Professional Documents
Culture Documents
A Secure RSA For Data Transmission in Wireless Sensor Networks
A Secure RSA For Data Transmission in Wireless Sensor Networks
A Secure RSA For Data Transmission in Wireless Sensor Networks
net/publication/308916249
CITATIONS READS
0 794
1 author:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Aggressive and Dominating women and the goddess culture of matriarchy plus those who agree View project
All content following this page was uploaded by Sheela Sobana Rani on 07 October 2016.
272
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015.
combat military force on the move. 3)A system that 3DES and DES. It also shows that 3DES has almost
has no tolerance for errors in its use would be 1/3 throughput of DES, or in other words it needs 3
inappropriate for soldiers under fire in severe weather times than DES to process the same amount of data.
conditions. 4)A system that only supports a low A study in [2] is conducted for different popular
volume of messages would be inappropriate for a secret key algorithms such as RC4, AES, and XOR.
major message centre handling thousands of They were implemented, and their performance was
messages daily. 5) A system that requires expensive, compared by encrypting for real time video streaming
sophisticated equipment would be inappropriate for a of varying contents. The results showed; encryption
military force that can barely afford to buy delay overhead using AES is less than the overhead
ammunition. No single system meets all the using RC4 and XOR algorithm. Therefore, AES is a
requirements of security, speed, reliability, and cost. feasible solution to secure real time video
transmissions. In the present work[3]the authors
The need for security must be balanced against the introduced a new symmetric key cryptographic
practical requirements when systems are selected for method for both encryption and decryption of any file
use. Breakable systems are found today, despite such as binary file text file etc. They considered the
technological advances, because of these practical size of key matrix as 65536 and in each cell they
requirements. Almost any cryptographic system, stored two character patterns instead of one character
given enough time and resources can eventually be with the introduction of a square key matrix of size
solved. The only exception to this is a system which 256x256. In this paper[4], various techniques of
uses absolutely random changing keys with every security of data and one the algorithm using
character encrypted and never repeated. Such a Polyalphabetic substitution cipher are discussed.
system can be achieved under very limited Security of data in army stations is an important
conditions, but is in practice impossible on any large issue. In early systems, at the time of information
scale. Even the most sophisticated machine or transmission between two army stations, it can be
computer based cryptographic system cannot produce hacked by terrorists, spies and enemies.
random, nonrepeating keys. The requirement for each Cryptography is a very important system employed
communicating machine to generate the same keys for this purpose. There are various types of
prevented truly random keys. At best, a machine algorithms available for encryption and decryption of
system can produce keys by so sophisticated a data and new algorithms are evolving. Polyalphabetic
process that it appears to be random and resists substitution cipher is a strong algorithm used for
efforts to recover the key generation process.Given security of data in army stations. The algorithm [5] is
these practical considerations, a military system is designed using combination of two symmetric
expected to delay successful analysis, not prevent it. cryptographic techniques. These two primitives can
When the system is finally solved, the information be achieved with the help of Advanced Encryption
obtained must have lost all its value. Standard (AES) and Data Encryption Standard
(DES). This new hybrid cryptographic algorithm has
II. RELATED WORKS
been designed for better security with integrity. The
A study in [1] is conducted for different secret key security [6] is provided based on the AES prototype
algorithms such as DES, 3DES, AES, and Blowfish. cryptographic algorithm. An advanced key
They were implemented, and their performance was management scheme is used to enhance the security
compared by encrypting input files of varying of the system. The paper presents [7] an approach to
contents and sizes. The algorithms were tested on two develop a Hybrid Cryptographic algorithm using
different hardware platforms, to compare their combination of two symmetric cryptographic
performance. They had conducted it on two different techniques which are AES and DES. In this paper [8]
machines: P-II 266 MHz and P-4 2.4 GHz. The ,Encryption algorithms and methods are among those
results showed that Blowfish had a very good technologies that are less apparent to casual or
performance compared to other algorithms. Also it business users, but are central to virtually every fund
showed that AES had a better performance than transfer, business to business transfer or internal
273
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015.
