Security Model for the MCTO Data Transaction

2 downloads 0 Views 256KB Size Report
Jun 20, 2008 - Key words: Data network security, Data transmission security, Hybrid ... been resolved some solutions in the other data transaction models and ...
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008

140

Security Model for the MCTO Data Transaction Management Ziyad Tariq Abdul-Mehdi, Byambasuren Byamba and Mohammad M. N. Hamarsheh Faculty of Information Science and Technology, Multimedia University, Melaka, Malaysia

Abstract In this paper work is related with security model for the Multi Check-out Timestamp Order (MCTO) data transaction. By research, weakness of the MCTO is determined and considered as security risk involved with data transmission over the wireless network. Since the research focused on this vulnerability, it has explored regarding with a suitable security transmission management system to the MCTO data transaction. During the research, a fully secure transmission model is found and designed. This paper discuss about the security model, which is based on a hybrid cryptography system, is used to encrypt and decrypt data for the security transmission between Base Station (BS) and Mobile Host (MH)for the MCTO model. Key words: Data network security, Data transmission security, Hybrid cryptography, Authentication, Comparison

1. Introduction Data security is one of the most important issues for modern information technology. Recently a several research papers concentrated on the security database that involved with data transmission. The published articles discussed about data transaction security management in the distributed database that has not solved yet. In previous study of this research, four data transaction models were covered and discussed. The MCTO model [1, 2, 3], which is one of the four data transaction models, has been resolved some solutions in the other data transaction models and has gained less problem. The main idea of this model is that transaction execution can be done at the BS and MH(s). The main advantages of this model are recovered all the transactions management models from other three models and good data allocation management. These cases influenced that the MCTO is selected from the four models and developed for the further secure data transaction model. However the model resolved some problems, the model still has weakness. The major weakness of the MCTO model is that data transaction over the wireless network is performed without security.

Manuscript received June 5, 2008. Manuscript revised June 20, 2008.

This unsafe condition makes vulnerability to the MCTO model. The vulnerability is showed in the figure 1. BS Insecure data transaction

None secure mechanism over the wireless data transaction

MH1 MH2 MH: Mobile Host Data transaction in Wireless network

BS: Base Station

Fig. 1 Insecure transmission for the MCTO data transaction

After the MCTO function at the BS allocates portion of the data to the MH, the data is transferred from the BS to the MH though the wireless network without security. It is also same at opposite data transaction. The data at the MH is transferred to the BS through the insecure wireless channel. This insecure data transaction of the MCTO makes unsafe condition in the system. When the unsafe condition in the model, it always keep easy possibilities to the hackers and attackers to damage, delete and steal the data. During the research, fundamental knowledge and understanding of security and cryptography [4, 5, 6,…, 25] are taken and studied previously. This research explored a suitable security model over transmission of the MCTO data transaction and built strong security data transmission channel by using cryptographic model.

2. Motivation 2.1 Proper security model: Cryptography In most cases, the security of information technology focused on the cryptography that encrypt plain data and decrypt the encrypted data for protecting data against attacks, any malicious actions and other kind of dangers. This research has started to explore a proper security model to the insecure data transaction of the MCTO since the vulnerability determined. During the research, a fully secure transmission model is found and designed.

IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008

The security model, which is a hybrid cryptography system, is consisted of encryption and decryption model with authentication system. The encryption model is used to encrypt data before it is transferred, and the decryption model is used to decrypt the encrypted data after it is received. The authentication model assumes the MH connection to the BS. The encryption and decryption models with authentication model are combined together as single set application that is worked at both the BS and MH(s) as shown in figure 2.

141

protocol that is used to establish key encryption key (shared secret key). The authentication model is used to approve correctness of the MH connection between BS and MH. Figure 3 shows general structure of the encryption model that includes data encryption model and key encryption model which consists of key encryption model, key exchange protocol and authentication model. Question & Answer

Authentication model Start command

BS Encrypted data flow

Enc Dec

MH1

256 bit 3 rounds

Encrypted data flow

Key Generator

Data

Input

MH2 Data transaction in wireless network

Enc: Encryption model Dec: Decryption model

Output

256 bit

256 bit

256 bit Enc Dec

Key exchange model

Key

Data Encryption model

4 rounds

Enc Dec

Key Encryption model 256 bit Send it decryption

Encrypted data and Encrypted key

Wireless data communication

Data Encryption Model

With wire data communication

Key Encryption Model

Fig. 2 Secure data transmission for the MCTO Fig. 3 Internal structure of the encryption model

Every data transaction between the BS and MH is encrypted by encryption model before the data is transferred, and after the encrypted data is received, it is decrypted by decryption model. Before the data transaction between the BS and MH is operated, the MH connection to the BS is assured by the authentication model. The authentication model assumes that the MH verification is correct or not. Once the connection is accepted, the MH is approved to operate the data transaction.

