cryptographic techniques: in new era

49 downloads 0 Views 198KB Size Report
With time, cryptography has been introduced in all area of life. This work gives a detailed outline of the new application areas and techniques of cryptography.
International Journal of Advanced Computational Engineering and Networking, ISSN(p): 2320-2106, ISSN(e): 2321-2063 Volume-6, Issue-3, Mar.-2018, http://iraj.in

CRYPTOGRAPHIC TECHNIQUES: IN NEW ERA 1

SAMIKSHA, 2KIRTI BHATIA, 3ROHINI SHARMA

1

Student, Sat Kabir Institute of Technology and Management, Haryana, India (First Author) 2 Assistant Professor, Sat Kabir Institute of Technology and Management, Haryana, India 3 Assistant Professor, A.I.J.H.M., college, Rohtak, Harayana (Corresponding author)

Abstract - Cryptography is renowned method of keeping the information secret from unauthorized person, network and organization. With time, cryptography has been introduced in all area of life. This work gives a detailed outline of the new application areas and techniques of cryptography. This paper includes survey of cryptographic techniques in internet of things (IOT), wireless sensor networks (WSN), secure socket layer (SSL), network security and visual cryptography. This paper focus on various aspects of cryptography like confidentiality, authentication and integrity etc. Keywords - Cryptography, Internet of Things, WSN, Visual cryptography

I. INTRODUCTION To communicate a message safely to the receiver, we need cryptography. There are five pillars of the cryptography [1] as follow: a. Confidentiality: Other than intended receiver, message is useless for all. b. Authentication: The process of verifying one's identity. c. Integrity: Ensuringthat the receiver receives the same message contents as sent by the sender. d. Non-repudiation: A procedureto certain that the sender really sent the message. She can deny it later. e. Key exchange: The procedureof sharing the crypto keys between sender and receiver.

Fig. 1: Types of cryptography

a. Symmetric/Secret key: A common key is shared by the sender and the receiver. b. Asymmetric/ Public key: Keys for encryption and decryption are different. c. Hash Function: It does not have a key, as the plain text cannot be discovered from the cipher text. Processing of public key cryptography has been shown in the Fig. 2 [2].

There are mainly three types of cryptography as shown in Fig.1.

Fig. 2: Public Key Cryptography Cryptographic Techniques: in new Era 49

International Journal of Advanced Computational Engineering and Networking, ISSN(p): 2320-2106, ISSN(e): 2321-2063 Volume-6, Issue-3, Mar.-2018, http://iraj.in

Processing of private key cryptography has been shown in Fig. 3.

affected by different types of attacks and threats over the internet. Although there is no definite term for cryptography in the IOT, different definitions have been proposed by different research zones. The main problem of visual cryptography was first represented by Naor et al [6]. Visual cryptography was an exceptional secret black and white image sharing technology. But the drawback with this technology was that, the secret image could have been revealed by stacking shares in different ways. Even a person with less computational knowledge can break the encryption. Its strength was no more than a onetime Pad. Therefore many researchers worked in this area and enhanced the capability of visual cryptography.

Fig. 3: Private Key Cryptography

Has function based cryptography has been shown in Fig 4[3].These all are the traditional methods of cryptography. In recent years there is a great research and enhancement in the field of cryptography.

III. CRYPTOGRAPHIC NEW ERA

TECHNIQUES

OF

A. Internet of Things (IOT) It is a new era of technology. It is the interconnection of different computing devices through the internet. It can contain embedded systems, electronic devices, sensors and different types of soft wares. Internet connectivity provides exchange of data between these different things. Therefore we need a cryptography mechanism for secure exchange of data between IOT. Figure 5 shows the IOT[7]. Sklavos et al. have defined the models, implementation ways, confidentiality and procedures of cryptography in the IOT [8]. Security problem in TOI arises due to its large size and heterogeneity among devices. While developing security methodologies for IOT, certain points should be kept in mind like; protection of personal data, scalability and heterogeneity of IOT devices and user concealment. As IOT is mainly used in online business, transactions, information exchange, security must be the top most priority in the IOT.

