for a major message centre handling thousands of messages daily. 5) A system that requires expensive, sophisticated equipment would be inappropriate for a military force that can barely afford to buy ammunition. No single system meets all the requirements of security, speed, reliability, and cost.
3DES and DES. It also shows that 3DES has almost 1/3 throughput of DES, or in other words it needs 3 times than DES to process the same amount of data. A study in [2] is conducted for different popular secret key algorithms such as RC4, AES, and XOR. They were implemented, and their performance was compared by encrypting for real time video streaming of varying contents. The results showed; encryption delay overhead using AES is less than the overhead using RC4 and XOR algorithm. Therefore, AES is a feasible solution to secure real time video transmissions. In the present work[3]the authors introduced a new symmetric key cryptographic method for both encryption and decryption of any file such as binary file text file etc. They considered the size of key matrix as 65536 and in each cell they stored two character patterns instead of one character with the introduction of a square key matrix of size 256x256. In this paper[4], various techniques of security of data and one the algorithm using Polyalphabetic substitution cipher are discussed. Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of data and new algorithms are evolving. Polyalphabetic substitution cipher is a strong algorithm used for security of data in army stations. The algorithm [5] is designed using combination of two symmetric cryptographic techniques. These two primitives can be achieved with the help of Advanced Encryption Standard (AES) and Data Encryption Standard (DES). This new hybrid cryptographic algorithm has been designed for better security with integrity. The security [6] is provided based on the AES prototype cryptographic algorithm. An advanced key management scheme is used to enhance the security of the system. The paper presents [7] an approach to develop a Hybrid Cryptographic algorithm using combination of two symmetric cryptographic techniques which are AES and DES. In this paper [8] ,Encryption algorithms and methods are among those technologies that are less apparent to casual or business users, but are central to virtually every fund transfer, business to business transfer or internal
The need for security must be balanced against the practical requirements when systems are selected for use. Breakable systems are found today, despite technological advances, because of these practical requirements. Almost any cryptographic system, given enough time and resources can eventually be solved. The only exception to this is a system which uses absolutely random changing keys with every character encrypted and never repeated. Such a system can be achieved under very limited conditions, but is in practice impossible on any large scale. Even the most sophisticated machine or computer based cryptographic system cannot produce random, nonrepeating keys. The requirement for each communicating machine to generate the same keys prevented truly random keys. At best, a machine system can produce keys by so sophisticated a process that it appears to be random and resists efforts to recover the key generation process.Given these practical considerations, a military system is expected to delay successful analysis, not prevent it. When the system is finally solved, the information obtained must have lost all its value. II. RELATED WORKS A study in [1] is conducted for different secret key algorithms such as DES, 3DES, AES, and Blowfish. They were implemented, and their performance was compared by encrypting input files of varying contents and sizes. The algorithms were tested on two different hardware platforms, to compare their performance. They had conducted it on two different machines: P-II 266 MHz and P-4 2.4 GHz. The results showed that Blowfish had a very good performance compared to other algorithms. Also it showed that AES had a better performance than
273
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015. company data input and output today. This paper examines evolution and economic significance of NIST’s Data Encryption Standard (DES) program. In this paper[9] a block encryption standard for transfer of data is proposed to achieve the different goals of security that is availability confidentiality and integrity. The algorithm is based on symmetric key encryption approach .In this paper[10] the advanced encryption standard is used for error detection in an efficient manner .hardware implementation can be done in the most efficient and appropriate manner.
PROPOSED ALGORITHM GENERATION 1. 2. 3. 4.
5. III. PROPOSED SYSTEM 6. In this paper we propose an improved block cipher symmetric encryption algorithm that has the same structure of encryption and decryption. So far, conventional cryptography algorithms have difference structure of encryption and decryption. We device our algorithm by inserting a symmetric layer using random number, encryption number and XOR operation, in which the whole proposed algorithm rounds uses encryption procedure and the same for the decryption procedure. The symmetry layer is put between encryption part and the decryption one. The proposed algorithm has the better speed compared with the comparing encryption algorithm. The main feature of the encryption/decryption program implementation is the generation of the encrypted key. The purpose of the cryptography is used not only to provide confidentiality, but also to provide solutions for other problems such as data integrity, authentication, non-repudiation.In this a random number for generating the initial key, where this key will be used for encrypting the given source file using proposed encryption algorithm with the help of encryption number. The proposed key blocks contains all the possible words comprising of number(n) of characters each generated from all characters whose ASCII code is from 0 to 255 in a random order. The pattern of the key blocks will depend on the text key entered by the user. Here we are using 512 bit key size to encrypt a text message. To decrypt any file one has to know exactly what the key blocks is and to find the random blocks theoretically one has to apply 2^256 trial run which is intractable. As proposed earlier we are using a symmetric key approach in our system.
7.
8. 9.
FOR
KEY
Select or create any private key of size 256x2 bits or 64 characters. Size of the selected key will be varying from 128 bits to 512 bits or 16 to 64 characters. Use of 64*8 key means 512 bits in length. Divide 64 bytes into 4 blocks of 16 bytes like Key_Block1, Key_Block2, Key_Block3, Key_Block4. Apply XOR operation between Block1 and Block3.Results will be stored in new Key_Block13. Apply XOR operation between Block2 and Block13.results will be stored in new Key_Block213. Apply XOR operation between Key_Block213 and Key_Block4.Results will be stored in new Key_Block4213. Repeat the steps 5,6,7 till (random number/4). Exit.
Fig 1.1 Block diagram for the key generation
274
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015. ALGORITHM PROCESS 1. 2. 3.
4. 5.
6. 7. 8.
