PA Substitution Cipher

Similar documents
Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

Sherlock Holmes and the adventures of the dancing men

CS408 Cryptography & Internet Security

An Introduction to Cryptography

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Attacking of Stream Cipher Systems Using a Genetic Algorithm

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

CSc 466/566. Computer Security. 4 : Cryptography Introduction

New Address Shift Linear Feedback Shift Register Generator

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Most people familiar with codes and cryptography have at least heard of the German

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

How I Broke the Confederate Code (137 Years Too Late)

Sequences and Cryptography

Institute of Southern Punjab, Multan

Update to 8 June 2011 Press Release

Optimum Composite Field S-Boxes Aimed at AES

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

Substitution cipher. Contents

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

Performance Evaluation of Stream Ciphers on Large Databases

Stream Ciphers. Debdeep Mukhopadhyay

The Paper Enigma Machine

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

SECURED EEG DISTRIBUTION IN TELEMEDICINE USING ENCRYPTION MECHANISM

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

A Layered Approach for Watermarking In Images Based On Huffman Coding

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Appendix Cryptograms

Ciphers that Substitute Symbols

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME

A Power Efficient Flip Flop by using 90nm Technology

FOR OFFICIAL USE ONLY

WATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak

Exploring the Enigma [The MATH Connection]

WG Stream Cipher based Encryption Algorithm

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

A Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

Fully Pipelined High Speed SB and MC of AES Based on FPGA

Modified Alternating Step Generators with Non-Linear Scrambler

The Web Cryptology Game CODEBREAKERS.EU edition 2015

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Pseudorandom bit Generators for Secure Broadcasting Systems

Multiple Image Secret Sharing based on Linear System

The Swiss cipher machine NeMa

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

Novel Low Power and Low Transistor Count Flip-Flop Design with. High Performance

A CHARGE RECYCLING THREE-PHASE DUAL-RAIL PRE-CHARGE LOGIC BASED FLIP-FLOP

International Journal Of Global Innovations -Vol.6, Issue.I Paper Id: SP-V6-I1-P46 ISSN Online:

Testing of Cryptographic Hardware

Cabinet War Rooms SIGSALY. The A-3 scrambler

Design and Implementation of Data Scrambler & Descrambler System Using VHDL

A reprint from American Scientist

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF)

Efficient Architecture for Flexible Prescaler Using Multimodulo Prescaler

Encryption of Ultrasound Images Using. the Permutation on the ( /p ) Fields

LFSR stream cipher RC4. Stream cipher. Stream Cipher

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

(12) United States Patent (10) Patent No.: US 6,409,089 B1. Eskicioglu (45) Date of Patent: Jun. 25, 2002

Cryptagram. Photo Privacy for Online Social Media Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian

AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms

LOW POWER & AREA EFFICIENT LAYOUT ANALYSIS OF CMOS ENCODER

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

Image Scrambling Using R-Prime Shuffle on Image and Image Blocks

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013

BLOCK CIPHER AND NON-LINEAR SHIFT REGISTER BASED RANDOM NUMBER GENERATOR QUALITY ANALYSIS

An Efficient IC Layout Design of Decoders and Its Applications

LUT Optimization for Memory Based Computation using Modified OMS Technique

MULTI-STATE VIDEO CODING WITH SIDE INFORMATION. Sila Ekmekci Flierl, Thomas Sikora

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

COSC3213W04 Exercise Set 2 - Solutions

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

VLSI Based Minimized Composite S-Box and Inverse Mix Column for AES Encryption and Decryption

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

Internet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography

LFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM

Welch Gong (Wg) 128 Bit Stream Cipher For Encryption and Decryption Algorithm

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

Design of Low Power and Area Efficient Pulsed Latch Based Shift Register

Abstract 1. INTRODUCTION. Cheekati Sirisha, IJECS Volume 05 Issue 10 Oct., 2016 Page No Page 18532

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University

Facts and Myths of Enigma: Breaking Stereotypes

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

Authors Instructions for the Preparation of Camera-Ready Contributions to LNCS/LNAI/LNBI Proceedings

cryptography, plaintext; ciphertext. key,

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové

Transcription:

