You are on page 1of 5

Volume 5, Issue 1, January – 2020 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Cryptosystems Using Algorithms,


Mechanism Techniques and Network
Privacy Management- A Survey
G. Avinash (1), B.Ashwin Meshak (2) , K.Gokul Prasath (3), R.Karthick Raja (4), U. Sarath (5)
Department of Electronics and Telecommunication Engineering
Karpagam College of Engineering, Coimbatore

Abstract:- With the advancement in technology, a need II. HACKING – A LITERATURE REVIEW
for secured data communication also arises which is
fulfilled by security mechanism techniques like data The term “Hacker” originally refers to someone who
integrity, digital signatures, Traffic Padding, Routing analysed computers deeply. Today, media recognised
Control, and access control. In various organizations, Hackers as “those who committed computer crimes”
enterprises and institutions, network privacy is involved [1].Two serious types of hackers include paid hackers and
and it is one of the major parameters. Confidentiality of underemployed hackers. Criminal hackers, students,
the information is a foremost thing for a concern. For security experts are the major categories in which a hacker
the protection of data and secured communication, this is likely to fall under. Ethical hacking is hired in large
paper aims at implementing several algorithms and internet service based corporations. Hacking trend is
mechanism techniques. increasing on a large basis particularly among the students.
Students enroll in computer-related courses. 80% of
I. INTRODUCTION hacking activity on the Internet is caused because of student
hackers. Using a computer network directly, Internet
The term cryptography refers to “secret writing”. connection, Remote control server are the major ways
Commonly termed as “Cipher-system”, Cryptography is a through which a hacker tries to access network. A series of
technique used to transform and transmit highly methods are used by hackers in order to target an attack.
confidential data or Information in an encoded way so that When the resources are infected with virus or malware
only authorized can obtain or work on it and illegal data significant data loss occurs along with the eradication of
accessing can be avoided. It is a Greek origin word in components of the network [6]. Through these virus
which “crypto” refers to hidden and “graphy” refers to activities, hard disks and processors gets destroyed and it
writing, so cryptography refers to hiding or secret writing. utilises large scale memory and slows down the system’s
Cryptography can also be referred to the “art and science of performance[9].
achieving security by encoding message to make them non-
readable which means it is used for privacy purpose”
.Cryptography introduces techniques such as
confidentiality, integrity and authenticity within on-going
data communication.

Two different types of cryptography exist. They are


symmetric key and asymmetric key cryptography. Plain
text, cipher text, encryption and decryption are the most
important key terms that deals a cryptosystem. Another
technique used in the data hiding is “Steganography”. In
Fig 1
this technique, hidden message is absent and original data
can’t be accessed. Steganography means cover writing.
Criminal hackers are those who have compromised
Steganography prevents secret information by creating the
internet services to steal credit or debit card numbers,
suspicion. Steganography refers to the practice of
aadhar card details and other details[1]. Recently,
communicating using hidden messages, often disguised
camscanner, a mobile application that allows Android
within something else where one would not expect a
devices to be used as image scanners has been hacked. On
message to be contained in. Various forms of
August 27, 2019, Russian security provider Kaspersky
steganography include text, audio, video, images.
Lab found that recent versions of the Android app
distributed an advertising library containing a Trojan
Dropper, which was also included in some apps preinstalled
on several Chinese mobiles and our personal data hacking.
The advertising library decrypts a Zip archive which
subsequently downloads additional files from serves
controlled by hackers, allowing the hackers controlling the

IJISRT20JAN621 www.ijisrt.com 800


Volume 5, Issue 1, January – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
device [2]. Google ,an American based organization, as secret key cryptography [8]. In a public key
removed the application from the Google playstore. A new cryptosystem, different keys are used for encryption and
version of the application was launched by Google Play decryption process. In a public key encryption
Store on September 5, 2019. cryptosystem, major elements are involved are plain text,
encryption algorithm, decryption algorithm, public keys,
III. ANALYSIS OF ALGORITHMS TO private keys and cipher text. A plain text is an information
IMPLEMENT PRIVACY MANAGEMENT which is an input data and cipher text is the encrypted
message which is also the output[4]. Public and private
In general, a cryptographic system has two types of keys have been selected for encryption and decryption
keys namely secret key or private key and public key. process. The encryption process on the plaintext and
When the same key is used for both encryption and decryption process on the cipher text follows several
decryption such encryption, then that mechanism is known algorithms.