FOR
THE
The Fig1.4 shows that the input texts are being scanned for the encryption to take place. The condition of the switches is scanned for inputs and following encryption process done. The simulation results in Fig 1.5 shows that the transmission of the input text to the receiver side.
ENCRYPTION
Initially select the plane text of 16 bytes Insert the key of size 16 bytes(depend on the plane text value) Apply XOR operation between the key(Key_Block4213) and plane text block (Text_Block). Results will be stored in Cipher_Block1. Apply right circular shift with 3 values. will be stored in new Cipher_Block2. Apply XOR operation between Cipher_Block2 and Key_Block2.Result will be stored in new Cipher_Block4. Cipher_Block4 is the input of the next round as a plane text block. Repeat step 1 to 7 till (Encryption number /4). Exit.
Fig 1.3 Simulation for scanning keys
Fig 1.2 Block diagram for the encryption process IV. RESULTS AND SIMULATION The following results were obtained from the PROTEUS MODELING describing the encryption and decryption algorithm of our proposed system. The simulation results Fig1.2 describes about the initial condition where the input texts are given manually.
Fig 1.4 Simulation for input text encryption
275
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015. Algorithm using extended MSA method: DJSA symmetric key algorithm” published in 2011 International Conference on Communication Systems and Network Technologies, 978-0-7695-4437-3/11 $26.00 © 2011 IEEE [4] Dnyanda Namdeo Hire, “Secured Wireless Data Communication”, International Journal of Computer applications(09758887),Volume54no1,September 2012. [5] Wang Tianfu, K. Ramesh Babu , VIT University, TamilNadu,India.”Design of a Hybrid Cryptographic Algorithm”.K Ramesh Babu, International Journal of Computer Science & Communication Networks, ISSN:2249-5789 , Vol 2(2), 277-283 277 [6] Nikolaos Doukas,Nikolaos G.Bardis, wseas transactions on information science & applications, “Design and Development of a Secure Military Communication based on AES Prototype Crypto Algorithm and Advanced Key Management Scheme”,ISSN: 1790-0832, Issue 10, Volume 5, October 2008
Fig 1.5 Simulation result showing the transmission of the input text
[7] Jigar Chauhan, Neekhil Dedhia, Bhagyashri Kulkarni, University of Mumbai. “Enhancing Data Security by using Hybrid Cryptographic algorithm”, International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013 [8] D. Coppersmith, "The Data Encryption Standard (DES) and Its Strength against Attacks." IBM Journal of Research and Development,May 1994, pp. 243 -250.
V. CONCLUSION Cryptography is the best method for security of data. The proposed RSA shows a better result when compared with the previous works. It will take less time and it is impossible to break the encryption algorithm without knowing the exact key value. This algorithm can be applied for data encryption and decryption in any type of public applications for sending confidential data.
[9] Akhil Kaushik, Manoj Bamela, AnantKumar, ” Block Encryption Standard for Transfer of Data”, International Conference on Networking and Information Technology2010. [10] H. Yen, B. F. Wu,“Simple error detection methods for hardware implementation of advanced encryption standard”,IEEE Trans. Computers, Vol. 55, No. 6, pp. 720731, June2006.
VI.REFERENCES [1] "A Performance Comparison of Data Encryption Algorithms," IEEE [Information and Communication Technologies, 2005. ICICT 2005. First International Conference ,2006-02-27, PP. 84- 89. [2] W.S.Elkilani, H.m.Abdul-Kader, "Performance of Encryption Techniques for Real Time Video Streaming, IBIMA Conference, Jan 2009, PP 1846-1850.
Dr.K.Sheela Shobana Rani, Associate professor,Sri Ramakrishna Institute of Technology,Coimbatore, has 10.5 years experience in teaching, has published papers in 16 journals and in 20 conferences
[3] Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta, Asoke Nath “A new Symmetric key Cryptography
276
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015. M. Divya Bharathi, pursuing B.E in ELECTRONICS AND COMMUNICATION ENGINEERING, Sri Ramakrishna Institute of Technology, Coimbatore, have attended a workshop on “ARDUINO MICROCONTROLLER” at Sri Ramakrishna Institute of Technology and attended a conference on “ ADVANCED TRENDS IN COMMUNICATION ENGINEERING” at Sri Ramakrishna Institute of Technology. A member of ISTE (Indian Society for Technical Education).
R. Abiya Neethu, pursuing B.E in ELECTRONICS AND COMMUNICATION ENGINEERING, Sri Ramakrishna Institute of Technology, Coimbatore, have attended a workshop on “ARDUINO MICROCONTROLLER” at Sri Ramakrishna Institute of Technology and attended a conference on “ ADVANCED TRENDS IN COMMUNICATION ENGINEERING” at Sri Ramakrishna Institute of Technology. A member of ISTE (Indian Society for Technical Education).
R. Aiswarya, pursuing B.E in ELECTRONICS AND COMMUNICATION ENGINEERING, Sri Ramakrishna Institute of Technology, Coimbatore, have attended a workshop on “ARDUINO MICROCONTROLLER” at Sri Ramakrishna Institute of Technology and attended a conference on “ ADVANCED TRENDS IN COMMUNICATION ENGINEERING” at Sri Ramakrishna Institute of Technology. A member of ISTE (Indian Society for Technical Education).
S.Archana, pursuing B.E in ELECTRONICS AND COMMUNICATION ENGINEERING, Sri Ramakrishna Institute of Technology, Coimbatore, have attended a workshop on “ARDUINO MICROCONTROLLER” at Sri Ramakrishna Institute of Technology and attended a conference on “ ADVANCED TRENDS IN COMMUNICATION ENGINEERING” at Sri Ramakrishna Institute of Technology. A member of ISTE (Indian Society for Technical Education).
277