You are on page 1of 4

Volume 1, No.

3, May 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/

ASCII BINARY SELF GENERATED KEY ENCRYPTION


ABDULLA SHAIK Department of IT, RTMNU, Nuva College of Engineering & Technology, Nagpur. Maharashtra 440015, India snanmka@gmail.com
AbstractThere are many security aspects in data communication. Encryption is also a way to provide security in data communication. Several techniques are already introduced for encryption as well as decryption. Some of them do not provide so much security as required, but many techniques are very useful and can be implement to be made more secure our data. The most common attack is Brute force attack which makes a threat in data communication and cryptanalysis also make easy to break the code. But for normal data we can use medium level algorithm which provide more security and less time to implement. Any encryption algorithm does not have only aim of security. It also has a major concern about the applicability, time consumption for implementation and use. So here we have discussed encryption techniques which itself generate key at encryption time to protect communicating data. This technique is analyzed for the brute force attack and compared with the other in term of security and time consuming for implementing and safety. We have analyzed these encryption techniques on the basis of cryptanalysis and estimated time for happening it and possibility of attack. This analysis gives some better results about comparison among these encryption techniques to provide more security. Keywords- Encryption, Decryption, Brute Force Attack, Cryptanalysis, Security, Cipher text

I.

INTRODUCTION

Today communication has always been an integral part of our existence. What started as simple sign-communication centuries ago has evolved into many forms of communication today the Internet being just one such example. Methods of communication today include _ Radio communication _ Telephonic communication _ Network communication _ Mobile communication All these methods and means of communication have played an important role in our lives, but in the past few years, network communication, especially over the Internet, has

emerged as one of the most powerful methods of communication with an overwhelming impact on our lives. Such rapid advances in communications technology have also given rise to security threats to individuals and organizations. In the last few years, various measures and services have been developed to counter these threats. From securing sensitive military information to securing personal messages, you often would be confronted with the need of asking information to protect it. One of the most important methods that help provide security to messages in transit is cryptography. It helps overcome the security issues as described above, involved in the delivery of messages over any communication channel. There are many encryption techniques which have a major role to provide the security for data communication. Encryption as well as decryption both is important phases of security. When data is send by the sender, it is encrypted with the help of secret key, encrypted message is called cipher text and it is sent to the receiver. If this cipher text is captured by other one, it will not be able to understand or use by other one. When receiver receive the cipher text, then again key is use to convert it original plain text. So in this process at the communication line only cipher text consist, which is non sense for the other. Original message resident at the both terminal. So the data is secure while communication. This encryption process is good at a time but as the time passes and technology explores hacker became able to steal information. The most common way to steal information is with the help of Brute Force Attack. This attack tries to find out the original plain text. So to be making secure our data, various different algorithms are used. So that this attack can be made more time consuming and the probability of finding the key or original message become much less. Various types of encryption techniques are available, but the application of them creates difference. When data is more sensitive and cannot be lost at any cost then many costly algorithms are used e.g. MD5, AES (Advance Encryption standard), DES (Data Encryption Standard) and other hardware implementation can also be derived for them. But

2012, http://www.journalofcomputerscience.com - TIJCSA All Rights Reserved

112

Abdulla Shaik, The International Journal of Computer Science & Applications (TIJCSA) ISSN 2278-1080, Vol. 1 No.3 May 2012 for normal data we can use medium level algorithm which provide more security and less time to implement. Any encryption algorithm does not have only aim of security. It also has a major concern about the applicability, time consumption for implementation and use. So here we have discussed encryption techniques which itself generate key at encryption time to protect communicating data. This technique is analyzed for the brute force attack and compared with the other in term of security and time consuming for implementing and safety. II. A. ASCII BINARY SELF GENERATED KEY ENCRYPTION generated key is distributed among both sides. Due to the secrecy of key generation the message is more secure in this approach. And more over the key generation process is automatically done in this algorithm. The sender no needs to have thinking of key generation. The additional advantage is that if the plain text is change automatically the key also change. Based on plain text encrypted text and key is generated by ASCII Binary Self Generated Key Encryption Technique. B. Algorithmic Flow The ASCII Binary Self Generated Key Encryption Technique is easy to understand and there is no difficulty while implementation. The process of encryption and decryption is shown bellow figures. To do encryption process Step1: Plain text converted into ASCII equivalent decimal numbers codes. Step2: ASCII equivalent decimal numbers codes are converted in to binary format. Step3: Count the occurrence of 0 and 1s continually. Step4: Distinct 0, 1 and remain text will consider as key. Step5: Remove 0, 1. only key will remain. Step6: Key is converted into octal number format. Step7: now convert Octal to decimal. Step8: The decimal Equivalent ASCII Codes are generated Step10: The new text is Cipher text.

