SlideShare a Scribd company logo
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 06 Pages: 2944-2948 (2016) ISSN: 0975-0290
2944
Nearest Prime Cipher for Data Confidentiality and
Integrity
Dr. S. Kiran
Assistant Professor, Dept of CSE, YSREC of YV University, Proddatur, India
Email: rkirans125@gmail.com
N. Subramanyan
Teaching Assistant, Dept of CSE, YSREC of YV University, Proddatur, India
Email: subramanyam.neelam@gmail.com
Y. Suma
Student, III B.Tech CSE, YSREC of YV University, Proddatur, India
Email: sumachinni097@gmail.com
K. Haripriya
Student, III B.Tech CSE, YSREC of YV University, Proddatur, India
Email: haripriyakancherla7@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Communication is the process of transmitting information from source to destination. The information
exchanged between sender and receiver through the proper channel. The information should not be stolen by
unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information
cryptography techniques are used. The key is playing prominent role in cryptography. This paper proposes a
novel method for key generation by using nearest primes. Further 2’s complement and logical operations are
used in encryption and decryption process. The final cipher text is generated by representing the intermediate
cipher in matrix form and then read by column wise.
Keywords - 2’s complement, Ciphertext, Cryptography, Nearest prime number, Plaintext, XOR
operation.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: May 08, 2016 Date of Acceptance: May 25, 2016
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Cryptography[1] is used to constrain the potential sender
and/or receiver of a message. Cryptography is based on
secret key. The sender can encode its message so that it
can only decode with suitable key.
Cipher[1] is the algorithm that is used to transform
plaintext into cipher text, this method is called encryption,
in other words, it’s a mechanism of converting readable
and understandable data into “meaningless” data, and it is
done as follows:
= � � (1)
Where � is the encryption algorithm using key k, C is a
cipher text and P is a plain text. Symmetric and
asymmetric are two types of encryption algorithms.
The opposite of cipher mechanism is called decipher that
is the algorithm which recovers the plain text from cipher
text, this is called decryption, in other words, it’s a
mechanism of converting “meaningless” data into readable
data, and it is done as follows:
� = �−1 (2)
Where �−1 is the decryption algorithm using key k.
Fig 1. Conventional Encryption Model
Security services: Here are some of the services that are
provided by the security[2].
 Confidentiality(privacy)
 Authentication(who created or sent the data)
 Data integrity(has not been altered)
 Non-repudiation(the order is final)
 Access control(prevent misuse of resources)
 Availability (permanence, non-erasure).
If we are protecting confidential information then
cryptography is provide high level of privacy of individuals
and group.
There are a number of cryptographic primitives-basic
building blocks, such as block ciphers, stream ciphers and
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 06 Pages: 2944-2948 (2016) ISSN: 0975-0290
2945
hash functions. Cryptography has being used for millennia
to safeguard military and diplomatic communications.
Data encryption standard adopted by the National institute
of standards is the most commonly used symmetric
encryption algorithm. Black-box transformations are some
of the transformations that are hidden in the algorithm.
The proposed work/algorithm follows symmetric
cryptographic system.
II. HISTORY
The word cryptography[1] comes from the Greek Word
‘Kryptos’ and ‘Graphein’. For the past 20 years, the most
commonly used symmetric encryption algorithm in United
States for civilian applications. In 2001, NTST adopted a
new application algorithm called the advanced encryption
standard (AES) to replace DES. AES is another symmetric
block cipher which uses key lengths of 128,192 and 356
bits and works on 128 bit blocks. Generally, the algorithm
is compact and efficient. There are several symmetric
block encryption algorithms in use today. One is Twofish
algorithm and the other is RC5.The Twofish algorithm is
fast, compact and easy to implement. RC5 can vary in key
length, number of transformations and block size. In 1970,
one “Crypto group” was developed by IBM named as
Horst-Festal. RC4 is the most common stream cipher
which is designed to encrypt and decrypt a stream of bytes
or bits rather than a block. RC4 as used in WEP (IEEE
standard 802.11) has been found to be breakable in
amount of computer time which itself has vulnerabilities.
III. EXISTING WORK
The existing method[3] generates a 64 bit random
sequence for key generation. Key generation consists of
two parts. One is raster scan method and the other is store
and forward method. The existing method has various
