Abstract

Because of the defect of only the single data encryption and the use of famous encryption algorithm, which was not improved in traditional methods of the registration process, a combined encryption algorithm is proposed in this paper. That is, the algorithm security is greatly improved, through researching several famous data encryption algorithms, and improving some data encryption algorithms. In this paper, a new hybrid crypto [1, 2, 3] concept is proposed which is the combination of new symmetric and message digesting function (MD-5). Moreover, the security and performance of the proposed technique is calculated and the presented results showing the performance of the proposed technique. Keyword Encryption, Decryption, Security, Image, Cryptography, Pixel. 1. PROPOSED WORK The objective of the proposed work is to design and develop a technique that mediates the user and the operations to achieve security. As known that encryption provides strong security for information at rest. Initially that proposed technique is suitable for small amount of information. The performance and security issues have considered in the proposed work because it all ready known that in real-world scenarios, these are complex issues and experts should be used who understand all available options and the impact for each particular customer environment. This work will prove less query execution times from proposed technique. The objective of proposed work is  Encrypted information should be in unreadable  Proposed concept is extending user authentication  Proposed concept providing security whenever transmitting information from one node to another node because it's important to protect the information whiles it's in transit.  Proposed concept is the design of a new cryptography algorithm for encryption and decryption at user end on user data.  The proposed algorithm is based on a symmetric block cipher.  The performance and strength of proposed algorithm is expected to be better than conventional cryptographic algorithm and highly effective against brute force attack. From the study of previous researches it is observed several limitations despite the promise it holds. Most of the techniques use one operation which is floating point operation. Due to this operation execution time of the process increased. It has been observed in previous techniques that they are not reliable. Implementation of previous techniques is easy in terms of software but hardware implementation is very complicated due to complex architecture [16]. Due to lots of mathematical operations efficiency of existing algorithms has decreased [1, 2, 3, 4 and 5]. Proposed research is the designing and implementation of a new hybrid crypto system. Proposed technique is a method of encryption that combines two or more encryption technique and usually includes a combination of symmetric and message digesting technique [17] to take benefit of the strengths of each type of encryption. Basically there are four security principles “Confidentiality”, “Integrity”, “Authentication”, and “Non-Repudiation” [18, 19 and 20]. In which Symmetric Technique fulfill the concept of Confidentiality, it also provide the performance advantage and therefore is the common solution for encrypting and decrypting performancesensitive data. On the other hand, message digests technique fulfilling the authentication as well as integrity security principle concept to provide better security for cryptographic key [21, 22 and 23]. International Journal of Computer Applications (0975 – 8887) Volume 80 – No3, October 2013 49 Fig. 1:Block diagram of Proposed Hybrid crypto system In the block diagram of proposed hybrid crypto system as show in Fig. 1, plain text encrypted by proposed symmetric encryption algorithm to produced cipher text, then message digesting function is also apply on plain text by using MD-5 [25, 26] to produce message digest of plain text. Now again apply proposed encryption technique on produced message digest text so it will also convert in cipher text. Now combine both Cipher Values (C1 and C2) into one and send to the receiver. At receiver end, separate both cipher (C1 and C2) values and apply proposed decryption algorithm one by one on each cipher value. From first cipher value plain text will get and from second cipher value C2 message digest will get. Then apply message digesting function MD-5[25, 26] on plain text which is produced during decryption to produced message digest. Now finally compare both messages digesting value with each other for changes in message digest. If both message digest are same then plain text securely received otherwise original plain text is tempered by the hacker so drop the whole information. In proposed system including two existing encryption technique and third one is newly design symmetric encryption which is based on block cipher concept and it uses series of logical operation like XOR, Circular Shift (Right, Left) [13, 14, and 15]. It already known that all the selected operation are very simple and very effectively. Due to this reason proposed system is efficient then existing system [6, 7]. Block Diagram of Proposed Encryption/Decryption: To perform encryption approach displace plain text data one by one with its coordinate limits and start performing the encryption process by using logical shift and XOR operation on binary value with key value. Fig. 2 is showing the block diagram of proposed encryption and Fig. 3 is showing the block diagram of proposed decryption. Decryption is just reverse process of encryption. Receiver Side

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call