.

Saturday, May 25, 2019

Encryption and Decryption Algorithm

Encryption and rewriteion algorithmic program using ASCII values with substitution approach.First Author M.Shruthi and Second Author Gokaraju Rangaraju inst every(prenominal) of Engineering and Technology, Bachupally, Nizampet, 500092www.griet.ac.in I.AbstractThis paper shows the possibility of employing the characteristics of available algorithms with poly-alphabetic substitution techniques in a running(a) fashion, to produce ASCII values of the typed school text edition edition and then putting in the translating, reverse techniques in order to prepare the encrypted text.Before generating the cipher text, the algorithm will result in Message digest of the given text. This algorithm implements the model of radiate Key cryptography. This algorithm can be implemented in any programming language such as C, C++, Java etc. In poly-alphabetic substitution the plain texts letters argon encrypted differently corresponding to their position.The name poly-alphabetic proposes that can be more than one key so we keep up utilise both keys combination instead of one, in order that it produces the cipher text. We can also role three or more keys to make the encoding regale more complex. In this paper energise generated ASCII Codes of the plain text and then we have reversed it say it as reverse ASCII Codes and then we have produced two random keys named K1 and K2.Then these K1 and K2 Keys are alternatively applied on Reverse ASCII codes in order to produce encrypted text. On the other hand Decrypting algorithm is use to generate the plain text again. Our technique generates random cipher text for the same plain text and this is the major as stack of our technique.II. IntroductionRelated worka. IntroductionNow-a-days need of shelter is es directial to make data secure from the unauthorized user to access. surety is needed in many of the organizations like military, budgets of Government, it is also necessary to our general rescue and many business applica tions also.Business application involves the security among the data of the institute in which information about of the employees, manager workers and owners profit is itself stored and similarly, application i.e, utilised by the users harmonise to their use also requires security. So security plays an indispensable role in our day to day life. Cryptography is one of the techniques for guarding data.Information Security is a set of thoughts for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital content.The responsibilities of Information security include launching a set of business processes that will safeguard information assets regardless of how information is formatted or whether it is transit, is being processed or is at rest in storage.Important information or data cannot be sent across the cyberspace without implementing any security mechanism, because this data can be seen by any fair person in order to change the marrow.So the command for Information Security across the networks is expeditiously increasing day-by-day.Every business organisation has a burden to secure their data from being loss or theft. A message digest is a cryptographic hash function which includes a group of digits generated by a hash formula. Message digests are intended to secure the ace of a piece of data or information to identify changes or alterations to any part of a message. Basic terms for secure communication areLet us consider two parties that want to communicate inexplicablely, A and B. If A wants to order something to B, some information, we call that information a plaintext.After encrypting the plaintext a cipher text is produced. B knows the encryption method since he is the intended receiver and since he must use the same method together with his secret key to decrypt the cipher text and reveal the plaintext.b. Related Work1. Avinash Sharma and his team have proposed a technique for encryption and decryption.In this paper they have explained about encryption and decryption techniques using ASCII values and substitution approach. (IJASCSE Vol 1, discover 3, 2012)2. R.Venkateshwaran in his paper shows the possibility of utilizing the features of Genetic techniques with poly substitution methods in a linear way, to produce ASCII values of the given text and then employ transition, substitution with the features of Cryptography. (International Journal of Computer Applications (0975 8887) Volume 3 No.7, June 2010)3.Sumith Chowdary and his team described about the algorithm in which randomly generated numbers are used with the help of modulus and remainder by making program in any language i.e. c, c++ and java. (IJARCCE Vol. 2, Issue 8, August 2013)III. Basic Mechanism for cryptographyP=plain stitch text C=Cipher text X= Some Plain text Y=Cipher text of plain text K=Any Random key E(K,X) Encryption of X using key D(K,Y) Decryption of Y using K C=EK,P P=DE,CIV. Hi story of CryptographyThe art of cryptography is considered to be born along with the art of writing. As civilizations period started, human beings got incorporated in tribes, groups, and kingdoms. This led to ontogenesis of ideas such as power, battles, supremacy, and politics. These thoughts further furnished the natural need of people to communicate covertly with discriminative recipient which in turn assured the persisting evolution of cryptography as well. The roots of cryptography are found in Roman and Egyptian civilizations.The word Cryptography has been derived from the Greek word kryptos (hidden) and graphing (writing).Cryptography is the technique with which a plain text can be converted to cipher text so that this cipher text is not apprehensible by anyone excluding the recipient. Cryptography, the intelligence of encrypting and decrypting information can be traced back all the way to year 2000 BC in Egypt.Here it was first used with the help of the standard hieroglyp hics in order to communicate secretly. Julius Caesar (100-44 BC) used a simple substitution cipher which has been named after him today. During the first and the second war the command for confidentiality increased rapidly all kinds of sweet cryptographic techniques developed.V. Objective of the algorithmic ruleThe core objective of the research is to safeguard information stealing in what so ever manner it may be, with the use of appropriate technology. To secure information spilling and to provide a high-level integrity and authenticity to data or information using MD5 and Cryptographic algorithm that is sent over the network.Integrity Ensures that a message is unchanged from the time it sent from the sender and till it is opened by the receiver.Authenticity It verifies whether the identity of user in the dodge is a consecutive or genuine user.To check the integration of message/information MAC is verified.VI. Algorithm for EncryptionDecryption and MAC GenerationAlgorithm encr yption picture two random keys k1, K2.Take dataFind ASCII values for each character in the data.Reverse each ASCII value and store it.Add each key alternatively to each reversed ASCII value.