stages of encryption and decryption. In the first stage,
caeser cipher[4] substitution method is used, which is
computed by using the key, generated from raster scan
method. In the second stage, using lookup table, the
decimal equivalent of intermediate ciphertext is taken and
then XOR operation is performed between intermediate
cipher binary value and the key generated from store and
forward method. In the third stage, column wise retrieval
and nibble grouping is applied.
Limitations:
1. It is applicable only for 94 characters. It is not
providing full support for ASCII characters.
2. Look up table is necessary.
3. Only column wise retrieval process is proposed.
IV. PROPOSED WORK
The proposed work generates a 8-bit random sequence for
key generation. Key is obtained by performing subtraction
between plain text values and its nearest prime values.
Several stages are involved in encryption and decryption
uses arithmetic and logical operations[5][6].
A. Key Generation
Each character of plain text converted into ASCII value.
Further, find nearest prime of it. For key generation find
the difference between nearest prime and plain text ASCII.
Consider the difference value as key, it is continued for
each character of plain text.
Key generation algorithm steps:-
Step1: Initially, the given plain text is converted into its
equivalent ASCII values.
Step2: Find nearest prime values for ASCII values.
Step3: The key values are obtained from finding
difference between ASCII and nearest prime values.
Step4: Perform 2’s complement for generated value.
Fig 2. Flow chart showing key generation process
Example for key generation:
Plain text is: NETWORKSECURITY
ASCII values are: 78 69 84 87 79 82 75 83 69 67 85 82
73 84 89
Nearest primes values are: 79 71 89 89 83 83 79 89 71 71
89 83 79 89 97
Key values are: 1 2 5 2 4 1 4 6 2 4 4 1 6 5 8
Table 1. Key generation process
Key Value Binary code 2’s complement
1 00000001 11111111
2 00000010 11111110
5 00000101 11111011
2 00000010 11111110
4 00000100 11111100
1 00000001 11111111
4 00000100 11111100
6 00000110 11111010
2 00000010 11111110
4 00000100 11111100
4 00000100 11111100
1 00000001 11111111
6 00000110 11111010
5 00000101 11111011
8 00001000 11111000
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 06 Pages: 2944-2948 (2016) ISSN: 0975-0290
2946
B. Encryption algorithm
Round1: perform XOR operation between nearest prime
and key.
Round2: reverse the result of round1.
Round3: store it in matrix form(column wise).
Round4: retrieve values from two rows of each n*4 matrix.
Find equivalent ASCII and consider to be as final cipher
text.
Round 1:
Fig 3. Steps involved in round 1
Round 2:
Fig 4. Steps involved in round 2
Round 3:
Fig 5. Steps involved in round 3
Round 4:
Fig 6. Steps involved in round 4
Example:-
Table 2.Encryption process
Nearest
Prime Key XOR Reverse
01001111 11111111 10110000 00001101
01000111 11111110 10111001 10011101
01011001 11111011 10100010 01000101
01011001 11111110 10100111 11100101
01010011 11111100 10101111 11110101
01010011 11111111 10101100 00110101
01001111 11111100 10110011 11001101
01011001 11111010 10100011 11000101
01000111 11111110 10111001 10011101
01000111 11111100 10111011 11011101
01011001 11111100 10100101 10100101
01010011 11111111 10101100 00110101
01001111 11111010 10110101 10101101
01011001 11111111 10100010 01000101
01100001 11111000 10011001 10011001
Matrix form:-
Arranging the reverse values in row wise in the matrix.
Table 3.after placing reverse values row wise
0 0 0 0 1 1 0 1
1 0 0 1 1 1 0 1
0 1 0 0 0 1 0 1
1 1 1 0 0 1 0 1
1 1 1 1 0 1 0 1
0 0 1 1 0 1 0 1
1 1 0 0 1 1 0 1
1 1 0 0 0 1 0 1
1 0 0 1 1 1 0 1
1 1 0 1 1 1 0 1
1 0 1 0 0 1 0 1
0 0 1 1 0 1 0 1
1 0 1 0 1 1 0 1
0 1 0 0 0 1 0 1
1 0 0 1 1 0 0 1
0 0 0 0 0 0 0 0
Cipher text is:91 59 28 76 194 255 0 255 234 68 56 210
202 252 0 254
C. Decryption algorithm
Round 1: Rearrange the cipher text information in the
form of matrix by finding their binary equivalents.
Round 2: Retrieve row wise binary values and reverse
them.
Round 3: Reversed values are XOR with key to find
nearest prime values.
Round 4: Find the original value by subtracting with key
value from nearest prime value.
Round 1:
Fig 7. Steps involved in round 1
Round 2:
Fig 8. Steps involved in round 2
Round 3:
Fig 9. Steps involved in round 3
Round 4:
Fig 10. Steps involved in round 4
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 06 Pages: 2944-2948 (2016) ISSN: 0975-0290
2947
Example:-
Table 4.Cipher text to binary equivalents form
Cipher text Binary
equivalents91 01011011
59 00111011
28 00011100
76 01001100
194 11000010
255 11111111
0 00000000
255 11111111
234 11101010
68 01000100
56 00111000
210 11010010
202 11001010
252 11111101
0 00000000
254 11111110
Matrix form:-
After rewriting the Table 4 binary value columns as rows
Table 5.After rewriting binary value columns as rows
0 0 0 0 1 1 0 1
1 0 0 1 1 1 0 1
0 1 0 0 0 1 0 1