company data input and output today. This paper PROPOSED ALGORITHM FOR KEY
examines evolution and economic significance of GENERATION
NIST’s Data Encryption Standard (DES) program. In
this paper[9] a block encryption standard for transfer 1. Select or create any private key of size
of data is proposed to achieve the different goals of 256x2 bits or 64 characters.
security that is availability confidentiality and 2. Size of the selected key will be varying from
integrity. The algorithm is based on symmetric key 128 bits to 512 bits or 16 to 64 characters.
encryption approach .In this paper[10] the advanced 3. Use of 64*8 key means 512 bits in length.
encryption standard is used for error detection in an 4. Divide 64 bytes into 4 blocks of 16 bytes
efficient manner .hardware implementation can be like Key_Block1, Key_Block2,
done in the most efficient and appropriate manner. Key_Block3, Key_Block4.
5. Apply XOR operation between Block1 and
Block3.Results will be stored in new
III. PROPOSED SYSTEM Key_Block13.
6. Apply XOR operation between Block2 and
In this paper we propose an improved block Block13.results will be stored in new
cipher symmetric encryption algorithm that has the Key_Block213.
same structure of encryption and decryption. So far, 7. Apply XOR operation between
conventional cryptography algorithms have Key_Block213 and Key_Block4.Results
difference structure of encryption and decryption. We will be stored in new Key_Block4213.
device our algorithm by inserting a symmetric layer 8. Repeat the steps 5,6,7 till (random
using random number, encryption number and XOR number/4).
operation, in which the whole proposed algorithm 9. Exit.
rounds uses encryption procedure and the same for
the decryption procedure. The symmetry layer is put
between encryption part and the decryption one. The
proposed algorithm has the better speed compared
with the comparing encryption algorithm. The main
feature of the encryption/decryption program
implementation is the generation of the encrypted
key. The purpose of the cryptography is used not
only to provide confidentiality, but also to provide
solutions for other problems such as data integrity,
authentication, non-repudiation.In this a random
number for generating the initial key, where this key
will be used for encrypting the given source file using
proposed encryption algorithm with the help of
encryption number. The proposed key blocks
contains all the possible words comprising of
number(n) of characters each generated from all
characters whose ASCII code is from 0 to 255 in a
random order. The pattern of the key blocks will
depend on the text key entered by the user. Here we
are using 512 bit key size to encrypt a text message.
To decrypt any file one has to know exactly what the
key blocks is and to find the random blocks
theoretically one has to apply 2^256 trial run which is
intractable. As proposed earlier we are using a
symmetric key approach in our system. Fig 1.1 Block diagram for the key generation
274
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015.
ALGORITHM FOR THE ENCRYPTION The Fig1.4 shows that the input texts are being
PROCESS scanned for the encryption to take place. The
condition of the switches is scanned for inputs and
1. Initially select the plane text of 16 bytes following encryption process done. The simulation
2. Insert the key of size 16 bytes(depend on the results in Fig 1.5 shows that the transmission of the
plane text value) input text to the receiver side.
3. Apply XOR operation between the
key(Key_Block4213) and plane text block
(Text_Block). Results will be stored in
Cipher_Block1.
4. Apply right circular shift with 3 values. will be
stored in new Cipher_Block2.
5. Apply XOR operation between Cipher_Block2
and Key_Block2.Result will be stored in new
Cipher_Block4.
6. Cipher_Block4 is the input of the next round as a
plane text block.
7. Repeat step 1 to 7 till (Encryption number /4).
8. Exit.
275
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015.
Cryptography is the best method for security of data. [9] Akhil Kaushik, Manoj Bamela, AnantKumar, ” Block
The proposed RSA shows a better result when Encryption Standard for Transfer of Data”, International
compared with the previous works. It will take less Conference on Networking and Information Technology-
time and it is impossible to break the encryption 2010.
algorithm without knowing the exact key value. This
[10] H. Yen, B. F. Wu,“Simple error detection methods for
algorithm can be applied for data encryption and
hardware implementation of advanced encryption
decryption in any type of public applications for standard”,IEEE Trans. Computers, Vol. 55, No. 6, pp. 720-
sending confidential data. 731, June2006.
VI.REFERENCES
276
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 13 Issue 4 –MARCH 2015.
277