ABSGKE Most of the encryption algorithms are either Symmetric or Asymmetric encryption. The oldest and best-known technique is that a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key. But the problem is that the sender is needed to generate the secret key and that is distributed or share among both side. Asymmetric encryptions there are two different key are available public and private key only public key is share.

Fig 2.1a: Symmetric Key Encryption Technique

Fig 2.1b: Asymmetric Key Encryption Technique

Here in the ASCII Binary Self Generated Key Encryption Technique we are provided a new way to generate key at run time of encryption process then the run time

Fig 2.2a: Encryption Technique

The reverse process from plain text to cipher text is just similar in reverse direction. In this reverse processes the

2012, http://www.journalofcomputerscience.com - TIJCSA All Rights Reserved

113

Abdulla Shaik, The International Journal of Computer Science & Applications (TIJCSA) ISSN 2278-1080, Vol. 1 No.3 May 2012 previously generated is going to play a major role. Because it is a symmetric algorithm both encryption and decryption use the same key.
First find out the number of 0s and 1s. it is sown in different color 00111101001111100100000001110101011011000110110000111 101 Now count 0 and 1s separately one by one Counting 0214011102150211071301110111011201120312011204140111 According to above first 0 comes twice it shows 02 and 1 came four time so 14 similarly all the text is counted Now grouping of 0,1 0124112521731111121232124411 Here is key: 24112521731111121232124411 It is self generated base on the given input Convert the key in to octal format here 0, 1 are removed. 24112521731111121232124411 241 125 217 311 111 212 321 244 11 Now the to convert key from octal to Decimal number format 161 85 143 201 73 138 209 164 9 Finally the SCII Values of decimal numbers U I The Encrypted message is: U I

Fig 2.2b: decryption Technique

As we discuss earlier the key is generated it self in the algorithm based on plain text key length and cipher text length are going to be decided. This is the biggest advantage having in this algorithm, and clearly no difficult in the implementation. C. Processing The ASCII Binary Self Generated Key Encryption Technique is easy to understand and there is no difficulty while implementation. Let consider the Plain text: Abdulla
The characters in the given plain text are a b d u l l a The ASCII values of the characters simultaneously 61 62 64 117 108 108 61 Now the above ASCII values of plain text are converted in to binary numbers simultaneously 00111101 00111110 01000000 01110101 01101100 01101100 00111101 Above are the binary number for the given plain text . Now the binary Format of given plain text 00111101001111100100000001110101011011000110110000111 101 In this step we are doing counting and grouping of 0,1 continually

As process goes on at the mid point it is having self generated key so that the security of the data is increase. And the key which is generating is unpredictable till it is not generated. And compare to plain text and cipher text number of characters may increase are may be decrees. It shows in the above cipher text. D. Compression with other algorithms Message encryption allows the encryption of data using symmetric as well as asymmetric encryption mechanisms. There are different methods having hiding data, establishing its authenticity, and preventing its undetected modification or unauthorized use. There are several types of algorithms are available now to do this. These techniques provide much security at a level but todays high technology and great mind made easy to break the message from these encryption techniques. So we always cannot say the most secure algorithm for security. But at a level these techniques can be used. The main applications of these techniques occur where security is required at a level but speed requirement is much more. As the complexity of the encryption techniques increase, security also increases but speed decreases. So these algorithms required maintaining both and data is not so much sensitive. The Let consider plain text is having 20 characters According to CAESAR CIPHER, 20 character data is input to the algorithm and average time taken by encryption process was obtained 0.0218 sec approximately. Similarly when the Brute force attack has done then time to get the

