Abstract
In this paper, we have developed a new orthogonal cryptographic system for database security that has used both Cellular automata and Hash Algorithm. Our Algorithm consists of two different parts; Encryption/Decryption of database tables as well as the generation of the Authentication Tag for the activation of the attack alarm for the database tables while it is unlocked and in protected mode but it has been accessed by the illegal users. Our proposed orthogonal cryptosystem is considered to be symmetric algorithm and uses a common key for both encryption and decryption processes as oppose to the asymmetric one that requires two keys, private and public keys. Since our transformation matrix is orthogonal, we have used the property of orthogonal matrix to calculate its inverse based on its matrix transpose rather than direct matrix inversion to save the calculation time during the decryption process. We also have generated secret keys by applying the internal rules of cellular automata on the Malakooti Transform (M-T) to obtain the secret key matrix that can be used to be multiplied with the matrix of ASCII code obtained from the records of the database. To apply another level of security on the resulting encrypted code, the Hash values obtained from each record are multiplied by the elements of the secret key matrix and the XOR operation is performed on the resulting values and the elements of the encrypted codes. In addition, we also proposed a robust and fast algorithm for the database security and authentication that automatically and accurately will generate the Hash values for the entire rows of the database tables to obtain a unique Hash value for each table. This unique hash value can be used to check the validity of the data inside the database and guarantee the authentication of all information in each database. Our proposed method is capable of detecting any slight change that might be occurs on the database while it is in the protected mode. The generated Hash value will be calculated from the records elements of the database periodically to be compared with the value of the Hash value stored outside database for the authentication. Should the generated Hash value be different from the stored Hash value, the alarm flag would be activated to inform the administrator about unauthorized change of database while in protected mode via SMS or Email.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Digital Information and Wireless Communications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.