Fig 4: Hash function Based

II. LITERATURE SURVEY According to CISCO reports, in coming years device related to Internet of Things (IOT) will cover the entire world [4]. IOT can be very useful in smart home automation systems [5]. IOT has drawn the attention of research community largely in recent years. IOT can be greatly affected by security and privacy issues; therefore there is a need of cryptographic techniques for the IOT. IOT can be

Fig 5: Internet of things Cryptographic Techniques: in new Era 50

International Journal of Advanced Computational Engineering and Networking, ISSN(p): 2320-2106, ISSN(e): 2321-2063 Volume-6, Issue-3, Mar.-2018, http://iraj.in

Cirani et al. have implemented IP address based security in IOT [9]. With the depletion of IPV4, the IPV6 addresses are main candidates for smart object communication in IOT. Security threats in IOT is mainly because of lightweight cryptography techniques which are adopted due to less memory requirements, but these techniques may not secure IOT from all types of attacks. The security attacks can be avoided by carefully deployment of the IOT devices, by applying cryptographic techniques at different layers like application, network and transport layers. Table 1 shows the divergence between Internet and IOT security protocols.

further contains Elliptic Curve Cryptography (ECC) [24], Pair based Cryptography (PBC) [25] and Identity Based Cryptography (IBC) [26]. D. Secure Socket Layer (SSL) The SSL and its consequence effect the web server operation. It is the most popular protocol used in the Internet for enabling secure communications through authentication, encryption, and decryption.Author in [27] have analyzed the performance of a web server under SSL protocol. CONCLUSION Secret communication is an essential in every types of applications namely in computer network. Security depends upon the protocols adopted by the network administrator. Cryptography is must for IOT, as internet can be attacked by various types of attacks. Due to the rotational nature of shares, the RVCS is better than other visual cryptography techniques. Among all cryptography techniques for WSN, Elliptic Curve Cryptography is the most popular. The unsecure SSL protocol can degrade the performance of a web server while a secure SSL; can improve it up to a great extent.

Table 1: Comparison between Security protocols at different layers

B. Visual Cryptography Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes the job of the person to decrypt via sight reading. Fig. 6 shows the visual cryptography.

REFERENCES [1] [2] [3] [4] [5]

Fig 6: Visual Cryptography

Fu et al. have proposed rotation video cryptography (RVCS) [10]. This technique is based on correlative matrices and random permutation of numbers. It can encrypt four secret images into two shares. These encrypted images can be easily decrypted by using two shares from different angles. Authors in [11] have proposed a multi secret video cryptography in which various shares reveals various secrets.

[6]

[7] [8]

[9]

C. Cryptography for Wireless Sensor Networks (WSN) The WSN [12-18] is a leading research topic in new Era. It has various application areas like [1920].Cryptography schemes are often utilized to meet the basic security requirements of confidentiality and integrity in these types of networks. However, these networks sufferfromenergy holes problem [21-23] due to unbalance energy depletion. WSN faces major security threats due to deployment of sensors in remote area and its geographical distributions. This has led the researchers to explore solution in this emerging filed. Various cryptography techniques are studied such as symmetric key and public key which

[10]

[11]

[12]

[13]

https://www.garykessler.net/library/crypto.html https://www.tutorialspoint.com/cryptography/public_key_enc ryption.htm http://ptgmedia.pearsoncmg.com/imprint_downloads/cisco/di gitalstudyguide/9780134424064/ch29.html https://www.cisco.com/c/dam/en_us/about/ac79/docs/.../IoT_ IBSG_0411FINAL.pdf E. Isa, N. Sklavos, “Smart Home Automation: GSM Security SystemDesign and Implementation”, proceedings of the 3rd Conference onElectronics and Telecommunications (PACET’15), Ioannina, Greece,May 8-9, 2015. M. Naor, A. Shamir. Visual cryptography. Advances in Cryptology-Eurocrypt’94, Lecture Notes in Computer Science, vol.950,Springer-Verlag, Berlin, pp.1-12, 1995. https://semielectronics.com/sensors-lifeblood-internet-things/ Nicolas Sklavos and I. D. Zaharakis, “Cryptography and Security in Internet of Things(IoTs): Models, Schemes, and Implementations”, New Technologies, Mobility and Security (NTMS), 2016 8th IFIP International Conference on, 21-23 Nov. 2016. Simone Cirani, Gianluigi Ferrai, “Enforcing Security Mechanisms in the IP-BasedInternet of Things: An Algorithmic Overview”, Algorithms 2013, 6, 197-226. Zhengxin Fu and Bin Yu, “Research on Rotation Visual Cryptography Scheme”, 2009 International Symposium on Information Engineering and Electronic Commerce, pp.533536. Bin Yu, Xiaohui Xu, Liguo Fang. Multi-secret Sharing Threshold Visual Cryptography Scheme. International Conference on Computational Intelligence and Security, 2007 Rohini Sharma, D.K. Lobiyal, “Dual Transmission Power and Ant Colony Optimization Based Lifespan Maximization Protocol for Sensor Networks”, International Journal of Business Data Communications and Networking, Vol. 11, Issue1, 2015, pp. 1-14. Rohini Sharma, D.K. Lobiyal, “Region Based Energy Balanced Inter-cluster communication Protocol for Sensor networks”, NCCCIP Conference Proceedings, May 2015, pp. 184-195.

