Main Pages2003

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 11

DESIGN AND EVALUATION OF CRYPTOGRAPHIC

TECHNIQUE BASED ON DES


DISSERTATION REPORT

Submitted in Partial Fulfillment of the requirement for the


Degree of

MASTER OF TECHNOLOGY
Electrical Engineering

Submitted by
KRITIKA KHUNGER
11127502
Under the supervision of
Mrs. Ashu Ahuja
(Associate Professor, EED, MMU)

Department of Electrical Engineering


M.M Engineering College
MM University, Mullana (Ambala)
August 2015
i
CERTIFICATE

This is to certify that dissertation entitled “Design and evaluation of cryptographic technique
based on DES” which is submitted by Kritika Khunger in partial fulfillment of the requirement
for the award of degree M.Tech. in Electrical Engineering, M.M. Engineering College,
Maharishi Markandeshwar University, Mullana is a record of the candidate own work carried out
by him under my supervision. The matter embodied in this dissertation is original and has not
been submitted for the award of any other degree.

Er.Ashu Ahuja Dr. Sanjeev Aggarwal

Associate Prof., EE Deptt, Prof. & Head, EE Deptt,

MMEC Mullana MMEC Mullana

ii
CANDIDATE’S DECLARATION

This is to certify that Dissertation entitled “Design and evaluation of cryptographic technique
based on DES” which is submitted by me in partial fulfillment of the requirement for the award
of degree M.Tech. in Electrical Engineering, M.M. Engineering College, Maharishi
Markandeshwar University, Mullana comprises only my original work and due
acknowledgement has been made in the text to all other material used.
I, hereby, further declared that in case of legal dispute in relation to my M.Tech dissertation, I
will be solely responsible for the same.

Date: Kritika Khunger


11127502

iii
ACKNOWLEDGEMENT

Apart from the efforts of me, the success of this dissertation depends largely on the
encouragement and guidelines of many others. I take this opportunity to express my gratitude to
the people who have been instrumental in the successful completion of this dissertation.

I would like to show my greatest appreciation to Dr. Sanjeev Aggarwal, Prof. & Head, EE
Dept. I feel motivated and encouraged every time I attend his meeting. Without his
encouragement and guidance this dissertation would not have materialized.

The guidance and support received from Er. Ashu Ahuja, Associate Prof., EE Dept. was vital
for the success of the dissertation. Without the wise counsel and able guidance, it would have
been impossible to complete the dissertation in this manner. I am grateful for his constant
support and help.

I express gratitude to other faculty members of EE Department, MMEC for their intellectual
support throughout the course of this work. Finally, I am indebted to all whosoever have
contributed in this dissertation work and friendly stay at MMEC.

Kritika Khunger
11127502

iv
ABSTRACT
The traditional electrical power grid is currently evolving into the smart grid. Smart grid
integrates the traditional electrical power grid with information and communication technologies
(ICT). It is a huge complex network composed of millions of devices and entities connected with
each other. Such a massive network comes with many security concerns and vulnerabilities. The
requirements of the security model vary depending on the type of data to be encrypted. It also
ensures that hackers cannot perceive any clues about a secret data from individual for security
concerns. One of the major issues to be considered is the computational speed of the encryption
model. There are many security models, which provide high level of security. Such model
increases the execution time for encryption. The effectiveness of the algorithms highly depends
upon computational time or computational speed. Though there are many challenging encryption
algorithms, which provide high level of security, they increase the level of execution time for
encryption. Cost effectiveness of the encryption algorithm is also another main concern for
determining the efficiency of the algorithm. The computational time of the algorithms have a
major impact on the determining the cost effectiveness. A secured and time efficient algorithm
for encryption and decryption of text data is proposed in this work. This work is actually a
combination cost effective symmetric key algorithm and Simplified Data Encryption Standard
(SDES) algorithm for small and large amount of data. Also, proposed method has been
compared with existing ciphering and deciphering technique. The performance of both the
techniques is compared through text received and computational time taken by them for
encryption as well as decryption. Also, accuracy (in terms of error) is calculated by comparing
the text to be encoded and decoded text. MATLAB R2013a has been taken as an implementation
platform. Image processing toolbox and generalized MATLAB toolbox has been taken for the
same.

v
LIST OF CONTENTS

vi
vii
TITLE i

CERTIFICATE ii

CANDIDATE’S DECLARATON iii

ACKNOWLEDGEMENT iv

ABSTRACT v

LIST OF CONTENTS vi-viii

LIST OF FIGURES ix-x

CHAPTER 1. INTRODUCTION 1-11


1.1 Introduction to Smart Grid 1

1.1.1 Architecture 2

1.1.2 Need of cryptography in Smart Grid 4

1.2 Introduction to Cryptography 5

1.2.1 Cryptography goals 5

1.2.2 Symmetric Key Algorithm 6

1.2.3 Asymmetric Key Algorithm 7

1.2.4 Substitution Techniques 8

1.3 Introduction to DES Algorithm 9

1.4 Objective of the thesis 10

1.5 Outline of the thesis 11

CHAPTER 2. LITERATURE SURVEY 12-22

2.1 RSA (Rivest-Shamir-Adleman) Algorithm 22


2.1.1 Introduction 22

viii
2.1.2 How secure is a communication using RSA? 23
2.1.3 Integer Factorization and RSA problem 23
2.2 AES (Advanced Encryption Standard) 24
2.3 BREA (Byte Rotation Encryption Algorithm) 25
2.4 Visual Cryptography and Digital Watermarking 26
2.5 Simplified Data Encryption Standard (S-DES) 27
2.5.1 Introduction 27
2.5.2 Advantages of SDES 27
2.5.3 Disadvantages of SDES 27
2.5.4 Encryption Algorithm 28
2.5.5 SDES Key generation 28
2.5.6 Analysis of SDES 31
2.4 Scope of the problem 31
2.5 Conclusion 31

CHAPTER 3. METHODOLOGY 32-38

3.1 Introduction 32

3.2 Encryption Process 32

3.3 Decryption Process 34

CHAPTER4.EXPERIMENTAL RESULTS & DISCUSSION 36-40

4.1 Introduction 36

4.2 Case 1 - Data file is ‘EE.txt’ 38

4.3 Case 2 - Data file is ‘EE.txt’ 39

4.4 Case 3 - Data file is ‘41.txt’ 40

CHAPTER 5. CONCLUSIONS & FUTURE SCOPE 41

ix
REFERENCES 42-50

LIST OF FIGURES

x
Fig. No. Figure Caption Page No.
1.1 Architecture of a typical Smart-grid metering and control system 2
1.2 Symmetric Key Cryptography Process 7
1.3 Public Key Cryptography Process 7
2.1 Overview of the Data Encryption Standard 10
2.2 S-DES Structure 26
2.3 Key Generation for S-DES 29
2.4 S-DES Encryption 32
5.1 SDES scheme 40
5.2 Snapshot of MATLAB command window showing original inputted 41
text, time for encryption, enciphered text for ‘aaa.txt’
5.3 Snapshot of MATLAB command window deciphered text and time 42
for decryption for text file and error ‘aaa.txt’
5.4 Snapshot of MATLAB command window showing original inputted 42
text and enciphered text for ‘100B.txt’
5.5 Snapshot of MATLAB command window deciphered text and time 43
for decryption for text file ‘100B.txt’
5.6 Snapshot of MATLAB command window showing original inputted 43
text and enciphered text for ‘41.txt’
5.7 Snapshot of MATLAB command window deciphered text and time 44
for decryption for text file ‘100B.txt’

xi

You might also like