//This is the encrypted data.Algorithm decryptionTake the encrypted data and random numbers.Subtract the keys from the encrypted dataEach alternativelyReverse the obtained values.//The reversed values will be ASCII codes of characters.Print the retrieved ASCII values corresponding characters.Algorithm MD5Firstly append padded bitsThen append lengthInitialise MD BufferLater process message in 16-word blocks.Display the output.Encryption Process The above figure (fig 1.1) depicts the procedure of encryption.Let the text be HELLO WORLD.Firstly, generate 2 random keys named k1 and k2.For specimen let us assumeK1 =1123K2=1452Then translate the each character of message into its corresponding ASCII Code and the we reverse these ASCII codes. (This is shown in table1.1)Next, these keys k1, K2 are added alternatively to reverse ASCII numbers in order to generate cipher text.Table 1.1Plain text ASCII number Reverse ASCII Number Cipher textH 72 27 1150E 101 101 1553L 108 801 2253L 108 801 1923O 111 111 1563 32 23 1146W 87 78 1530O 111 111 1234R 114 411 1863L 108 801 1923D 100 001 1453Decryption Process This technique is exactly reverse technique to that of encryption. So in this process, cipher the keys from the obtained cipher text.That is first subtract k1 from first value of encrypted/cipher text and then subtract K2 from second value of cipher text, consecutively.Repeat this step until you reach to the end of the message.Finally we will get the plain text which was sent by user.Following table will depict the process of decryptionCipher text Reversed ASCII number ASCII code Plain text1150 27 72 H1553 101 101 E2253 801 108 L1923 801 108 L1563 111 111 O1146 23 32 1530 78 87 W1234 111 111 O1863 411 114 R1923 801 108 L1453 001 100 DVII.MAC GenerationThe MD5 hashing algorithm is a cr yptographic technique that accepts a text of any length as input data and returns as output a constant-length digest parameter to be utilised for authenticating the true message.From past years, there has been exaggerated interest in generating a MAC produced from a Cryptographic hash code, like SHA-1, MD5, etc. Here in this, we have used MD5 algorithm for resulting a 128 bit hash-value.It is employed as a checksum to ascertain data integrity.Ex1. helloMD5 haschisch of your string 5D41402ABC4B2A76B9719D911017C5922. The attack is at 5 p.m.MD5 Hash of your string 54759A4BE2031EA6CC8D56B10CD4A9AAVIII. Snap shots of the algorithm implementationHome page After entering some text Click on encrypt button Click on Decrypt button If the text-box is empty And if clicked encrypt then it results to a messageIX. Key words and AbbreviationsCryptography The process of encrypting and decrypting text for securing it.Cryptanalysis is the art of decoding or obtaining plain text from hidden messages ov er an insecure channel. It is also known as code cracking.Encryption The technique of converting plain text into some other format with the help of a key is known as Encryption.Decryption The technique of altering cipher text or encrypted text into plain (original) text is called as Decryption with the help of same key or other key.Key An amount of information used for encrypting and decrypting text.Cipher text The message written in secret code and is not understandable by anyone.Plain text The original message given by end-user.Encryption Algorithm An Algorithm for encrypting given text.Decryption Algorithm An Algorithm for decrypting the encrypted text.MD5 Algorithm An Algorithm for conclusion 128 bit Message digest for the given text.Abbreviations usedMAC Message Authentication CodeASCII American Standard Code for Information Interchange.MD5 Message Digest v5X. afterlife scopeThis algorithm is formulated for the sake of security.There are many future scope of substitution appr oach employing ASCII value for Encryption & Decryption. Firstly it is certified that any intermediate person dont hack the data between the gap of plain text and cipher text. Secondly receiver receives the encrypted text as its same as the senders send the plain text. Thirdly in the contemporary world, new technologies ameliorate day by day so we can exaggerate changes in this algorithm according to the requirement.This work can be further improvised upon in the future in many different ways.XI. ConclusionThere are many techniques such as RSA, IDEA, AES, DES, DIFFIE-HELLMAN algorithms and overmuch more that can be utilized to modify a plain text into cipher text to transfer over the network so nonentity else than an actual recipient can understand the message.But Substitution and blow is the ground for every algorithm as each and every algorithm employs Transposition or Substitution or both of them. In this view we have introduced a new technique that is titled as substitution us ing ASCII Codes. This new method for text encryption and decryption behaves randomly so grouping of the same cipher text and breaks it by just guessing it becomes more difficult.This technique of combining cryptography and Message digest can lead to new area of research on securing data by other mechanisms. This technique of text encrypts and decrypt employing ASCII algorithm is definitely an impelling process when compared with other cryptographic systems. This algorithm is very meteoric, procure and trust worthy.XII. References1. Stallings W. Cryptography and Network Security Principles and Practice, 2/3e Prentice hall, 1999 30-49.2. Author Vineet Sukhraliya, Sumit Chaudhary, Sangeeta Solanki, Title Encryption and Decryption Algorithm using substitution array approach. IJARCCE Vol 2 Issue 8 August 2013.3.Author Avinash Sharma, Anurag Bhatnagar, Nikhar Tak, Anuradha Sharma, Jitendra Avasthi, Prerna Sharma Title An set about Of Substitution Method Based On ASCII Codes In Encryption Technique ,IJASCSE Vol 1, Issue 3, 20124.Author R. Venkateswaran Dr. V. Sundaram, Title Text Encryption and Decryption with Poly Substitution Method and feature the Features of Cryptography. IJCA Vol 3 No. 7 June 2010. 5. https//en.wikipedia.org/wiki/Cryptography 6.https//en.wikipedia.org/wiki/MD5XII.

No comments:

Post a Comment