Anuj Kumar 1 PA Substitution Cipher Ankur Kumar Varshney 2 Pankaj Kumar 3 1 M.Tech*, Computer Science & Engineering IEC CET, Greater Noida, (U.P.) India 2 M.Tech*, Computer Science & Engineering B.S.A College of Engineering & Technology, Mathura, (U.P.) India 3 B.Tech, Computer Science & Engineering S.R.M.S. College of Engineering & Technology, Bareilly, (U.P.) India Abstract Cryptography which is considered as a science to send a message through network. Since early civilizations, different methods have been developed to send secret messages. But with advent of Internet, data privacy face more risks, these risks are data inconsistency, data integrity, alterations, data replication etc, thus need of information security increases which lead to the new developments of cryptography. In classic cryptography, mainly two techniques are used: SUBSTITUTION and PERMUTATION. And the fact is that Modern cryptography is mainly based on these two very basic techniques. In this paper we proposed a PA Substitution Cipher (Pankaj Ankur Substitution Cipher). By using this cipher technique a attacker does take more time than the other Substitution cipher technique. Keyword - Cryptography, Cryptanalysis, Product cipher, Substitution cipher, Transposition cipher 1. Introduction Cryptography is the art and science of making secure communication systems. The term is derived from the Greek words: kryptos means hidden and graphos means word. Cryptanalysis is derived from the Greek words: kryptos, and analyzing, means "to loosen or "to untie" [1]. It is the study of methods for obtaining the meaning of encrypted information, without access to the secret information which is normally required to do so. Cryptanalysis is the flip-side of cryptography. It is the science of cracking codes, decoding secrets, violating authentication schemes, and in general, breaking cryptographic protocols [2]. Cryptography and Cryptanalysis comprise Cryptology. The science Cryptology is not a new science but it is quite an ancient art. Cryptography has a long and fascinating history [3]. The first recorded use of cryptography for correspondence was by the Spartans who (as early as 400 BC) employed as cipher device called a Scytale to send secret communication between military commanders [4]. In old times, from 1918 and until WWII, an encryption method known as the enigma was used in Germany. For this method, typewritten messages were encrypted by using a modified typewriter and today, with the invention of Cryptography. Classic cryptography involves: substitution and permutation and modern cryptography has Asymmetric cryptography, digital signatures, elliptic curve cryptography [5-7] etc. 1.1 Substitution Ciphers Substitution technique is one in which each character in the plaintext is substituted for another character in the cipher text. The receiver inverts the substitution on the cipher text to recover the plaintext [2]. For example: Ceaser, Hill, Playfair etc. 1.1.1Types of Substitution cipher: In classical cryptography there are 4 types of substitution cipher: Mono-alphabetic substitution/simple substitution cipher is, where each character in the plain text is replaced with a corresponding character of cipher-text. The cryptograms in newspaper are simple substitution cipher. Homo-phonic substitution cipher is like a simple substitution cipher except that a single character of plain-text can map onto several characters of cipher text. Polygram substitution blocks of plain-text characters are encrypted in groups into blocks of cipher-text Poly-alphabetic substitution cipher is made up of multiple mono-alphabetic ciphers. The cipher changes with the position of each character in the plain text. It is used in American civil war. 1.2 Permutation Ciphers Permutation technique is one in which the plaintext remains the same, but the order of characters is shuffled around. It forms the second basic building block of classic ciphers. In a simple columnar transposition cipher, the plaintext is written horizontally onto a piece of graph paper of fixed width and the cipher text is read off vertically [2]. The core idea is to rearrange the order of basic units (letters/bytes/bits) without altering their actual values. A transposition cipher simply rearranges the symbols in plaintext to produce cipher text. 2. Methodology We implement each of its cipher using substitution technique. For implementing PA Substitution Cipher we take a key which 1

will contain at least a letter A. We decode each letter according to their alphabetic index in increasing order. Apply the formula for encryption. After encrypting the text we send the text through network channel with three information key value, cipher text and public value. After receiving the information decrypt it with the help of algorithm. The main concept with this is that, we transfer additional information that s the public value and this value has the same length as the plain text will contain. Cipher Text= plain text% Key Public value=plain text/ Key Plain text=key* Public Value+ Cipher text Algorithm: 1. Choose a Key which will contain at least a character A. 2. Assign the value 1-26 to each letter as in the alphabetic order and Assign $ in place of 0. 3. For Encryption Cipher Text= plain text% Key 4. Compute Public value=plain text/ Key 5. Again Assign Alphabet to their values. 6. Send Cipher text, Public value and Key to the Receiver Through channel. 7. Decrypt it by Plain text=key* Public Value+ Cipher text 1. Choose plain text 2. Choose key Assign value 1-26 to each letter and 0 for $ Compute Public value and Cipher Text And assign alphabet to their values Send Public value, Cipher Text and Key to receiver Encryption Decrypt it and compute Plain Text Decryption Figure 1 Algorithm for PA Substitution Cipher Example:- Let we transfer Plain Text= HELL and Key= RABL 1. Plain Text= H E L L 8 5 12 12 Key= R A B L 18 1 2 12 2. Cipher Text= plain text% Key 8 0 0 0 H $ $ $ 2