2.2 Internal architecture of the security model The encryption model, which is a hybrid key cryptography, consists of the data encryption model and key encryption model. The data encryption model, which is symmetric key encryption cipher and consists of the data encryption functions and a key generator, is used to encrypt data. The encryption functions, which are collection of conversion, expansion, inversion and three rounds with Inverse, Shift and Substitution operations, is used to encrypt data. The key generator, which is a function that generates random key, supports generating key to the Inversion operations. The key encryption model, which is hybrid key encryption cipher and consists of key encryption functions and key exchange protocol with an authentication model, is used to encrypt key (symmetric key) of the data encryption model. The key encryption functions are collection of the inverse shift and substitute operation with 4 rounds. The key exchange protocol is Diffie Hellman key exchange

When the MH connects to the BS, the authentication model at the BS checks the connection of the MH and approves the MH as hand off or hand on. If the MH approved as hand on then it can be received data from the BS. Otherwise the BS rejects the MH connection as hand off. The MCTO model has own data allocation function that allocates portion of the data to the MH, which connected and wanted data with hand off (disconnection). The function supports input data to the data encryption model. The data allocation function is shown in function 1 ⎢ (( AV + (ε ∗ r )) ∗ d ) ⎥ ⎥ ni + mi ⎣ ⎦

δ i = f (ni , mi ) = ⎢

(1)

Where, ni = number of new mobile hosts that wants hand off with data; mi = the number of previous MH wanted hand off with data; r = reconnection number; d = current data at the BS; AV= average and usually form 0 to 1 the average equal to 0.5; ε is a smallest increments number for MH who multi visited BS. Once the MCTO function calculates the portion of the data to the MH(s), the portion of the data is encrypted by encryption model and transferred to the MH.

IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008

142

Data

Data Encrypted data flow through the wireless network

Encrypted Model

Encrypted Data

Encrypted Data

Decryption Model

After the encrypted update data is received at the BS, it is decrypted by decryption model. The decryption process is same with the decryption at the MH. The decrypted update data is re executed at the BS and update to the master data by MCTO function 2. d = d − (update.data − δ i )

Fig. 4 Internal structure of the encryption model

When the encrypted data is received at the MH, it is decrypted by decryption model. The decryption model is consisted of the data decryption and key decryption models. The data encryption model is collection of the inverse, shift and substitution operations. The key encryption is consisted of key encryption model and key exchange protocol with authentication model as shown in figure 4. Question & Answer

Authentication model

Receive it from encryption

Encrypted key 4 rounds

3 rounds

Encrypted data 256 bit

Data Decryption model

Key exchange model

Key Decryption model 256 bit

Data

Output

Wireless data communication

Data Encryption Model

With wire data communication

Key Encryption Model

Fig. 4 Internal structure of the decryption model

After decryption, the decrypted data at the MH can be executed. The execution update (update data) at the MH is encrypted by encryption model before it is transferred back to the BS. The update data encryption process at the MH is same with data encryption at the BS. After the encryption, the encrypted data at the MH is transferred to the BS as shown in figure below.

BS Enc Dec

Encrypted data flow

Encrypted data flow

Enc Dec

MH1

Enc Dec

MH2 Data transaction in wireless network

If the update data at the MH was requested more than balance at the MH then it would be a requested data and it is encrypted with update data by encryption model and transferred to the BS. Once encrypted data is received at the BS, the requested data with update data is decrypted by decryption model, and update data is updated to the master data at BS firstly by function 3. After that requested data is updated. If only requested data is received at the BS, the requested data is updated directly to the master at BS by MCTO function 3.

Start command

Encrypted data and Encrypted key Input

(2)

Enc: Encryption model Dec: Decryption model

Fig. 5 Encrypted data flow to the BS

d = d − requested .data

(3) Update notification is sent to the MH after update and requested data is done. If the master data at the BS is not enough to the requested data then the BS send abort message to the MH else the BS sends a successful message to the MH.

2.3 Design and structure of the security model The security model, which is hybrid cryptography, is consisted of encryption model and decryption model. The encryption model includes data encryption model and key encryption model. The data encryption model contains data encryption functions and key generator as shown in figure below.

IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008

2 and 2 takes a reminder as “0”. The 2 is divided by 2, and 1 is takes a reminder “1”. The 1 is divided by 2, and 0 is takes a reminder “0”. After division reach to the 0, the reminders from initial reminder to last reminder can express a value of 150 in 32 bits binary as shown in figure 7.

Input

Start

/Decimal/

Data Conversion & Separation

Key Generator Key Encryption Model

Key Expansion

Round 1

Inversion

Round 2

Conversion (decimal to binary 32 bits)

Shift

Input Data = 150 150/2=75 75/2=37 37/2=18 18/2=9 9/2=4 4/2=2 2/2=1

kvi,1

Substitution Shift Inversion

Round 3

kvi,0

In the separation operation, the converted 32 bits are separated to the 4 eight bits (V1, V2, V3, V4) as shown separation part in figure 7.

Substitution

Inversion

Encryption functions

143

kvi,2

Remainder 0 1 1 0 1 0 0 1

Output 000 0 00 000 00 00 0 00 00 0 00 00 0 10 010 11 0

Substitution Shift Inversion

kvi,3

Separation (4 eight bits)

/Binary/

Output

32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10

9

8

7

6

5

4

3

2

1

0 000 00 000 00 000 000 00 000 00 1 00 101 10

Encrypted Data

32 31 30 29 28 27 26 25

24 23 22 21 20 19

00 000 000

000 00 000

0 00 000 00

1 001 011 0

V4

V3

V2

V1

End

18 17

16 15 14 13 12 11 10 9

8

7

6

5

4

3

2

1

Fig. 6 Data encryption model Fig. 7 Conversion and separation operations

In the expansion operation, input Vi byte (eight bits) is extended to 4 bytes (four separated eight bits). After that, each of them is duplicated 7 times down as shown in figure below. They are 28 bytes, and initial 4 bytes are added to the 28 bytes then they all become 32 bytes Vi,32 (256 bits). Expansion (1 bytes to 32 bytes)