Cryptographic Techniques: in new Era 51

[14]

[15]

[16]

[17]

[18]

[19]

[20]

International Journal of Advanced Computational Engineering and Networking, ISSN(p): 2320-2106, ISSN(e): 2321-2063 Volume-6, Issue-3, Mar.-2018, http://iraj.in Savita Hooda, Kirti Bhatia, Rohini Sharma, “Nodes Research Journal of Science Engineering and Technology, Deployment Strategies for Sensor Networks: An Vol. 7, Issue 2, 2017, pp. 4-11. Investigation”, International Research Journal of Engineering [21] Rohini Sharma, D.K. Lobiyal, Multi-Gateway-Based Energy and Technology (IRJET), Volume: 03 Issue: 04, April-2016, Holes Avoidance Routing Protocol for WSN, Informatics, pp. 2395 -0056. Vol. 3, Issue 2, No. 5, April 2016, pp. 1-26. Rohini Sharma, D.K. Lobiyal, “Energy based proficiency [22] Rohini Sharma, D.K. Lobiyal, Proficiency Analysis of analysis of ad-hoc routing protocols in wireless sensor AODV, DSR and TORA Ad-hoc Routing Protocols for networks”, IEEE Conference Proceedings ICACEA, March Energy Holes Problem in Wireless Sensor Networks, 2015, DOI:10.1109/ICACEA.2015.7164829 PP. 882-886. DOI:10.1016/j.procs.2015.07.380, Vol. 57, pp.1057-1066, Savita Hooda, Kirti Bhatia,Rohini Sharma, “Enrichment of August 2015. Life span of Sensor Networks through BCO and Gateway [23] Rohini Sharma, “Energy Holes Avoiding Techniques in Node”, International Journal of Research in Information Sensor Networks: A survey”, International Journal of Technology, Vol 4, issue 5, 2016, pp. 9-20. Engineering Trends and Technology, Vol. 20, no. 4, Feb Priyanka chhillar, Kirti Bhatia, Rohini sharma, “Swarm 2015, pp. 204-208. Intelligence Inspired Energy Efficient Routing Protocols for [24] Suman Bala, Gaurav Sharma and Anil K. Verma,”Optimized Sensor Networks: An Investigation”, International Research Elliptic Curve Cryptography for wireless sensor networks”, Journal of Engineering and Technology, Vol. 3 Issue 5, May Parallel Distributed and Grid Computing (PDGC), 2012 2nd 2016, pp. 623-630. IEEE International Conference, 6-8 Dec. 2012. Priyanka chhillar, Kirti Bhatia, Rohini sharma, “Spiral Based [25] Kalkundri Ravi, Rajashri Khanai and Kalkundri Sink Mobility Method Aiming Lengthening of Lifetime of Praveen,”Survey on pairing based cryptography for wireless Sensor Networks”, International Research Journal of sensor networks”, Inventive Computation Technologies Engineering and Technology, Vol. 3 Issue 5, May 2016, pp. (ICICT), International Conference, 26-27 Aug. 2016. 631-637. [26] Leonardo B. Oliveira, Ricardo Dahab, Julio Lopez, Felipe Anjali Rana, Kirti Bhatia, Rohini Sharma, “ETM: A survey Daguano and Antonio A.F. Loureiro, “Identity-Based on Energy, Thermal and Mobility Efficient Routing Protocols Encryption for Sensor Networks”, : Pervasive Computing and for Wireless Body Area Sensor Network”, International Communications Workshops, 2007. PerCom Workshops '07. Research Journal of Commerce, Arts and Science, Vol. 8, Fifth Annual IEEE International Conference, 19-23 March issue 4, June 2017, pp.26-38. 2007. Anjali Rana, Kirti Bhatia, Rohini Sharma, IIEPDR: Improved [27] Mohammed A. Alnatheer, “Secure Socket Layer (SSL) Information and Energy Proficient Data Relaying Routing Impact on Web ServerPerformance”, Journal of Advances in Protocol for Wireless Body Area Networks, International Computer Networks, Vol. 2, No. 3, September 2014, pp. 211217.



Cryptographic Techniques: in new Era 52