1 1 1 0 0 1 0 1
1 1 1 1 0 1 0 1
0 0 1 1 0 1 0 1
1 1 0 0 1 1 0 1
1 1 0 0 0 1 0 1
1 0 0 1 1 1 0 1
1 1 0 1 1 1 0 1
1 0 1 0 0 1 0 1
0 0 1 1 0 1 0 1
1 0 1 0 1 1 0 1
0 1 0 0 0 1 0 1
1 0 0 1 1 0 0 1
0 0 0 0 0 0 0 0
Row wise retrieval:
After row wise retrieval of Table 5.
Table 6.Row wise retrieval process
00001101
10011101
01000101
11100101
11110101
00110101
11001101
11000101
10011101
11011101
10100101
00110101
10101101
01000101
10011001
Decryption:-
Table 7.Decryprtion process
Reverse Key
Nearest
prime
10110000 11111111 01001111
10111001 11111110 01000111
10100010 11111011 01011001
10100111 11111110 01011001
10101111 11111100 01010011
10101100 11111111 01010011
10110011 11111100 01001111
10100011 11111010 01011001
10111001 11111110 01000111
10111011 11111100 01000111
10100101 11111100 01011001
10101100 11111111 01010011
10110101 11111010 01001111
10100010 11111011 01011001
10011001 11111000 01100001
Nearest prime values:
79 71 89 89 83 83 79 89 71 71 89 83 79 89 97
Key values: 1 2 5 2 4 1 4 6 2 4 4 1 6 5 8
ASCII values(subtraction b/w key & np):
78 69 84 87 79 82 75 83 69 67 85 82 73 84 89
Plaintext(original message): NETWORKSECURITY
Advantages:-
 Nearest prime values technique is used for the key
generation.
 Mixed column and row wise retrieval process is
extended. Which is one of the flavor added in this
paper.
 It is applicable for 256 characters.
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 06 Pages: 2944-2948 (2016) ISSN: 0975-0290
2948
V. CONCLUSION
A passive attack attempts to learn or make use of
information from the system. Data confidentiality is a
measure of ability of the system to protect its data from a
kind of passive attacks. Data integrity refers to maintain
accuracy and consistency of data. The proposed algorithm
nearest primes cipher provides data confidentiality and
integrity to the system. The cipher text is generated using a
step by step encryption algorithm based on nearest primes
and logical operations. The result of the above operations
is stored in a matrix row wise and retrieves in column wise
to obtain more security.
The future work can be extended to implementation of
secure key exchange mechanism, reducing the time
complexity in key generation using data structures, the
size of data to be encrypted can be increased by increasing
key length. Supplementing authentication security service
to the nearest prime encryption algorithm.
REFERENCES
[1] William Stallings, "Cryptography and Network
Security: Principles and Practices", 4th Edition,
Prentice Hall, 2006, page numbers 30-39.
[2] Hans Delfs and Helmut Knebl, "Introduction to
Cryptography: Principles and Applications", Springer,
first edition, 2002, page numbers 11- 14.
[3] S. Kiran, R. Pradeep Kumar Reddy, “Multi-Stage
encryption using Seeded SDES” International Journal
of Advanced Networking and Applications Volume:
07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-
0290.
[4] B.Bazith Mohammed, “automatic key generation
of Caesar cipher”, international journal of
engineering trends and technology (IJETT),
vol.6,no.6,pp.337-339,dec.2013.
[5] S.G.Srikantaswamy and Dr.H.D.phaneendra,“A
cipher design using the combined effect of arithmetic
and logic operations with substitutions and
transposition techniques“, International Journal of
Computer Applications (0975-
8887),vol.29,no.8,pp.34-36.
Author’s profile
Dr.S.Kiran is assistant
Professor in the
department of Computer
Science and Engineering at
Yogivemana University,
Proddatur. He acquired
M.Tech Degree from
Nagarjuna University,
Guntur. He completed
Ph.D in computer Science in Computer Science from
S. K. University. He has been continuously imparting
his knowledge to several students in research
activities. He published many articles National and
International journals. His research areas are image
processing, Cryptography and Network Security,
Software Engineering and Data mining and Data ware
house.
N.Subramanyan received his
B.Tech degree in Computer
Science and Engineering from
Annamacharya Institute of
Technology & Sciences
,Rajampeta. M.Tech. degree in
Information Technology from
RGM College of Engineering
and Technology, Nandyal.
Currently he is working as Academic Consultant in
the Department of CSE at YSR Engineering College
of Yogi Vemana University,Proddatur. He has got 6
years of teaching experience. He has attended 2
workshops.
Y. Suma is a student in the
department of Computer
Science and Engineering at
Y.S.R Engineering college of
Yogivemana University,
Proddatur. She is studying
3rd B.Tech in CSE. She
attended many workshops ,seminars and published
papers in national and International journals.
K. Hari priya is a student
in the department of
Computer Science and
Engineering at Y.S.R
Engineering college of
Yogivemana University,
Proddatur. She is studying
3rd B.Tech in CSE. She
attended many workshops,seminars and published
papers in national and International journals.