2.3.1 Operation in the data encryption functions

V1,1

1 1 1 1 0 0 0 0

V1,2

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1V

0 0 0 0 1 1 1 1V

1,26

1 1 1 1 0 0 0 0

V1,3

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1V

0 0 0 0 1 1 1 1V

1,27

1 1 1 1 0 0 0 0

V1,4

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1V

0 0 0 0 1 1 1 1V

1,28

1 1 1 1 0 0 0 0

V1,5

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1V

0 0 0 0 1 1 1 1V

1,29

1 1 1 1 0 0 0 0

V1,6

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1V

0 0 0 0 1 1 1 1V

1,30

1 1 1 1 0 0 0 0

V1,7

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1V

0 0 0 0 1 1 1 1V

1,31

1 1 1 1 0 0 0 0

V1,8

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1V

0 0 0 0 1 1 1 1V

1,32

1 1 1 1 0 0 0 0

V1,17

1,10

1,11

1,12

1,13

1,14

1,15

1,16

0 0 0 0 1 1 1 1

V1,25

1,18

1,19

1,20

1,21

1,22

1,23

1,24

1 1 1 1 0 0 0 0 Duplica

0 0 0 0 1 1 1 1

Duplica

V1,9

Duplica

Initial 4 7 duplications

The Conversion operation in the data encryption model is used to convert number (0 ÷ 4294967295) in the decimal data to binary data in 32 bits by a using conversion technique as shown conversion part in figure 7. The conversion method is based on the division of 2. Each division result takes a reminder as “0” or “1”. The reminder is given from an initial number until to the reminder value is reach to “0”. If dividing number is even, the reminder takes “0”. If the number is odd then reminder takes “1”. For example, an initial input data is 150 then initial value is even number and takes reminder as “0”. After a reminder, the number is divided by 2. Divided result is equal with 75, and it takes a reminder as “1”. The 75 is divided by 2, and the 37 takes a reminder “1”. The 37 divided by 2, and 18 takes a reminder as “0”. The 18 is divided by 2, and 9 takes a reminder 1. The 9 is divided by 2 and 4 takes a reminder 0. The 4 is divided by

V1 8 7 6 5 4 3 2 1 0 0 1 0 1 1 0

Duplica t

The data encryption functions, which are used to encrypt data, include Conversion, Separation, Expansion, Inversion operations with three rounds; each round consists of Substitute, Shift and Inverse operations as shown in Figure 6. The key generator, which is a function in java, generates key data in 8 bits randomly.

Fig. 8 Expansion operation in the data encryption model

IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008

144

The inverse operation is combination of the input data Vi,j and encryption key (kvi,j,m) by XOR operation as shown in figure 4.9. The XOR is mathematical operation and is used to inverse digits of the input data, stands for Exclusive-Or. The simple calculation of the XOR operation: /1⊗1=0; 1⊗0=1; 0⊗1=1; 0⊗0=0/.

Shift operation 1

Input Vi, j=

2 3

4

5

6 7

8

0 0 0 1 0 0 0 0 1

2 3

4 5

6 7 8

0 0 0 1 0 0 0 0

Shifting

4

Output bi, j=

5 6

7 8 1 2

3

1 0 0 0 0 0 0 0

Inverse operation Input Data

Vi, j =

1 1 1 1 0 0 0 0

XOR

⊗⊗⊗⊗⊗⊗⊗⊗

Key kvi, j, m =

1 0 0 0 1 1 0 0

Fig. 11 Shift operation in the data encryption model

Inverse operation

⇓ ⇓ ⇓ ⇓ ⇓ ⇓ ⇓ ⇓ Output Data

bi, j =

0 1 1 1 1 1 0 0

Result

Fig. 9 Inversion operation in the data encryption model

For instance, input data Vi,j=10010110 is combined with a key kvi,j,m =01110011 by the XOR operation. The result is bi,j = 01111100. The Substitution operation operates that input data Vi, j is substituted to another output data bi, j by a using S-Table as shown in figure 10. The S-table (a. k. a S-box), which is Rijndael substitution table, is used to substitute one byte to another one byte. The table was specially designed to resistant to linear and differential attack. For example, Input data Vi, j = 00011110 then output data bi, j = 01110010 as shown in Figure 10. Note: “Vi, j” is input data and “bi, j” is output data. The output data bi, j is equal with the input data Vi, j in next operation. Then Shift operation in second round is committed after the substitution in the round. Column =12 Substitution table (S-table)

First 4 digits

0 1 2

Last 4 digits

Input Vi, j = 0 1 1 1 1 1 0 0 Row =7 0 1 1 1 Output /Decimal/

⇓ Row =7

1 1 0 0 ⇓ Column =12

Output bi,j = 0 0 0 1 0 0 0 0

3 4 5 6 7 8 9 10 11 12 13 14 15

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

10

Row =7 and Column =12 then entry is 10, which is 00010000 in binary

Fig. 10 Substitution operation in the data encryption model

The Shift operation performs that ever digit in the input data Vi, j is shifted cyclically to the left side by 3 digits as shown in Figure 11.