Fig 2

A. Diffie-Hellman Key Exchange:  Implementing Rsa Algorithm:


Two users namely Alice and Bob have to agree
on p and q in private and they choose positive whole- STEP 1: GENERATION OF RSA MODULES:
number personal keys as a and b, both less than the prime- In the generation of RSA module, given two prime
number modulo p. Each side maintain ’a’ as private value numbers p and q, their product ‘N’ can be evaluated as
and ‘b’ as public value. Next, Alice and Bob figures out follows:
public keys a* and b* based on their personal keys N=p*q
according to the formulas: Here, we assume ‘N’ to be a specified large number.
 a* = qa *mod p
and STEP 2: DERIVED INTEGER
 b* = qb *mod p Here, we assume a number ‘e’ such that |e|>1 and it should
be less than (p-1) and (q-1). There should be no common
These two users share their public keys a* and b* over factor of (p-1) and (q-1) except 1(prime number).
a transmission medium assumed to be insecure, such as
the Internet. From these public keys, a number x can be STEP 3: GENERATION OF PUBLIC KEY
made to generate by either user on the basis of their own The two pair of numbers n and e forms the RSA public key
personal keys. To compute X, Alice uses the formula and it is made public.
 x = (b*)a mod p
Bob computes x using the formula STEP 4: GENERATION OF PRIVATE KEY
 x = (a*)b mod p To evaluate private key ‘d’ from the numbers p, q and e.
The mathematical relationship between the numbers is
The value of x turns out to be the same according any given by
of the above two formulas. Exchanging of secret value has M= (p-1)*(q-1);
been made. However, the personal keys a and b, which are e*d=1 mod(M);
critical in the calculation of x, have not been
transmitted/passed over a public medium. Because it is a Extended Euclidean Algorithm uses the same formula
large and apparently a random number, the two users can which takes p and q as the input parameters.
therefore, communicate privately over a public medium
with an encryption method of their choice using the  Formula for Encryption:
decryption key x[4]. To encrypt the plain text message in the given
scenario , we have a sender who sends the plain text
B. RSA Algorithm: message to another user whose public key is (n,e). The
RSA stands for Rivest, Shamir and Adleman who syntax is:
discovered one of the most secured way of encryption. It C = (P*e) mod n
is a public key encryption technique. It is also named as
RSA algorithm[7]. RSA algorithm consists of two keys
namely a public key and a private key.

IJISRT20JAN621 www.ijisrt.com 801


Volume 5, Issue 1, January – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
 Formula for Decryption: C. Data Encryption Standard:
The decryption process includes analytics for The Data encryption standard(DES), the data blocks
calculation in a systematic approach[4]. Considering are encrypted in a 64-bit block with a 56-bit key[4]. In this
receiver C with private key d, the result modulus will be algorithm, transformation of 64-bit input to 64-bit output
calculated as – takes place. For reversing encryption, the same key is
Plaintext = Cd mod n followed. The inputs include a plain text to be encrypted
and the encryption key. The length of the plain text is 64-
bits and the key length is 56-bits.

Fig 3

The left and right halves of the output are D. Advanced Encryption Standard:
interchanged and pre-output is produced[4]. DES structure Advanced Encryption standard also known as AES
is similar to Feistal cipher. In the case of DES decryption, which is intended for replacing DES method of encryption.
the same technique which is used for data encryption It is a symmetric block cipher technique[4]. In AES, the
standard is followed with the keys reversed. block size of plaintext is 128-bits which is considered by
the cipher. The length of the key can be 16,24 ,32 bytes.
This can be referred to as AES-128, AES-192 or AES-256
algorithms which depends on the length of the key.