More Related Content

PDF
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
PDF
D010321824
IOSR Journals
 
PDF
Fn3410321036
IJERA Editor
 
PDF
Design and implementation of network security using genetic algorithm
eSAT Publishing House
 
PDF
cns 2marks
ilakiyadinesh
 
PPT
Minor Project- AES Implementation in Verilog
Hardik Manocha
 
PDF
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
TELKOMNIKA JOURNAL
 
PDF
Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution
CSCJournals
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
D010321824
IOSR Journals
 
Fn3410321036
IJERA Editor
 
Design and implementation of network security using genetic algorithm
eSAT Publishing House
 
cns 2marks
ilakiyadinesh
 
Minor Project- AES Implementation in Verilog
Hardik Manocha
 
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
TELKOMNIKA JOURNAL
 
Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution
CSCJournals
 

What's hot (16)

PDF
Performance Evaluation of Message Security Using Fractal Sieve with MMD
ijsptm
 
PPT
Hash crypto
Harry Potter
 
PDF
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
IDES Editor
 
PPT
Hash& mac algorithms
Harry Potter
 
PDF
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
PDF
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
acijjournal
 
PPT
Secure hashing algorithm
Karteek Paruchuri
 
PDF
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
ijcisjournal
 
PPTX
Unit 2
tamil arasan
 
PPTX
Unit 3
tamil arasan
 
PPTX
Information and data security cryptographic hash functions
Mazin Alwaaly
 
PDF
icwet1097
Sapna Agarwal
 
PDF
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTION
ijcisjournal
 
PDF
Proposing an Encryption Algorithm based on DES
International Journal of Science and Research (IJSR)
 
PDF
Crack Wep Wifi Under100seconds
mvde3000
 
PPTX
Hash function
Harry Potter
 
Performance Evaluation of Message Security Using Fractal Sieve with MMD
ijsptm
 
Hash crypto
Harry Potter
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
IDES Editor
 
Hash& mac algorithms
Harry Potter
 
A Comparative Analysis between SHA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
acijjournal
 
Secure hashing algorithm
Karteek Paruchuri
 
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
ijcisjournal
 
Unit 2
tamil arasan
 
Unit 3
tamil arasan
 
Information and data security cryptographic hash functions
Mazin Alwaaly
 
icwet1097
Sapna Agarwal
 
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTION
ijcisjournal
 
Proposing an Encryption Algorithm based on DES
International Journal of Science and Research (IJSR)
 
Crack Wep Wifi Under100seconds
mvde3000
 
Hash function
Harry Potter
 
Ad

Viewers also liked (13)

PDF
Exploring and sharing best practice in assessment - presentation 2
eaquals
 
PDF
Manual de función
Essap S.A.
 
PDF
article
Alan Pike
 
PDF
The Study and Analysis of Effect of MultiAntenna Techniques on LTE network wi...
Eswar Publications
 
PDF
Exhibitor Show_Concept_V2_Review
Chris Schowalter
 
PDF
Gadprf01 pag 05 al 11 pac programado
Essap S.A.
 
DOCX
Nigel_Resume (1)
Nigel Fernandes
 
PDF
DT06POSTER
Luis Cabrera
 
PPT
Section 9
Mohamed Mahmoud
 
PPTX
Section 5
Mohamed Mahmoud
 
PPTX
Arquam_reportfinal
Arquam Md
 
PPT
Section 11 revision
Mohamed Mahmoud
 
PPTX
Startup pitch
Jeanne Trojan
 
Exploring and sharing best practice in assessment - presentation 2
eaquals
 
Manual de función
Essap S.A.
 
article
Alan Pike
 
The Study and Analysis of Effect of MultiAntenna Techniques on LTE network wi...
Eswar Publications
 
Exhibitor Show_Concept_V2_Review
Chris Schowalter
 
Gadprf01 pag 05 al 11 pac programado
Essap S.A.
 