The inversion operation in each round is same with previous an inversion operation. The Inversion operation is used that an input data Vi, j is combined with a key data kvi, j, m to another output data bi, j by XOR operation as shown in Figure 12. The key kvi, j, m is generated randomly in 8 bit binary by a using key generator. Inverse operation Input Data

Vi, j =

1 0 0 0 0 0 0 0

XOR

⊗⊗⊗⊗⊗⊗⊗⊗

Key kvi, j, m =

1 0 0 1 1 1 1 0

Inverse operation

⇓ ⇓ ⇓ ⇓ ⇓ ⇓ ⇓ ⇓ Output Data

bi, j =

0 0 0 1 1 1 1 0

Result

Fig. 12 Inverse operation in the data encryption model

The XOR, which is mathematical operation, stands for Exclusive-Or and is used to inverse digits of the input data. The simple calculation of the XOR operation: /1⊗1=0; 1⊗0=1; 0⊗1=1; 0⊗0=0/.

IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008

145

Authentication model for MH

The key encryption model includes key encryption functions, key exchange protocol, key extension section and authentication model.

Mobile Host (MH)

Base Station (BS)

Key Encryption Model

Key

Key sets kvi

Key Encryption functions

Input kv2 =128 bytes

Round 2 Round 3

Inversion

Round 4

Round 1

Shift

Inversion

Inversion

Process to answer the Life Questions

Key Exchange A, (g, p)

Answers of the Life Questions

Diffie Hellman Shared secret key

Data Encryption Key kv1, k v2, kv3, kv4 (512 bytes)

kv1 =128 bytes

Inversion

Series of the Life Questions

Encrypted answers through the insecure line Encrypt

Decrypt

Answer the Life Questions

B

kv4 =128 bytes kv3 =128 bytes

Questions through the insecure line

Series of the Life Questions

Authentication model

128

Key Extension Conversion & Separation

ski in decimal to binary (32 bits) &

Expansion 4 bytes to 32 bytes ski=128 bytes

(4 separated eight bits) Each 8 bits is expanded to the 256 bits(32 bytes)

Check the Answers

True Connection is approved and start Diffie Hellman

4 separated eight bits (a, b, c, d)

False Connection is denied

True: answers are all correct False: Any single answer is wrong

Fig. 14 Life question based authentication model

512

Users are presented with "life questions" for which the answers are theoretically known only by them. Such questions generally involve personal characteristics and preferences, life events or transactional facts. The Life Questions, which are serial of the questions, are selected tightly related with user’s personal data.

Shift 128

Shift 128

Shift 128

List of the simple serial Life Questions: Encrypted Key ekv1, ekv2, ekv3, ekv4

Output

Encrypted Key ekv1, ekv2, ekv3, ekv4

512 bytes

a. b.

Key Decryption Model

c.

Fig. 13 Structure of the key encryption model

The key encryptions include four rounds. Each round contains Shift and Inversion operations. The shift and inverse operations are same with previous shift and inverse operations as shown in figure 11 and in figure 12. The key exchange protocol is based on the Diffie Hellman (D-H) that is used to establish shared secret key between the BS and the MH. Simple D-H key exchange protocol does not support any authentication or verification. Therefore D-H is vulnerable to the man in the middle attack. There are many possible solutions on the authentication of the DH that may use digital signatures, the password based, cryptographic tokens, keys, biometrics and other cryptographic protocols. In this model, one of classic authentication methods, which involves the “human aspect” of authentication, is involved and implemented as using “life questions” or users to vouch for one another. The Life Question that authentication is a form of user verification that exploits personal data to validate identities, and process of the authentication is followed as shown in Figure 14. This life question authentication is related with the password based authentication model.

What is your mother name? What was your first teacher’s name of elementary school? What make was your first car or bike?

Most web users are familiar with c and b questions. However the design of a highly usable, the secure authentication system based on life questions is not easy. Once the connection of the MH is accepted, the D-H is started to establish a shared secret key that is exchanged from the BS to the MH. For example, the BS selects two prime numbers g and p (g=13, p=97) and chooses an own secret number “a” (a=23) randomly, while calculate it as ga mod p (1323 mod 97 = 39). After that, the BS transfers the result “39” only with g and p to the MH. Base Station (BS)

1

2

5

Diffie Hellman Key exchange model

Select prime numbers g and p (13, 97) randomly Choose own secret number “a” (a=23) randomly a 23 Calculate g mod p (13 mod 97 =39) Send “39” and g, p (13, 97) Receives “53” from the MH. Calculate shared secret key ski 23 =(53 mod 97) = 86

Mobile Host (MH)

Send 39, (13, 97)

Send “53”

Receive the numbers “39” and g, p (13, 97) Choose own secret number “b” (b=58) randomly Calculate a shared secret key ski as 58 39 mod 97 =86 58 Calculate 13 mod 97=53 and Send result “53”

Fig. 15 Key exchange process by D-H

3 4

IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008

The MH receives the sending numbers “39”, g, p (g=13, p=97) and agree with the numbers. The MH also chooses own secret number “b” (b=58) randomly and calculates their shared secret key ski as 3958 mod 97= 86. After that calculation, the MH calculates gb mod p as 1358 mod 97 = 53 and send result “53” only to the BS. Now, the BS receives the result “53” and calculates a shared secret key ski as 5323 mod 97 = 86. After the shared secret key is established, the key is extended into extension part. Shared secret key

After the shared secret key is extended, the key is transferred to the Inversion operation in the key encryption model. The data decryption model, which is used to decrypt the encrypted data and encrypted key, consists of the data decryption model and key decryption model as shown in figure 18. Question & Answer Receive it from encryption

Key Extension

Conversion & Separation

ski in decimal to binary (32 bits) &

Expansion 4 bytes to 32 bytes ski=128 bytes

(4 separated eight bits) Each 8 bits is expanded to the 256 bits(32 bytes)

Authentication model

4 separated eight bits (a, b, c, d)

Start command

Encrypted data and Encrypted key Input

Encrypted data

Encrypted key

3 rounds

256 bit

512

4 rounds

146

Data Decryption model

Key exchange model

Key Decryption model 256 bit

Extended Shared Secret k k

Data

Output

Fig. 16 Key extension in the key encryption model

The key extension part consists of three operations: conversion, separation and expansion. The operations are used to extend a shared secret key ski 32 bits to 1024 bits (128 bytes) and provide the extended keys to the key encryption functions. Figure below shows the extension process. Start

Diffie Hellman

Input

Wireless data communication

Data Decryption Model

With wire data communication

Key Decryption Model

Fig. 18 Decryption model

The data decryption model is used to decrypt the encrypted data when it is received from the encryption. The data decryption model consists of data decryption functions that include Inverse, Reduction, integration, conversion operation and 3 rounds as shown figure 19.

Shared secret key

ski = 2934120234

Start

32 31 30 29 28 27 26 25 24 23 22 21 20 19 18

17 16 15 14 13

12 11 10

9

8

7

6

5

4

3

2 1

Encrypted Data ev1, ev2, ev3, ev4

1 0 1 0 1 1 1 0 1 1 1 0 0 0 1 1 0 0 0 1 1 1 1 1 0 0 1 0 1 0 1 0

Input

Conversion Decimal to Binary in 32 bits /Binary/

Separation 32 bits to (4 eight bits) & Expansion (4 bytes to 32 bytes) 24

1 1 1 1 1 1 1

0 0 0 0 0 0 0

1 1 1 1 1 1 1

23 22 21 20 19

18 17

16 15 14 13 12

1 1 1 0 0 0 1 1

Duplicate 7 times

Duplicate 7 times

0 0 0 0 0 0 0

1 1 1 1 1 1 1

1 1 1 1 1 1 1

1 1 1 1 1 1 1

0 0 0 0 0 0 0

1 1 1 1 1 1 1

1 1 1 1 1 1 1

1 1 1 1 1 1 1

0 0 0 0 0 0 0

0 0 0 0 0 0 0

00 00 00 00 00 00 00 00

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0

1 1 1 1 1 1 1

1 1 1 1 1 1 1

11 10

9

8

7

6

5

4

3

2 1

0 0 0 1 1 1 1 1

0 0 1 0 1 0 1 0

Duplicate 7 times

Duplicate 7 times

0 0 0 0 0 0 0

0 0 0 0 0 0 0

0 0 0 0 0 0 0

1 1 1 1 1 1 1

1 1 1 1 1 1 1

1 1 1 1 1 1 1

1 1 1 1 1 1 1

1 1 1 1 1 1 1

0 0 0 0 0 0 0

0 0 0 0 0 0 0

1 1 1 1 1 1 1

01 01 01 01 01 01 01 01

11 11 11 11 11 11 11 11

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0

kvi,3 (kvi,3,1 kvi,3,2…kvi,3,32)

Inversion Inverse Shift

1 1 1 1 1 1 1

0 0 0 0 0 0 0

1 1 1 1 1 1 1

0 0 0 0 0 0 0

Round 1

28 27 26 25

1 0 1 0 1 1 1 0

Inverse Substitution kvi,2 (kvi,2,1 kvi,2,2…kvi,2,32)

Inversion Inverse Shift

Round 2

32 31 30 29

Inverse Substitution kvi,1 (kvi,1,1 kvi,1,2…kvi,1,32)

10 10 10 10 10 10 10 10

11 11 11 11 11 11 11 11

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1

00 00 00 00 00 00 00 00

0 0 0 0 0 0 0 0

1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

01 01 01 01 01 01 01 01

1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1

11 11 11 11 11 11 11 11

0 0 0 0 0 0 0 0

10 10 10 10 10 10 10 10

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

2

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

10 10 10 10 10 10 10 10

1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1

10 10 10 10 10 10 10 10

11 11 11 11 11 11 11 11

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

00 00 00 00 00 00 00 00

1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

1 1 1 1 1 1 1 1

00 00 00 00 00 00 00 00

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

10 10 10 10 10 10 10 10

1 1 1 1 1 1 1 1

Inverse Shift

0 0 0 0 0 0 0 0

Inverse Substitution kvi,0 (kvi,0,1 kvi,0,2…kvi,0,32)

1 1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

10 10 10 10 10 10 10 10

11 11 11 11 11 11 11 11

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1

Replicated 32 1 1 1 1 1 1 1 1

00 00 00 00 00 00 00 00

0 0 0 0 0 0 0 0

1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1

Inversion

3

Replicated 32 0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

01 01 01 01 01 01 01 01

1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1

11 11 11 11 11 11 11 11

00 00 00 00 00 00 00 00

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

10 10 10 10 10 10 10 10

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

10 10 10 10 10 10 10 10

1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1

10 10 10 10 10 10 10 10

11 11 11 11 11 11 11 11

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

00 00 00 00 00 00 00 00

1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

01 01 01 01 01 01 01 01

11 11 11 11 11 11 11 11

1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1

00 00 00 00 00 00 00 00

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

10 10 10 10 10 10 10 10

1 1 1 1 1 1 1 1

0 0 0 0 0 0 0 0

Key Decryption Model

Reduction Integration & Conversion

δi=150

Fig. 17 Shred secret key extension in the key encryption model

Output

0 0 0 0 0 0 0 0

Inversion

Replicated 32

Initial 32 1 1 1 1 1 1 1 1

Round 3

Replication 32 bytes to 128 bytes

End

Fig. 19 Data decryption model

/Decimal/

IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008

1

1

1

1

0

1

0

⊗ ⊗ ⊗ ⊗ ⊗ ⊗ ⊗ ⊗

XOR

0

Key kvi, 1, m =

0

1

0

1

1

0

Inversion operation

0

⇓ ⇓ ⇓ ⇓ ⇓ ⇓ ⇓ ⇓ Output Data

Next operation

1

bi, j =

1

0

1

0

1

1

0

Result

Fig. 20 Inverse operation in the decryption model

The Shift operation in the decryption model performs that each digit in the input data evi,1 is rotated to the right by 3 digits. For example, each digits of input data evi,1=11010110 from previous inversion operation is shifted cyclically to right by 3 digits then output data is bi, 1=11011010 as shown in figure below. Shift operation 1 2

Input

evi,1=

4

5

6

7

8

1 2

3

4

5

6

7

8

1 1 0 1 0 1 1 0

Shifting

6

Output

3

1 1 0 1 0 1 1 0

bi, 1=

7

8

1

2

3

4

5

The Substitution in the data decryption model operates that input data evi,1 is substituted to the output data bi, 1 by a using Inverse Substitution table (Inv. S-table). For example, input data evi,1 =11011010 is substituted to the output data bi, 1=01111010 as shown in Figure 4.31.

⇓ Column =10 Row =13

Output bi, 1= 0 1 1 1 1 0 1 0

54 7B 94 32 A6 C2 23 3D EE 4C 95 0B 42 FA C3 4E 08 2E A1 66 28 D9 24 B2 76 5B A2 49 6D 8B D1 25 72 F8 F6 64 86 68 98 16 D4 A4 5C CC 5D 65 B6 92 6C 70 48 50 FD ED B9 DA 5E 15 46 57 A7 8D 9D 84 90 D8 AB 00 8C BC D3 0A F7 E4 58 05 B8 B3 45 06 D0 2C 1E 8F CA 3F 0F 02 C1 AF BD 03 01 13 8A 6B 3A 91 11 41 4F 67 DC EA 98 F2 CF CE F0 B4 E6 73 96 AC 74 22 E7 AD 35 85 E2 F9 37 E8 1C 75 DF 6E 47 F1 1A 71 1D 29 C5 89 6F B7 62 0E AA 18 BE 1B

7A

FC 56 3E 4B C6 D2 79 20 9A DB C0 FE 78 CD 5A F4 1F DD A8 33 88 07 C7 31 B1 12 10 59 27 80 EC 5F 60 51 7F A9 19 B5 4A 0D 2D E5 7A 9F 93 C9 9C EF A0 E0 3B 4D AE 2A F5 B0 C8 EB BB 3C 83 53 99 61 17 2B 04 E7 BA 77 D6 26 E1 69 14 63 55 21 0C 7D

Row =13 and Column =10 then entry is 7A, which is 01111010 in binary

Fig. 22 Inverse Substitution in the data decryption model

Single inverse operation out of the round is same with inverse operation inside round. Main purpose of this inverse is to make re-inverse operation and back confusion of the encrypting data. The Reduction operates double operations: reduction operation and rejoining operation. The operations are that each evi , which includes 32 bytes (evi, 1, evi, 2, evi, 3, …, evi, 32),of the separated data (ev1, ev2, ev3, ev4) is reduced from 32 bytes to the initial 4 eight bytes (v1, v2, v3 v4), and the initial 4 eight bytes (v1, v2, v3 v4) are rejoined to the single byte as shown in the figure 23. For example, under the evi, there are related 32 bytes (evi, 1, evi, 2, evi, 3,…, evi, 32), and every byte inside the (evi, 2 to evi, 8) is combined to the evi, 1 byte. Next every byte inside the (evi, 10 to evi, 16) is combined to the evi, 9 byte. Another every byte inside the (evi, 18 to evi, 24) is combined to the evi, 17 byte. Last every byte inside the (evi, 26 to evi, 32) is combined to the evi, 25. Then every combined byte (evi, 1, evi, 9, evi, 17, evi, 25,) are rejoined to the single byte Vi (8 bits) as figure below. Reduction and Rejoin (32 bytes to 4 bytes)

1 1 0 1 1 0 1 0

Fig. 21 Shift in the data decryption model

1 0 1 0

⇓ Output Row =13 /Decim

7 reductions

Key decryption model

1

1 1 0 1

52 09 6A D5 30 36 A5 38 BF 40 A3 9E 81 F3 D7 FB 7C E3 39 82 9B 2F FF 87 34 8E 43 44 C4 DE E9 CB

V1,8

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1

V1,24

0 0 0 0 1 1 1 1V

1 1 1 1 0 0 0 0

V1,7

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1

V1,23

0 0 0 0 1 1 1 1V

1 1 1 1 0 0 0 0

V1,6

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1

V1,22

0 0 0 0 1 1 1 1V

1 1 1 1 0 0 0 0

V1,5

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1

V1,21

0 0 0 0 1 1 1 1V

1 1 1 1 0 0 0 0

V1,4

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1

V1,20

0 0 0 0 1 1 1 1V

1 1 1 1 0 0 0 0

V1,3

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1

V1,19

0 0 0 0 1 1 1 1V

1 1 1 1 0 0 0 0

V1,2

1 1 1 1 0 0 0 0V

0 0 0 0 1 1 1 1

V1,18

0 0 0 0 1 1 1 1V

1 1 1 1 0 0 0 0 Combine

evi, 1 =

Input evi,1 = 1 1 0 1 1 0 1 0

Initial 4

Input Data

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Combine

Inverse operation Previous operation

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

1,16

1,15

1,14

1,13

1,12

1,11

1,10

V1,1

Reduction process

Combine

The inverse in the decryption model is that input data (evi,1…evi,31) are combined with key data (kvi, 1, m…kvi, 32, m) to another output data (bi, 1…bi, 31) one by one by XOR operation as shown in Figure 20. The encrypted keys (ekvi, 1, m…ekvi, 32, m) are received and decrypted by the key decryption model. After that, the decrypted key (kvi, 1, m…kvi, 32, m) is supported as key in inversion operation in the data decryption model.

Column 10 Inverse Substitution Table (Inv. S-table)

Last 4 digits

First 4 digits

Combine

Each round has 3 operations: Substitution, Shift and Inverse. The three operations inside the round are same with previous operation’s working principle but direction of the operation or using table in substitution are different. 2.3.2 Operation in the data decryption functions

147

1,32

1,31

1,30

1,29

1,28

1,27

1,26

Reduction process

Reduction process

Reduction process

1 1 1 1 0 0 0 0 V1,9 0 0 0 0 1 1 1 1 V1,17 0 0 0 0 1 1 1 1 V1,25 1 1 1 1 0 0 0 0

Rejoining process

1 0 0 1 0 1 1 0 8

7

6

5

4 3

2

Rejoining process

1

V1

Fig. 23 Reduction in data decryption model

IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008

148

After each extended 32 Vi is reduced and rejoined to one byte Vi, the Integration operation is operated. The integration is that every single (V1, V2, V3, V4) is integrated to the one 32 bits as shown in figure 24.

Encrypted key from input

Key Decryption Model 512 Encrypted Key bytes

Integration (separated 4 eight bits to single 32 bits) V4

V3

32 31 30 29 28 27 26 25

24 23 22 21 20 19 18 17

0 0 0 0 0 0 0 0

0 0 0 0 0 0 0 0

V2

Input

V1

16 15 14 13 12 11 10

9

8

0 0 0 0 0 0 0 0

7

6

5

4

3

2

Decryption functions

Encrypted Key (kv1, kv2, kv3, kv4) ekv1, ekv2, ekv3, ekv4

1

Start

ekvi =128 bytes

1 0 0 1 0 1 1 0

Key Exchange A, (g, p)

Round 1

128 bytes

32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10

9

8

7

6

5

4

3

2

9

8

7

6

5

4

3

2

0 ∗(231)+ 0 ∗(230) + …………….…..… + 1 ∗(27)+ 0 ∗(26)+ 0 ∗(25)+ 1 ∗(24)+ 0 ∗(23)+ 1 ∗(22)+ 1 ∗2+ 0 ∗1

+ …….……….... + 128 + 0 +

Round 2 Round 3

Inversion Key Extension

Shift 128 bytes

Inversion Shift

Expansion 32 bits to 1024 bits /ski=128 bytes/

4 byte to 128 bytes

128 bytes

Inversion Shift 512 bytes

Decrypted Key kv1, kv2, kv3, kv4 512 bytes

1

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 1 1 0

0

Shared secret key ski

Data Decryption Model

32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10

+

Round 4

Once the Integration is done, the conversion operation is continued. The conversion, which is one of the common binary to decimal conversion techniques, performs that the 32 bits in binary is converted to the decimal number by a using conversion technique. The figure below shows conversion method as well.

0

B 128 bytes

Fig. 24 Integration in data decryption model

Conversion (binary 32 bits to decimal)

Diffie Hellman

Shift

1

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 1 1 0

Σ

Inversion

0 + 16

+

0

+

4 + 2 + 0 = 150

Fig. 25 Conversion in data decryption model

The multiplied digits are summarized, and the result is represented as an amount of the data in the decimal number. After the conversion is done, the converted amount of the data in decimal δi=150 can be updated locally at the MH. The data update is stored at the MH until it is transferred to the BS. When the update data is transferred to the BS, the update data at the MH is encrypted by the encryption model. This encryption process is performed similarly with previous encryption at BS. After the encrypted update data is received at BS, it is decrypted by decryption model. The decryption process of the encrypted update data at the BS is performed same with the decryption process at MH. The key decryption model is used to decrypt the encrypted key when it is received. The key decryption model includes the key decryption functions, key exchange and key extension parts as shown in key decryption model of figure 26.

Fig. 26 Key Decryption model

Key decryption functions are used to decrypt the encrypted key by extended shared secret key. The functions consist of four rounds. Each round includes the Shift and the Inversion operations as show in Decryption function part in figure 26. The Shift and Inversion operations in the decryption function are same with previous Shift and Inverse operation in the data decryption model as shown in figure 20 and in figure 21. The key exchange and key extension part are totally same with key exchange and extension at the key encryption model. Once authentication is done, the key exchange

5. Conclusion The security is one of the most important issues in the data transaction management. By research frame, weakness of the MCTO is determined and considered as security risk involved with data transmission over the wireless network. Since the research focused on this vulnerability, it is explored a suitable security transmission management system to the MCTO data transaction. During the research, a fully secure transmission model is found and designed. The security model, which is a hybrid cryptography system, is used to data encryption and decryption for the security transmission. The model is consisted of encryption and decryption model with authentication system. The encryption model is used to encrypt data before it is transmitted. The decryption model is used to decrypt encrypted data after it is received. Authentication

IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008

149

system, which is password based authentication, assumes whether connection of the MH to the BS is accepted or rejected. If the connection was accepted, MH or BS could start security data transmission for the data transaction else the MH was rejected from system until connection is accepted. More over this security model is not only used in the wireless network but also it can be used through the wire network. Finally, this research work proposed efficient time to data transaction and strong security to data transmission.

[13] Krause. M and Tipton. H. 1993. “Handbook of

References

[17]

[14] [15] [16]

[1] Abdul-Mehdi. Z and Hason. N. 2006 “Trusted Based

[2]

[3]

[4]

[5] [6]

[7]

[8] [9]

[10] [11] [12]

Diagonal Replication on Grid Database”, International conference For Business, Law and Technology, Copenhagen- Denmark, 5-7 December, Vol.2, p.p 441. Abdul-Mehdi. Z. T, Mamat. A. B, Ibrahim. H and Dirs, Mustafa.M. 2006.“Multi-Check-Out Timestamp Order Technique (MCTO) for Planned Disconnections in Mobile Database”, The 2nd IEEE International Conference on Information & Communication Technologies: from Theory to Applications , 24-28 April, Damascus, Syria,Vol.1, p.p 491-498. Abdul-Mehdi. Z. T, Mamat.A, Ibrahim.H and Deris. M. 2006. “Transaction Management Model for Mobile Databases”. Phd Thesis in Computer Science, Faculty of Computer Science and Information Technology, Univesrity Putra Malaysia, P.P.3. Abdul-Mehdi. Z. T and Ramlan. M. 2008. “Security Management for the data transmission between base station and mobile host” IETECH journal of communication techniques. Delf. H. 2007 “Introduction to Cryptography” Principles and Applications. Second edition. ISSN 1619-7100, ISBN13 978-3-540-49243-6, Berlin, New York. Denis. T and Johnson. S. 2007. “Cryptography for Developers” Hingham Street, Rockland, MA, US ISBN10: 1-59749-104-7, ISBN-13: 978-1-59749-104-4 in US and Canada. Dunham. M.H. and Kumar.V. 1999 “Impact of mobility transaction management” International Workshop on Data Engineering for Wireless and Mobile Access, Seattle, WA, USA, 14-21. Forouzan. B. 2007. “Data Communications and Networking”, Fourth edition, Mc Graw Hill, Singapore, ISBN 007-125442-0. Garuba. M, 2005 “Impact of External Security Measures on Data Access Implementation with Online Database Management System” ITCC05 Volume 1-Volume 01, Pages: 243 -248. Gray. J, Helland. P, O’Neil. P and Shasha. D 1996 “The dangers of Replication and Solution” ACM SIGMODE International Conference on Management of Data. Jakobsson. M, Yung. M and Zhou. J. 2004 “ Applied Cryptography and Network Security” Second International Conference, Yellow Mountain, China. Jorstad. N. D and Smith. L. T. 1997 “Cryptographic Algorithm Metrics” White paper in National information System Security Conference, US.

[18]

[19] [20] [21] [22]

[23] [24] [25]

Information Security Management” ISBN: 0849399475. US. Lubinski. A. 1998. “Security Issues in Mobile Database Access” Mobile Visualization Project, Germany Research Association. Mao. W. 2004. “Modern Cryptography: Theory and Practice” New Jersey, USA ISBN: 0-13-066943-1. Maurer. U. 1994. “Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms” Advances in Cryptology - Crypto '94, Springer-Verlag, 271-281. National Security Agency. 1998 “SKIPJACK and KEA Algorithm Specification” US. Popescu. B. C, Crispo. B and Tanenbaum. A. S. 2003. “Secure Data Replication over Untrusted Hosts” In Proc 9th Workshop on. Hot Topics in Operating Systems (HotOS IX). Rivest. R. L. 1994 “The RC5 Encryption Algorithm” US. Savola. R. 2006 “Node-Level Information Security monitoring for Mobile Ad Hoc Networks” VTT Technical Research Centre of Finland, Oulu, Finland. Schneier. B. 1996 “Applied Cryptography” Second Edition: Protocols, Algorithms and Source Code in C (cloth) ISBN: 0471128457 US. Sklavos. N and Zhang. X. 2007. “Wireless Security and Cryptogrpahy: Specification and Implementations” 6000 Broken Sound parkway NW Suite 300, Boca Raton, FL, US ISBN -10: 0-8493-8771-X(Hardcover), ISBN-13: 978-0-8493-8771-5 (Hardcover). Stamp. M. 2006. “Information Security Principles and Practice” ISBN-10 0-471-73848-4 (cloth) ISBN-13 9780-471-73848-0. Venkaiah. V. Ch, Srinathan. K and Bruhadeshwar. B 2004 “Variations to S-box and MixColumn Transformations of AES” Hyderabad, India. Wilson. S. B and Menezes. A. 2005 “Authenticated Diffie Hellman Key Agreement Protocols” University of Waterloo, Waterloo, Ontario, Canada.