Fig 4

The input given to the encryption and decryption performed on data stored in an array is defined by AES
algorithm is always a 128-bit block. In the case of FIPS structure. In the first (N-1) rounds, four distinct functions
PUB, 4*4 square matrix of bits is the input considered. The occur. They are SubBytes, ShiftRows, MixColumns and
cipher consists of ‘N’ number of rounds and ‘N’ depends AddRoundKey[4]. In each transformation, there will be one
upon the key length. The number of transformations to be or more 4*4 matrix as input and 4*4 matrix as output.

IJISRT20JAN621 www.ijisrt.com 802


Volume 5, Issue 1, January – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
E. Blowfish: received needs to be authenticated if it is sent by trusted
Blowfish algorithm uses cipher whose key varies sender[6]. It is the necessity of every organization and
within 32 to 448 bits of length. It’s features include institutions because it enables them to keep their networks
selection of secured way of message transformation[1]. secure by permitting only authenticated users to access its
protected resources. The resources covers computer
systems, databases, websites and other network-aided
applications. Authorization is another security mechanism
which gives permission to do or have something. It is used
to determine whether a person or system is allowed access
to resources, based on an access control policy. User
identity verification is performed using authorization.
System administrator’s duty includes assigning permission
levels covering all system and user resources. Physical
security describes measures to design and to deny the
unauthorized access of personnel resources and other
properties from damage. It protects these assets from
physical threats including theft, vandalism, fire and natural
Fig 5 disasters.
Linear and differential cryptosystems can be B. Integrity:
significantly analysed. It is available to both private as well Maintaining and assuring the accuracy and
as public sectors. It is a feistel network and it can be consistency of data is a way to achieve integrity of data.
inverted simply performing XOR with blocks P17 and P18 The data received by the recipient must be exactly same as
to the ciphertext block. the data sent from the sender, without change in even one
bit of data. The elements of integrity include backups,
IV. TECHNIQUES TO ACHIEVE A SECURED checksums and data correcting codes. Backup includes
SYSTEM archiving of data periodically. It is a process of making
duplicate copies of data to use it in the event when the
A most significant component in information security original data or data files are eradicated. It is mainly used to
is network security management. Network security consists make copies for historical purposes, such as for
of underlying computer network infrastructure, policies longitudinal studies to meet the requirements of a data
adopted by the network administrator in order to protect the retention policy. A checksum is a numerical value that is
network and its resources from unauthorized access, and generated by the data in a process to verify the integrity of
continuous monitoring of the information. In the modern a file. A checksum function entirely relies on the entire
digital technology, organizations highly rely on computer contents of a file. It is a method for storing data in such a
networks to share the data throughout the organization in an way that small changes can be easily detected and
efficient and productive manner. Confidentiality, Integrity, automatically corrected.
availability are the three major elements that contribute to a
secured system which is represented by a CIA triangle[3]. C. Availability:
The term "Availability" in network Security is to
ensure that the resources (data) are available to the
legitimate users, whenever they require it. Availability
ensures timely and reliable access to use the
data[4].Physical safeguard and computational redundancies
are the major elements in the availability of data. Physical
safeguard is to keep information available even in the event
of physical challenges. It ensure sensitive information is
housed in secure areas.