Nigel_Resume (1)
Nigel Fernandes
 
DT06POSTER
Luis Cabrera
 
Section 9
Mohamed Mahmoud
 
Section 5
Mohamed Mahmoud
 
Arquam_reportfinal
Arquam Md
 
Section 11 revision
Mohamed Mahmoud
 
Startup pitch
Jeanne Trojan
 
Ad

Similar to Nearest Prime Cipher for Data Confidentiality and Integrity (20)

PDF
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
PDF
researchpaperfinal1
Sumit Bajaj
 
PPTX
Cryptography in discrete structure .pptx
ayeshaimtiaz067
 
PDF
ASCII Value Based Encryption System (AVB)
IJERA Editor
 
PPTX
A study of cryptography for satellite applications
Rajesh Ishida
 
PDF
A novel block cipher involving keys in a key bunch
eSAT Publishing House
 
PDF
A new cryptosystem with four levels of encryption and parallel programming
csandit
 
PDF
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
cscpconf
 
PDF
Data Communication Using Cryptography Encryption
BRNSSPublicationHubI
 
PDF
A novel block cipher involving keys in a key bunch matrix as powers of the pl...
eSAT Journals
 
PDF
03 UNIT-2.pdf
31ABINESHWARANG
 
PPTX
Cryptography
Pratiksha Patil
 
PPTX
Cryptographic Algorithms: DES and RSA
aritraranjan
 
PPTX
M.Sridevi II-M.Sc (computer science)
SrideviM4
 
PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
PDF
82 86
Editor IJARCET
 
PDF
82 86
Editor IJARCET
 
PDF
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET Journal
 
PPTX
encryption and decryption ,and its types
josereena1
 
PDF
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
IDES Editor
 
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
researchpaperfinal1
Sumit Bajaj
 
Cryptography in discrete structure .pptx
ayeshaimtiaz067
 
ASCII Value Based Encryption System (AVB)
IJERA Editor
 
A study of cryptography for satellite applications
Rajesh Ishida
 
A novel block cipher involving keys in a key bunch
eSAT Publishing House
 
A new cryptosystem with four levels of encryption and parallel programming
csandit
 
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
cscpconf
 
Data Communication Using Cryptography Encryption
BRNSSPublicationHubI
 
A novel block cipher involving keys in a key bunch matrix as powers of the pl...
eSAT Journals
 
03 UNIT-2.pdf
31ABINESHWARANG
 
Cryptography
Pratiksha Patil
 
Cryptographic Algorithms: DES and RSA
aritraranjan
 
M.Sridevi II-M.Sc (computer science)
SrideviM4
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET Journal
 
encryption and decryption ,and its types
josereena1
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
IDES Editor
 

More from Eswar Publications (20)

PDF
Content-Based Image Retrieval Features: A Survey
Eswar Publications
 
PDF
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
 
PDF
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Eswar Publications
 
PDF
Android Based Home-Automation using Microcontroller
Eswar Publications
 
PDF
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Eswar Publications
 
PDF
App for Physiological Seed quality Parameters
Eswar Publications
 
PDF
What happens when adaptive video streaming players compete in time-varying ba...
Eswar Publications
 
PDF
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 
PDF
Spreading Trade Union Activities through Cyberspace: A Case Study
Eswar Publications
 
PDF
Identifying an Appropriate Model for Information Systems Integration in the O...
Eswar Publications
 
PDF
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
PDF
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Eswar Publications
 
PDF
A Literature Survey on Internet of Things (IoT)
Eswar Publications
 
PDF
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Eswar Publications
 
PDF
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Eswar Publications
 
PDF
Impact of Technology on E-Banking; Cameroon Perspectives
Eswar Publications
 
PDF
Classification Algorithms with Attribute Selection: an evaluation study using...
Eswar Publications
 
PDF
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
PDF
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications
 
PDF
Explosive Detection Approach by Printed Antennas
Eswar Publications
 
Content-Based Image Retrieval Features: A Survey
Eswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Eswar Publications
 
Android Based Home-Automation using Microcontroller
Eswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Eswar Publications
 
App for Physiological Seed quality Parameters
Eswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Eswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Eswar Publications
 
A Literature Survey on Internet of Things (IoT)
Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Eswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Eswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Eswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications
 
Explosive Detection Approach by Printed Antennas
Eswar Publications
 

Recently uploaded (20)

PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
The Future of Artificial Intelligence (AI)
Mukul
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 

