Document not found! Please try again

Designing Android App to Implement Encryption Algorithm ... - ijirae

2 downloads 96 Views 2MB Size Report
Designing Android App to Implement Encryption ... scientists to try and develop encryption algorithms in order to ensure that no intruder can intercept the ...
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com

Designing Android App to Implement Encryption Algorithm Using Bit-Level Column Reshuffling with Random Bit-Wise Operations ASOKE NATH

CHRISTINA MARISSA MEHTA

Department of Computer Science St. Xavier’s College (Autonomous) Kolkata, India

Department of Computer Science St. Xavier’s College(Autonomous) Kolkata, India

BARSHA MANDAL Department of Computer Science St. Xavier’s College(Autonomous) Kolkata, India

PRIYANKA SHYAMSUKHA Department of Computer Science St. Xavier’s College(Autonomous) Kolkata, India

Abstract— Data security is now a most important issue in current scenario. Due to tremendous changes in internet technologies it is now big challenge to all to protect confidential data from intruders or hackers. Hence, Data integrity, confidentiality of data and authenticity of data is imperative. Encryption is the means of protecting the data against any attacker by making the data being transmitted unreadable. Cryptography is the art of hiding data, thus making it unreadable by anyone other than the designated receiver and sender who has the key. In the present encryption algorithm the authors have developed encryption algorithm to perform various operations on the bits of the source file and shuffle the bits in a random manner. The present algorithm is developed for android mobile phone. The android application would take any file from the device memory pool and encrypt it based on the key provided by its sender. The algorithm aims to provide data security all costs for any given file by encrypting it. While doing so, it aims at providing an effective and efficient interface that is both user-friendly and easy to use. Keywords— Cipher text, Plain text, Key, Encryption, Decryption, Column Reshuffling, XOR operation, Compliment, Android Application (app), Widget I. INTRODUCTION The immense advancement in communicational technologies and the terrible boost in internet technology in the past decade has posed a major challenge for any user of these technologies to send confidential data over the network. Hence, the security of data has become a vital issue in the data communication network. Breaking a password is no longer a problem. Several software are available which can crack passwords of unknown systems and networks. Interception of confidential important data can cause the entire system to collapse. So, this intrusion problem has lead to the establishment of the concept of network security and cryptography as an emerging research area. Thus, causing computer scientists to try and develop encryption algorithms in order to ensure that no intruder can intercept the confidential message being sent across the network. This can be established by encrypting or encoding the data in the file being sent, thereby making it unreadable. Data security warrants that the data be transmitted over a secure network, the data be authentic, that the data may not only remain confidential but also remain unaltered through the transmission and data integrity be ensured. There is full verity in the fact that, today’s world is ruled by the internet because all communication takes place over the internet. Subsequently, security of confidential messages has become a major issue in data transmission. Every time we make a mobile phone call, buy something with a credit card in a shop or on the web or even withdraw cash from an ATM, encryption ensures that the particular transaction is secure by maintaining confidentiality in the system. In this scenario of the modern day and age, a need has risen, to communicate securely with people and organization we do not know personally. Hence, new and innovative algorithms are required so that they can be used for all secured transaction including confidential messages, OTP (One Time Password), ATM transactions. Data security is matter of considerable concern nowadays, especially while transmitting data across the network where it stands a great chance of getting hacked. Most data transmitted over a network, is sent in normal text language which is easy to read and understand, so it also becomes easy for the intruder to capture and read sensitive information. Encryption algorithms protect data from intruders and make sure that only the intended recipient can decode and read the information. Because of this intrusion problem now the network security and cryptography is an emerging research area now that computer scientists are trying to develop encryption algorithms so that no intruder can be intercept the encrypted message. Consequently, one can assert that cryptography is increasingly gaining popularity in the recent times. In the present work the authors have developed a bit-level columnar transposition method along with several bit level operations which may useful for encrypting data from one android mobile phone to another mobile phone. _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF:3.361 (2015 – New) | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -1

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com The key must be known to both sender side and also at the receiver side. The present method may used to send SMS, password and confidential message from mobile to mobile phone. II.

ALGORITHMS

1. KEY GENERATION ALGORITHM – FLOWCHART

Figure 1 : Flowchart for key generation process

Figure 2 : Flowchart for the key generation process(contd)

2. ENCRYPTION FLOWCHART

Figure 3 : Flowchart for Encryption Process Figure 4 :Flowchart for Encryption Process(contd) _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: 3.361 (2015 – New) | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -2

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com

Figure 5 : Flowchart for Encryption Process (contd.)

Figure 6 : Flowchart for Encryption Process (contd.)

3. DECRYPTION FLOWCHART

Figure 7 : Flowchart for Decryption Process

Figure 8 : Flowchart for Decryption Process (contd.)

_________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: 3.361 (2015 – New) | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -3

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com

Figure 9 : Flowchart for Decryption Process (contd.) III.

Figure 10 : Flowchart for Decryption Process (contd.)

RESULTS AND DISCUSSION

1. Test Reports The proposed method applied on various trivial known plain texts and the output found quite satisfactory. The present method tested on tested on various types of files such as .txt, .doc, .pdf , .wav, .jpg any many more. The effectiveness of the algorithm can be ascertained, by checking the corresponding output ciphers produced for given similar input. If the output ciphers are completely different and can by no means be associated to each other, it leads to a confirmation of the efficiency of the given algorithm.