Security services are provided by a protocol layer of


communicating open systems to ensure adequate security of
the systems or of data transfer[4]. This falls under X.800.
Fig 6 Also the RFC 2828 defines security services as a
communication service that is provided by a system to give
A. Confidentiality: a specific kind of security to system resources. Security
Confidentiality element of a network Security makes Services can be implemented by security policy and
sure that the data is available only authorized persons The mechanisms techniques.
components of confidentiality include data encryption,
access control, authentication, authorization and physical
security. An authentication is a mechanism that ensures and
confirms a user's unique identity that someone has. All data

IJISRT20JAN621 www.ijisrt.com 803


Volume 5, Issue 1, January – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
 Encipherment:  Notarization:
It involves hiding and covering the data to achieve Notarization mechanisms allows establishing a third
confidentiality. Traffic flow information is provided by party to control communication between two or more
encipherment technique to support other security entities, such as its integrity. With the third party
mechanisms. establishment, repudiation is prevented[5]. This is done to
store the sender’s request and delaying is reduced.
 Data Integrity:
Data integrity technique consists of a short checkvalue V. CONCLUSION
which is generated by the data during a particular process.
At the receiving end, the receiver gets the data and the Privacy management is the most important element in
checkvalue. Receiver creates a new checkvalue from the cryptography Techniques. This paper significantly
received data and compares the new checkvalue and the examined several private and public key encryption
received checkvalue. If the two checkvalues matches, data techniques such as AES, DES, Blowfish, Diffie-Hellman
integrity is ensured. ,RSA. Information security has become significant. Several
algorithms have been evaluated and discussed. One can
 Digital Signature: maintain privacy for his data using different security
A digital signature is a technique through which mechanism techniques like Cryptography, encipherment,
sender electronically signs the data and the receiver verifies data integrity, digital signatures, authentication exchange,
the signature in an electronic way. Public key and private firewalls, access controls and steganography. Essential
key relationships are ensured and both the sender and the mechanism techniques have been discussed to safeguard
receiver prove their identities to each other. In other words, our personal data.
a digital signature ensures whether an electronic document
is authentic or not. Digital signatures rely upon certain REFERENCES
types of encryption process to ensure authentication. In
encryption, all the data that one computer is sending to [1]. Firewalls by Matthew Strebe, Charles Perkins.
another is taken and encoded it into a form that only the [2]. https://en.wikipedia.org/wiki/CamScanner.
other computer will be able to decode. Authentication is the [3]. https://www.javatpoint.com/cyber-security-goals.
process of verifying that information is coming from a [4]. Cryptography and Network security by William
trusted source[4]. Stallings.
[5]. Cryptography and Network Security by Behrouz
 Authentication Exchange: A.Forouzan.
In this method, two users exchange key with each [6]. Anu, Divya Shree and Seema Ahlawat, “ A review on
other to ensure their identities to each other[5]. Each user Cryptography, Attacks and Cyber Security”,
must have their unique usernames and secret key so that IJARCS,Volume.8, No.5, May-June 2017.
authorized persons can use it [6]. [7]. Neha Sharma, Prabhjot and Er.Harpreet kaur, “ A
review on Information Security using Cryptography
 Access Control: technique”, IJARCS, Volume.8, No.4, May 2017.
Access control uses mechanisms to prove that a user [8]. A. Joseph Amalraj1, Dr. J. John Raybin Jose2, “ A
has the right to use identities, information of principals[5]. survey paper on Cryptography techniques”, IJCSMC,
If a mechanism attempts to use an unauthorized resource, Volume.5, Issue.8,August 2016,pp.55-59.
the access control function ignores the attempt and reports [9]. Rajesh R Mane,” A review on Cryptography
this incident to produce alarm and recording it. Algorithms, Attacks and Encryption Tools”,IJIRCCE,
Volume.3, Issue-9, September 2015.
 Traffic Padding: [10]. https://www.webopedia.com/TERM/R/route_control.
Traffic padding mechanisms are used in order to html
safeguard from heavy traffic analysis and its attacks.
Traffic padding refers to the generation of bogus data and
data units to reduce traffic congestion[5].

 Routing Control:
Routing control involves continuously monitoring the
route to establish the shortest path between the sender and
the receiver to provide communication. The information
which is carried on certain security labels may be restricted
by a security policy to pass through certain links. Handling
the switching policy of outgoing data between ISPs in real
time and its evaluation can be analysed using routing
control[10].

IJISRT20JAN621 www.ijisrt.com 804

You might also like