Académique Documents
Professionnel Documents
Culture Documents
ABSTRACT:
The primary goal guiding the design of any encryption algorithm must provide security against unauthorized attacks. Integrity checking is the crucial for message modification in client server communications. This project provides secure message integrity verification at the receivers side. This project provides the performance comparison between the proposed algorithm BEST with the existing algorithms like AES,DES.The chief motive leading the design in an encryption method must share security against unauthorized attacks. In this Proposed system, a Block Encryption Standard for Transfer of data (BEST) is planned to gain the various goals of security i.e., Availability, Confidentiality and Integrity. The evaluation has been performed by performing several algorithms. to process different sizes of data blocks to assess the algorithms encryption and decryption speed.In this proposed work BEST algorithm is implemented in order to verify intergrity security for data as well as files are concern.Experimental results shows that BEST outperformed for protecting important information at receivers end of client server communication. I INTRODUCTION Like the internet came into existence, security was low profile and on the back burner for most corporations. Connectivity became a primary concern for further information Technology Professionals[1]. In that beginning, malicious users would infiltrate and modify systems and data. Sending out viruses and hacking through weak unprotected networks, these users became a direct threat to legitimate business that desired to expand and grow globally. Public key algorithm: A public key algorithm consists of a public key (B) used to encrypt a message while a private key (A) designed to decrypt the message, for just one public key there's one private key (A I, B I) and only the private key that belongs to the general public key can decrypt a message encrypted from the public key. Resulting from this, anyone can use the public key. If someone wishes to send message, they encrypt the message in the receiver's public key and then the receiver, who knows the private key, can decrypt this message. This algorithm may also work outstandingly well to sign a message to prove that it is really the sender who's sending a message, to do so the sender encrypts the message along with private key that can be decrypted only in
the public key. There are a lot of cryptography algorithms have actually been created; it isn't the purpose of this research. To go into great detail about cryptography, so only two of the cryptography algorithms can be quickly showed provide a general idea of just how to encrypt and decrypt a messages or files. Symmetric-key algorithms absolutely are a class of algorithms for cryptography which use pettily related cryptographic keys for both decryption and encryption. The encryption key is pettily regarding the decryption key, for the reason that they may be equal or there is an easy and quick convert to end up among the two keys. The keys, in training, represent a shared secret between two or more gatherings that can be used to maintain a fitness information link. Other terms for symmetric-key encryption are single-key, one-key and private key encryption. Making use of latter term will usually collide with the words private key in public key cryptography.Many Chief Information Officers declare that the ever growing concerns of security is definitely one of the biggest tasks facing the infotech field today. With spyware/malware, worms, viruses, internal threats and hackers, companies today face their most demanding have ecommerce growth. With customers all over the globe, the protection of local assets together with the customers accounts details are of the utmost importance. The historical events which may have caused this sort of concern with computers began in the simplex hacking of phones by Captain Crunch and the adding of boot sector viruses to floppy disks. The proliferation of them malicious activities now could potentially affect a lot of users within one couple of minutes. Multiple significant events have happened during the last forty years. This timeline is a brief listing of major events that happened[2]. As the timeline above shows, malicious activities have been established for forty years and so are growing by progress day-after-day. With government laws on cyber terrorism being put into place all over the world, the continual infection of machines alongside hacking is at an all time high. The studies materials presented show on account of ecommerce and of course the growth of the net, there isn't any end in site to the proliferation of those activities. This study is going to show you research materials to offer several opinions upon the recommendations to protect your network infrastructure. Message Digest the 5th one (MD5) The MD5 (Message Digest number 5) algorithm generate a unique, 128-bit cryptographic message digest value obtained from the items in input stream. This value is considered to be
Page 747
Page 748
Message Digest
MD5
E(M,BEST)
BEST ENCRYPTION
Encrypted hash for GC MESSAGE INTEGRITY AT RECEIVER SIDE Receiver Message Encrypted Hash value MD5(Hash Value)
D(E(M,BEST),BEST)
Compare
Hash Value
5. EXPERIMENTAL RESULTS
Message Displayed For Receiver
Page 749
Hmac function: function hmac (key, message) if (length(key) > block_size) then key = hash(key) // keys about block_size are shortened end if if (length(key) < block_size) then key = key [0x00 * (block_size - length(key))] // keys shorter than block_size are zero_padded ('' is concatenation) endif o_key_pad = [0x5c block_size] key // Where block_size is the idea that of the underlying hash function i_key_pad = [0x36 * block_size] key // Where is XOR return hash(o_key_pad hash(i_key_pad message)) // Where '' is concatenation function.
Experimental Results:
All experiments were performed with the configurations Intel(R) Core(TM)2 CPU 2.13GHz, 2 GB RAM, and the operating system platform is Microsoft Windows XP Professional (SP2).
Page 750
Fig 7: Message integrity for file Fig 11: Successfully checking the file message integrity
REFERENCES:
[1] Block Encryption Standard for Transfer of Data , Akhil Kaushik, 201O International Conference on Networking and Information Technology. [2] W.Stallings, "Cryptography and network security principles and practice," Fourth edition, Prentice hall, 2007. [3] A.S. Tanenbaum, "Computer Networks", Fourth Edition, Prentice hall, 2004. [4] P.P Charles & P.L Shari, "Security in Computing: 4th edition", PrenticeHall, lnc.,2008. [5]Willian Stallings, Crytography and Network Security, Principles and Practives, Prentice Hall of India, Third edition. [6] Virtual Private Networks Solutions for Remote Access., 2004 Schlumberger Information Solutions, Houston, Texas. [7]Minaam D S A, Kader H M A, and Hadhoud M M (2010), Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types, International Journal of Network Security, Vol.11, No.2, PP.7887, Sept. [8]Uddin M, Khowaja K and Rehman A A (2010), Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October. [9]Sen J (2010), An intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks, Second International Conference on Computational Intelligence, Communication Systems and Networks. [10]Schneier B (1996), Applied Cryptography, John Wiley and Sons, Inc.
Page 751