2012, http://www.journalofcomputerscience.com - TIJCSA All Rights Reserved

114

Abdulla Shaik, The International Journal of Computer Science & Applications (TIJCSA) ISSN 2278-1080, Vol. 1 No.3 May 2012 correct original data was calculated as 0.05 sec approximately. It clearly shows that this approach is easily hacks by hacker in less than a second. According to MONOALPHABETIC CIPHER, 20 character data is input to the algorithm and average time taken by encryption process was obtained 0.03 sec approximately. It is also shows that this approach also easily hacks by hacker in less than a second. If we consider the other algorithms like POLYALPHABETIC CIPHER, TRANSPORTATION TECHNIQUES result is much more similar. ASCII Binary Self Generated Key Encryption Technique is easy to understand and there is no difficulty while implementation. The main advantage is that it is having self generated key approach so that the security of the data is increase. And the key which is generating is unpredictable till it is not generated. If 20 character data is input to the algorithm and average time taken by encryption process was obtained 0.6 sec approximately. Similarly when the Brute force attack has done then time to get the correct original data was calculated as 0.1 sec approximately. It clearly shows that this approach is easily hacks by hacker in less than a second. And compare to plain text and cipher text number of characters may increase are may be decrees. So that the security aspect is high compare to other algorithms. III. CONCLUSION The main applications of encryption techniques are security is required at a level but speed requirement is much more. As the complexity of the encryption techniques increase, security also increases but speed decreases. The ASCII Binary Self Generated Key Encryption Technique is easy to understand and there is no difficulty while implementation. The main advantage is that it is having self generated key approach so that the security of the data is increase. And the key which is generating is unpredictable till it is not generated. And compare to plain text and cipher text number of characters may increase are may be decrees. So that the security aspect is high compare to other algorithms. Find ding the combinations with the plain text by using brute force attack is also difficult in this algorithm. ACKNOWLEDGMENT I am grateful to My Brothers Dr. Khaleel Basha Shaik and Dr. Nazer Shaik , and P. Manoj Kumar for giving guideline to me. Finally last but not the least Mr. A. Hasheem Babu, Mr. Mohammad Shaik and other my friends for their insightful comments. REFERENCES [1] Cryptography and Network Security, Fourth Edition, William Stallings, June 3, 2010 [2] CRYPTOGRAPHY AND NETWORK SECURITY: PRINCIPLES AND PRACTICE, BY WILLIAM STALLINGS , PRENTICE HALL, FIFTH EDITION,JANUARY 24, 2010 [3] Computer Network: A Top Down Approach, Behrouz Forouzan, Firouz Mosharraf, March 7, 2011,Mc Graw hail. [4] CRYPTOGRAPHY ENGINEERING: DESIGN PRINCIPLES AND PRACTICAL APPLICATIONS, NIELS FERGUSON, BRUCE SCHNEIER, MARCH 15, 2010 [5] A Comparative Evaluation of Various Encryptions Techniques Committing Cryptanalysis, Proceedings of the 5th National Conference; INDIACom-2011, New Delhi. [6] The Transitioning of Cryptographic Algorithms and Key Sizes, nist,August 3, 2009. [7] Encryption Algorithms Decrypted, CDI, Forstmann Court, January 2007 [8] AES-CBC + Elephant diffuser A Disk Encryption Algorithm for Windows Vista, Niels Ferguson, Microsoft ,August 2006 [9] Analysis and Comparison of Image Encryption, World Academy of Science, Engineering and Technology ,3 2005 [10] Communication Security - available techniques, Axis Communications WHITE PAPER,2003

ABOUT AUTHOR Abdulla Shaik working as Assistant professor in Department of MCA, Nuva College of Engineering and Technology. Previously worked as lecturer in Joginapally B R Engineering College, Hyderabad. He completed his MCA in 2008, M.Tech(CSE) in 2010 from Acharya Nagarjuna university, Guntur with distinction. Till now he has published 3 international research papers. His area of interest is software engineering, Operating Systems, Data Structures and the Software Testing Methodologies.

2012, http://www.journalofcomputerscience.com - TIJCSA All Rights Reserved

115

You might also like