Nearest Prime Cipher for Data Confidentiality and Integrity

  • 1. Int. J. Advanced Networking and Applications Volume: 07 Issue: 06 Pages: 2944-2948 (2016) ISSN: 0975-0290 2944 Nearest Prime Cipher for Data Confidentiality and Integrity Dr. S. Kiran Assistant Professor, Dept of CSE, YSREC of YV University, Proddatur, India Email: [email protected] N. Subramanyan Teaching Assistant, Dept of CSE, YSREC of YV University, Proddatur, India Email: [email protected] Y. Suma Student, III B.Tech CSE, YSREC of YV University, Proddatur, India Email: [email protected] K. Haripriya Student, III B.Tech CSE, YSREC of YV University, Proddatur, India Email: [email protected] -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- Communication is the process of transmitting information from source to destination. The information exchanged between sender and receiver through the proper channel. The information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information cryptography techniques are used. The key is playing prominent role in cryptography. This paper proposes a novel method for key generation by using nearest primes. Further 2’s complement and logical operations are used in encryption and decryption process. The final cipher text is generated by representing the intermediate cipher in matrix form and then read by column wise. Keywords - 2’s complement, Ciphertext, Cryptography, Nearest prime number, Plaintext, XOR operation. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: May 08, 2016 Date of Acceptance: May 25, 2016 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Cryptography[1] is used to constrain the potential sender and/or receiver of a message. Cryptography is based on secret key. The sender can encode its message so that it can only decode with suitable key. Cipher[1] is the algorithm that is used to transform plaintext into cipher text, this method is called encryption, in other words, it’s a mechanism of converting readable and understandable data into “meaningless” data, and it is done as follows: = � � (1) Where � is the encryption algorithm using key k, C is a cipher text and P is a plain text. Symmetric and asymmetric are two types of encryption algorithms. The opposite of cipher mechanism is called decipher that is the algorithm which recovers the plain text from cipher text, this is called decryption, in other words, it’s a mechanism of converting “meaningless” data into readable data, and it is done as follows: � = �−1 (2) Where �−1 is the decryption algorithm using key k. Fig 1. Conventional Encryption Model Security services: Here are some of the services that are provided by the security[2].  Confidentiality(privacy)  Authentication(who created or sent the data)  Data integrity(has not been altered)  Non-repudiation(the order is final)  Access control(prevent misuse of resources)  Availability (permanence, non-erasure). If we are protecting confidential information then cryptography is provide high level of privacy of individuals and group. There are a number of cryptographic primitives-basic building blocks, such as block ciphers, stream ciphers and
  • 2. Int. J. Advanced Networking and Applications Volume: 07 Issue: 06 Pages: 2944-2948 (2016) ISSN: 0975-0290 2945 hash functions. Cryptography has being used for millennia to safeguard military and diplomatic communications. Data encryption standard adopted by the National institute of standards is the most commonly used symmetric encryption algorithm. Black-box transformations are some of the transformations that are hidden in the algorithm. The proposed work/algorithm follows symmetric cryptographic system. II. HISTORY The word cryptography[1] comes from the Greek Word ‘Kryptos’ and ‘Graphein’. For the past 20 years, the most commonly used symmetric encryption algorithm in United States for civilian applications. In 2001, NTST adopted a new application algorithm called the advanced encryption standard (AES) to replace DES. AES is another symmetric block cipher which uses key lengths of 128,192 and 356 bits and works on 128 bit blocks. Generally, the algorithm is compact and efficient. There are several symmetric block encryption algorithms in use today. One is Twofish algorithm and the other is RC5.The Twofish algorithm is fast, compact and easy to implement. RC5 can vary in key length, number of transformations and block size. In 1970, one “Crypto group” was developed by IBM named as Horst-Festal. RC4 is the most common stream cipher which is designed to encrypt and decrypt a stream of bytes or bits rather than a block. RC4 as used in WEP (IEEE standard 802.11) has been found to be breakable in amount of computer time which itself has vulnerabilities. III. EXISTING WORK The existing method[3] generates a 64 bit random sequence for key generation. Key generation consists of two parts. One is raster scan method and the other is store and forward method. The existing method has various stages of encryption and decryption. In the first stage, caeser cipher[4] substitution method is used, which is computed by using the key, generated from raster scan method. In the second stage, using lookup table, the decimal equivalent of intermediate ciphertext is taken and then XOR operation is performed between intermediate cipher binary value and the key generated from store and forward method. In the third stage, column wise retrieval and nibble grouping is applied. Limitations: 1. It is applicable only for 94 characters. It is not providing full support for ASCII characters. 2. Look up table is necessary. 3. Only column wise retrieval process is proposed. IV. PROPOSED WORK The proposed work generates a 8-bit random sequence for key generation. Key is obtained by performing subtraction between plain text values and its nearest prime values. Several stages are involved in encryption and decryption uses arithmetic and logical operations[5][6]. A. Key Generation Each character of plain text converted into ASCII value. Further, find nearest prime of it. For key generation find the difference between nearest prime and plain text ASCII. Consider the difference value as key, it is continued for each character of plain text. Key generation algorithm steps:- Step1: Initially, the given plain text is converted into its equivalent ASCII values. Step2: Find nearest prime values for ASCII values. Step3: The key values are obtained from finding difference between ASCII and nearest prime values. Step4: Perform 2’s complement for generated value. Fig 2. Flow chart showing key generation process Example for key generation: Plain text is: NETWORKSECURITY ASCII values are: 78 69 84 87 79 82 75 83 69 67 85 82 73 84 89 Nearest primes values are: 79 71 89 89 83 83 79 89 71 71 89 83 79 89 97 Key values are: 1 2 5 2 4 1 4 6 2 4 4 1 6 5 8 Table 1. Key generation process Key Value Binary code 2’s complement 1 00000001 11111111 2 00000010 11111110 5 00000101 11111011 2 00000010 11111110 4 00000100 11111100 1 00000001 11111111 4 00000100 11111100 6 00000110 11111010 2 00000010 11111110 4 00000100 11111100 4 00000100 11111100 1 00000001 11111111 6 00000110 11111010 5 00000101 11111011 8 00001000 11111000
  • 3. Int. J. Advanced Networking and Applications Volume: 07 Issue: 06 Pages: 2944-2948 (2016) ISSN: 0975-0290 2946 B. Encryption algorithm Round1: perform XOR operation between nearest prime and key. Round2: reverse the result of round1. Round3: store it in matrix form(column wise). Round4: retrieve values from two rows of each n*4 matrix. Find equivalent ASCII and consider to be as final cipher text. Round 1: Fig 3. Steps involved in round 1 Round 2: Fig 4. Steps involved in round 2 Round 3: Fig 5. Steps involved in round 3 Round 4: Fig 6. Steps involved in round 4 Example:- Table 2.Encryption process Nearest Prime Key XOR Reverse 01001111 11111111 10110000 00001101 01000111 11111110 10111001 10011101 01011001 11111011 10100010 01000101 01011001 11111110 10100111 11100101 01010011 11111100 10101111 11110101 01010011 11111111 10101100 00110101 01001111 11111100 10110011 11001101 01011001 11111010 10100011 11000101 01000111 11111110 10111001 10011101 01000111 11111100 10111011 11011101 01011001 11111100 10100101 10100101 01010011 11111111 10101100 00110101 01001111 11111010 10110101 10101101 01011001 11111111 10100010 01000101 01100001 11111000 10011001 10011001 Matrix form:- Arranging the reverse values in row wise in the matrix. Table 3.after placing reverse values row wise 0 0 0 0 1 1 0 1 1 0 0 1 1 1 0 1 0 1 0 0 0 1 0 1 1 1 1 0 0 1 0 1 1 1 1 1 0 1 0 1 0 0 1 1 0 1 0 1 1 1 0 0 1 1 0 1 1 1 0 0 0 1 0 1 1 0 0 1 1 1 0 1 1 1 0 1 1 1 0 1 1 0 1 0 0 1 0 1 0 0 1 1 0 1 0 1 1 0 1 0 1 1 0 1 0 1 0 0 0 1 0 1 1 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 Cipher text is:91 59 28 76 194 255 0 255 234 68 56 210 202 252 0 254 C. Decryption algorithm Round 1: Rearrange the cipher text information in the form of matrix by finding their binary equivalents. Round 2: Retrieve row wise binary values and reverse them. Round 3: Reversed values are XOR with key to find nearest prime values. Round 4: Find the original value by subtracting with key value from nearest prime value. Round 1: Fig 7. Steps involved in round 1 Round 2: Fig 8. Steps involved in round 2 Round 3: Fig 9. Steps involved in round 3 Round 4: Fig 10. Steps involved in round 4
  • 4. Int. J. Advanced Networking and Applications Volume: 07 Issue: 06 Pages: 2944-2948 (2016) ISSN: 0975-0290 2947 Example:- Table 4.Cipher text to binary equivalents form Cipher text Binary equivalents91 01011011 59 00111011 28 00011100 76 01001100 194 11000010 255 11111111 0 00000000 255 11111111 234 11101010 68 01000100 56 00111000 210 11010010 202 11001010 252 11111101 0 00000000 254 11111110 Matrix form:- After rewriting the Table 4 binary value columns as rows Table 5.After rewriting binary value columns as rows 0 0 0 0 1 1 0 1 1 0 0 1 1 1 0 1 0 1 0 0 0 1 0 1 1 1 1 0 0 1 0 1 1 1 1 1 0 1 0 1 0 0 1 1 0 1 0 1 1 1 0 0 1 1 0 1 1 1 0 0 0 1 0 1 1 0 0 1 1 1 0 1 1 1 0 1 1 1 0 1 1 0 1 0 0 1 0 1 0 0 1 1 0 1 0 1 1 0 1 0 1 1 0 1 0 1 0 0 0 1 0 1 1 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 Row wise retrieval: After row wise retrieval of Table 5. Table 6.Row wise retrieval process 00001101 10011101 01000101 11100101 11110101 00110101 11001101 11000101 10011101 11011101 10100101 00110101 10101101 01000101 10011001 Decryption:- Table 7.Decryprtion process Reverse Key Nearest prime 10110000 11111111 01001111 10111001 11111110 01000111 10100010 11111011 01011001 10100111 11111110 01011001 10101111 11111100 01010011 10101100 11111111 01010011 10110011 11111100 01001111 10100011 11111010 01011001 10111001 11111110 01000111 10111011 11111100 01000111 10100101 11111100 01011001 10101100 11111111 01010011 10110101 11111010 01001111 10100010 11111011 01011001 10011001 11111000 01100001 Nearest prime values: 79 71 89 89 83 83 79 89 71 71 89 83 79 89 97 Key values: 1 2 5 2 4 1 4 6 2 4 4 1 6 5 8 ASCII values(subtraction b/w key & np): 78 69 84 87 79 82 75 83 69 67 85 82 73 84 89 Plaintext(original message): NETWORKSECURITY Advantages:-  Nearest prime values technique is used for the key generation.  Mixed column and row wise retrieval process is extended. Which is one of the flavor added in this paper.  It is applicable for 256 characters.
  • 5. Int. J. Advanced Networking and Applications Volume: 07 Issue: 06 Pages: 2944-2948 (2016) ISSN: 0975-0290 2948 V. CONCLUSION A passive attack attempts to learn or make use of information from the system. Data confidentiality is a measure of ability of the system to protect its data from a kind of passive attacks. Data integrity refers to maintain accuracy and consistency of data. The proposed algorithm nearest primes cipher provides data confidentiality and integrity to the system. The cipher text is generated using a step by step encryption algorithm based on nearest primes and logical operations. The result of the above operations is stored in a matrix row wise and retrieves in column wise to obtain more security. The future work can be extended to implementation of secure key exchange mechanism, reducing the time complexity in key generation using data structures, the size of data to be encrypted can be increased by increasing key length. Supplementing authentication security service to the nearest prime encryption algorithm. REFERENCES [1] William Stallings, "Cryptography and Network Security: Principles and Practices", 4th Edition, Prentice Hall, 2006, page numbers 30-39. [2] Hans Delfs and Helmut Knebl, "Introduction to Cryptography: Principles and Applications", Springer, first edition, 2002, page numbers 11- 14. [3] S. Kiran, R. Pradeep Kumar Reddy, “Multi-Stage encryption using Seeded SDES” International Journal of Advanced Networking and Applications Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975- 0290. [4] B.Bazith Mohammed, “automatic key generation of Caesar cipher”, international journal of engineering trends and technology (IJETT), vol.6,no.6,pp.337-339,dec.2013. [5] S.G.Srikantaswamy and Dr.H.D.phaneendra,“A cipher design using the combined effect of arithmetic and logic operations with substitutions and transposition techniques“, International Journal of Computer Applications (0975- 8887),vol.29,no.8,pp.34-36. Author’s profile Dr.S.Kiran is assistant Professor in the department of Computer Science and Engineering at Yogivemana University, Proddatur. He acquired M.Tech Degree from Nagarjuna University, Guntur. He completed Ph.D in computer Science in Computer Science from S. K. University. He has been continuously imparting his knowledge to several students in research activities. He published many articles National and International journals. His research areas are image processing, Cryptography and Network Security, Software Engineering and Data mining and Data ware house. N.Subramanyan received his B.Tech degree in Computer Science and Engineering from Annamacharya Institute of Technology & Sciences ,Rajampeta. M.Tech. degree in Information Technology from RGM College of Engineering and Technology, Nandyal. Currently he is working as Academic Consultant in the Department of CSE at YSR Engineering College of Yogi Vemana University,Proddatur. He has got 6 years of teaching experience. He has attended 2 workshops. Y. Suma is a student in the department of Computer Science and Engineering at Y.S.R Engineering college of Yogivemana University, Proddatur. She is studying 3rd B.Tech in CSE. She attended many workshops ,seminars and published papers in national and International journals. K. Hari priya is a student in the department of Computer Science and Engineering at Y.S.R Engineering college of Yogivemana University, Proddatur. She is studying 3rd B.Tech in CSE. She attended many workshops,seminars and published papers in national and International journals.