_________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: 3.361 (2015 – New) | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -4

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com

Figure 11 : The cipher texts produced for even the above similar plain texts are completely different The following graphs would indicate the range of values in bytes (ASCII) that are produced as a result of the corresponding ASCII value given as input 65 times. ASCII 0:

ASCII 1:

300 250 200 150

Series1

100

Series2

50 0 1 8 15 22 29 36 43 50 57 64

Figure 12 : The range of value obtained for ASCII '0' (LEFT) and ASCII ‘1’ (RIGHT) in the input text 65 times ASCII 2:

ASCII 3:

300 250 200 150

Series1

100

Series2

50 0 1 7 131925313743495561

Figure 13 : The range of value obtained for ASCII '2' (LEFT) and ASCII ‘3’ (RIGHT) in the input text 65 times ASCII 4:

Figure 14 : The range of value obtained for ASCII '4' in the input text 65 times _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: 3.361 (2015 – New) | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -5

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com If Different keys used for encryption and Decryption does not produce the original plain text in the receiver end. As shown below:

Figure 135 : Screenshot to show the output if different keys are used in the encryption and decryption process If any one character of the cipher text is changed the original plain text is not produced. For example say the last character of the cipher text is changed to ‘V’ as shown below:

Figure 16 : Screenshot to show the output if even one character is changed in the cipher text the plain text isn't obtained 2. User Documentation The android application (app) has been designed with the aim to make encryption of any file more user-friendly, efficient and effective, which also providing impeccable security to data and providing no hints whatsoever of the contents of the original data. The design and working of the android application (app) is as follows: INPUT:

Figure 147 : The input text WORKING AND DESIGN OF THE INTERFACE: The closed lock stands for encryption and the open lock for decryption. These buttons would lead us to the desire encryption process or decryption process widget.

_________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: 3.361 (2015 – New) | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -6

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com

Figure 15 : Screenshot of the first activity in the app The basic layout of the widget for encryption has been given below:

Figure 19 : The layout of the Encryption Process in the android application After the inputs are given the encrypt button can be clicked and encryption process can start. It must be borne in the mind that, 1. The input or source file must be present in the device memory pool. 2. One cannot start the process unless all inputs are provided. 3. One cannot send an email until the encryption process is complete.

Figure 160 : (a) Screenshot after the user has entered the inputs for the Encryption Process. (b)After the Encryption Process is complete. (c) Screenshot of the working of the app – sending the result to the receiver via mail client. _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: 3.361 (2015 – New) | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -7

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com

Figure 21: Screenshot of the working of the app – sending the result to the receiver via mail client.

Figure 22: Screenshot of the design working of the decryption process in the app. (b) Screenshot - after the completion of the Decrytion Process CIPHER TEXT :

PLAIN TEXT PRODUCED :

Figure 217 : (a) Screenshot of the corresponding cipher text produced by the android application. (b) Screenshot of the corresponding plain text produced by the android application. IV. CONCLUSION AND FUTURE SCOPE The proposed system has been tried and tested for several inputs and test cases and proves to be very secure. The results, post the execution of so many test cases, shows that this algorithm is too hard to break by using any kind of brute force attack. _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: 3.361 (2015 – New) | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -8

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 05, Volume 3 (May 2016) www.ijirae.com The algorithm has been operated upon several know texts where the same character repeats itself for a number of times and one can deduce that, after encryption there is no repetition of pattern in the output file, making it very difficult to crack the algorithm to obtain the plain text or secret message. A series of experiments using various known text files have been performed and the result have proven the efficiency of the algorithm as well as the android application. The merit of this method is that it is almost impossible to break the encryption algorithm without knowing the exact key. One can refer that, the given encryption methodology can be applied for data encryption and decryption in corporate sectors, bank transaction etc for sending confidential data. The future scope of this project is – a) To embed the key within the cipher text and send to the receiver end. b) To increase the degree of randomisation in order to make it more secure. ACKNOWLEDGMENT The authors are grateful to the Computer Science Department of St. Xavier’s College (Autonomous), Kolkata for giving them opportunity to do project. The authors are also grateful to Rev. Fr. Dr. Felix Raj , Principal of St. Xavier’s College (Autonomous), Kolkata for this scientific research.

[1] [2] [3] [4] [5] [6] [7]

REFERENCES DATA SECURITY BY ATUL KAHATE Cryptography – Wikipedia Encryption and device networking pdf Cryptography – LinkedIn.com Text box and Third Party Software- Wikipedia Bit Level Encryption Standard (Version-II) :Published in: Information and Communication Technologies (WICT), 2012 World Congress. ISBN: 978-1-4673-4806-5 Network Security and Cryptography- slideshare.net

[8] Cryptography and Network Security by William Stallings [9] Cryptography – Wikipedia [10] www.researchgate.net/publication/258651788_Ultra_Encryption_Standard_UES_Version IV_New_Symmetric key_Cryptosystem_with_bit-slevel_columnar_Transposition_and_Reshuffling_of_bits [11] www.researchgate.net/publication/285435895_Bit_Level_Symmetric_Key_Encryption_Algorithm_BLSKEA 1_Version-1

_________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: 3.361 (2015 – New) | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -9