String Graphixification Based Asymmetric Key

0 downloads 0 Views 4MB Size Report
Abstract- The paper emphasizes on the effort of using the concept of gears and their distinguished genre in producing a unique technique for secured data ...
IEEE/OSA/IAPR International Conference on Infonnatics, Electronics & Vision

String Graphixification Based Asymmetric Key Cryptographic Algorithm Using Proposed Concepts ofGDC and S-Loop Matrix Rajdeep Chowdhury

I,

Saikat Ghosh 2, Dr. Mallika De3

Abstract- The paper emphasizes on the effort of using the concept of gears and their distinguished genre in producing a unique technique for secured data transfer over a network.

teeth. The type/genre of gear concerned with the proposed work is the Spur Gear. The pitch surfaces of the gears are imaginary cylinders that roll together without slip. [4]

Gears have a major significance in diurnal strife of human existence. The driving force, rather more significantly the endeavor was to ensure and justify the importance of gears in the

field of

Cryptography

and

stamp

its

foundation

via

proposal of a unique methodology. The proposed technique is well-suited in finding its usage in any sector where secured data transfer is a must. The essence of the work adhered and its allied modality, confirms the ultimate target aimed at and the path conjured to attain it eventually.

Keywords-

Gear

Driven

Cipher

[GDCj,

Key

Gear,

Encryption, Decryption, Primary Encrypted Text [PET], Auto Shifter, S-Loop Matrix, Final Encrypted Text [FET]

I.

INTRODUCTION

Symmetric Key Cryptography [3], Public Key Cryptography, Cramer Shoup Cryptography and Hybrid Cryptosystems [6] [7] are some of the notable Data Encryption techniques [6] that have been used and are being used till date. But, owing to their individualistic demerits and limitations, the devised algorithm using proposed concepts of Gear Driven Cipher [GDC] and S-Loop Matrix turns out to be an efficient Cryptographic methodology, to say the least, thereby enhancing Network Security on the totality. [8] The technique uses the proper utilization of the gears, in which all the characters furnished by the ASCII Table are incorporated. [1] [2] The Gear Driven Cipher ensures another facet of formulating this proposed technique through the context of the paper, that is; implementation of the concepts of Mechanical Engineering field in Cryptography. [lO] The structure of the gears used and the working schema has been outlined in detail for reference.

Proposed Work- The notion is to implement the unique technique of encrypting long strings using a perforation based teething of the string, using u­ toothed (that is, alphabetically toothed) gear. [4] [5] The main area of interest would be the inclusion of gear shifting technique to improve the complexity of the encrypted text. [4] Another interesting fact about the proposed technique is that the introduction of the system comprising of shifting gears, would in a way ensure introduction of new scripts, other than the usual ones. [4] Transformation of a linear string segment into a formatted graph using coordinate system has been coined as String Graphixification.

B.

C.

Figure- l

Figure-2

Gears Used-

Figure-3 (i)

Figure-3 (ii)

Figure-3 (iii)

A. About Gears- Gears are defined as toothed wheels or

multi lobed cams which transmit power and motion from one shaft to another by means of successive engagement of

Rajdeep Chowdhury '. Department of Computer Application. JIS College of Engineering. Kalyani. Nadia-741235. West Bengal. India. (corresponding author e-mail: dujon [email protected]) Saikat Ghosh 2 • Department of Computer Application. JIS College of Engineering. Kalyani. Nadia-741235. West Bengal. India. (e-mail: [email protected]) Dr. Mallika De 3 • Department of Engineering and Technological Studies. University of Kalyani. Kalyani. Nadia-741235. West Bengal. India. (email: [email protected])

978-1-4673-1154-0112/$3l.00 ©2012 IEEE

Figure-3 (iv)

Figure-3 (v)

ICIEV 2012

IEEE/OSA/IAPR International Conference on Infonnatics, Electronics & Vision Step-6: The arranged characters are transformed into the ASCII Table. Step-7: The formed ASCII table is then transformed into the Co-ordinate Matrix and then sign convention is assigned to it. Step-8: The Signed Co-ordinate Matrix [SCM] is then plotted onto a Line Graph to obtain a Path, which furnishes the final outcome in form of graphical analysis.

D. Gears Setup-

Decryption Algorithm: The above discussed Steps in the Encryption Algorithm, namely; Step-l to Step-8, if followed in the reverse pattern, will ensure the retrieval of the original plain text from the Graph obtained. III.

Figure-4 E. Working Schema- The Key Gear works over the gear

system and the Record Pad record every new character that enters with each thread character. The Key Gear shifts from one gear to the other, as shifted by the Encrypter.

THE SCHEME

The Scheme comprises of primarily three fragments, namely; Key Generation, Encryption Technique and Decryption Technique. A. Key Generation

Keys are formulated by randomly picking ASCII characters from each of the gears used, which have been demonstrated in the Figures-3 (i -v), and forms the starting character for the Encryption Technique as well as the Decryption Technique. The Keys are asymmetrical in nature, as the two Keys generated in the Encryption phase and the Decryption phase is distinct from one another. B.

Encryption Technique

The Encryption Technique has been briefed with an example demonstration, followed by the Algorithm generation to ensure smooth demonstration. Plain Text -7 TIS Group of Colleges. Encryption Key -7 Ek@+2. (Starting head of each gear) Auto Shifter -7 2. (AS = abs [(length of key text)l2II] - Numeric Key) [* Auto shifter shifts gear after every n characters, which in this case is 2]

Figure-5 II.

ALGORITHM

Encryption Algorithm: Step-I: The plain text is mounted on the primary gear and then rotated on the gear setup. Step-2: The primary gear is shifted to the next gear in the compound setup after AS characters. (AS = Auto Shifter) Step-3: The Record Pad records the Primary Encrypted Text [PET], which is nothing but the sequence of characters that passes through the Record Pad. Step-4: From the generated Primary Encrypted Text [PET], the S-Loop Matrix is formed. Step-5: The S-Loop Matrix is then mutated into a Normal Matrix, and the characters are arranged accordingly thereafter, forming the Final Encrypted Text [FET].

1153

Gear 1: TI �-7 EJDIC Gear 2: sf) �-7 kSj.l{i Gear 3: Gr �-7 @G?r> Gear 4: ou �-7 +o*u) Gear 5: p6 �-7 2pI,.60 Gear 1: of �-7 CoBfA Gear 2:;bC �-7 i,kS'hCg Gear 3: 01 �-7 >0=1< Gear 4: Ie �-7 )I(e' Gear 5: ge �-7 Ogge8 Gear 1: s. �-7 AsZ.Y

Figure-6 Formation of Primary Encrypted Text [PET]: EJDICkSj i@G?r>+o*u)2pJ OCoBfAi hCg>o=I

Suggest Documents