Public value= Plain text/ Key 0 5 6 1 $ E F A 3. Send H$$$, $EFA and RABL through channel. 4. For Decryption Plain text=key* Public Value+ Cipher text 8 5 12 12 H E L L PT-HELL Key-RABL CT-H$$$ Public Value-$EFA Key-RABL Encryption PT=HELL Figure 2 Block Diagram Decryption 3. Cryptanalysis of PA Cipher Each permutation of the 26 letters of the English alphabet (there are 26! =4*10 26 in total) gives a unique key for encrypting a message. If a particular permutation is used to encrypt a message, then the inverse of that permutation can be used to decrypt it [5].But For PA Cipher we need more time to decrypt a plain text because channel does contain three information and we also provide a unique letter A in key so this will enhance the security of the system. For a simple substitution cipher we will take N*M time while in the PA Cipher technique we will take N*M*O time. Here N= Plain Text, M=Key, O= Public value 4. Result Analysis After applying PA Substitution Cipher technique we increase the security of the system. Because the attacker will take more time to break the security. It will provide the better result than the simple substitution cipher technique. If we will make a graph for cryptanalysis than using PA Cipher technique attacker will take more time. Here the value of public value and cipher text will be same. In the table-1 we compare the time to break the plain text. Simple PA S.No. N M O Cryptanalysis Cryptanalysis R1. 4 3 4 4*3=12 4*3*4=48 R2. 8 4 8 8*4=32 8*4*8=256 R3. 15 2 15 15*2=30 15*2*15=450 R4. 11 5 11 11*5=55 11*5*11=605 R5. 12 6 12 12*6=72 12*6*12=864 Table 1 Cryptanalysis Time 3

1000 900 800 700 600 500 400 300 200 100 0 R1 R2 R3 R4 R5 Simple Sub. Cryptanalysis PA Sub. Cryptanalysis Figure 3 Times Taken for Break the Cipher Text 5. Conclusion Substitution cipher is the main technology to cipher the plain text. But if we send it through network than an attacker easily break the plain text. But after applying PA Substitution Cipher we create the problem for the attacker because it will provide more security than the other substitution cipher technique. The result of this technique we have seen in the fig.-3 References [1] W.Stallings; Cryptography and Network Security 2 nd Edition, Prentice Hall, 1999. [2] A.Menezes, P.van Oorschot and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996. [3] D. Kahn, Codebreakers: The Story of Secret Writing, Macmillan, 1967. [4] Stamatios V. Kartalopoulos, the University of Oklahoma, A Primer on Cryptography in Communications, IEEE Communications Magazine April 2006. [5] Sam Hasinoff Solving Substitution Ciphers AUTHOR Anuj Kumar: was born in India in April, 1986. He has completed his B.Tech in Information Technology from Hindustan Institute of Technology & Management, Agra, India in 2008.Currently he is pursuing M.Tech in Computer Science & Engineering from IEC-CET, Greater Noida, India.His interest areas are Security Application,Network Security and Digital Image Processing. Ankur Kumar Varshney: was born in India in August, 1986. He has completed his B.Tech in Computer Science & Engineering from Aligarh College of Engineering & Technology, Aligarh, India in 2008.Currently he is pursuing M.Tech in Computer Science & Engineering from B.S.A College of Engineering & Technology, Mathura, India. His interest areas are Security Application, Network Security and Digital Image Processing. Pankaj Kumar: was born in Uttar Pradesh India in November, 1990. He has completed B.tech in Computer Science and Engineering from S.R.M.S. CET, Bareilly Uttar Pradesh, India in 2011. His interest areas are Data Compression, Network Security, Cryptography and Algorithm Analysis. 4