Network Security & Cryptography


Network Security & Cryptography

Network Security & Cryptography is a concept to protect our network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Data Security is a challenging issue of data communications today that touches many areas including secure communication channel, strong data encryption technique and trusted third party to maintain the database. The rapid development in information technology, the secure transmission of confidential data herewith gets a great deal of attention. The conventional methods of encryption can only maintain the data security. The information could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption/ decryption methods to enhance data security.

Contents

Multiphase Encryption Technique: An Advance Concept of Information Security

The multiple encryption techniques of present time cannot provide sufficient security. In this research paper, the new encryption technique named as “Multiphase Encryption” is proposed. In this encryption technique, original data is encrypted many times with different strong encryption algorithms at each phase. This encryption technique enhances the complexity in encryption algorithm at large extent.This idea differs with existing data encryption techniques to provide network and information security over the wireless network. It may create complexity of data encryption number of times due to performing the same operation multiple times with different encryption key in existing way. As per cryptographic protocol, more and more complexity in data encryption technique enhances the security of data transmission over the wireless channel. Large number of encryption of encrypted data will increase the complexity of data encryption enormously, which will be very complicated to decrypt it.

Example
Complexity of Existing Encryption Technique / method (Multiple Encryption) = O (N*N*…………*N)
Complexity of New (As per proposed idea) Encryption Technique = O (N*N*………*N) * O (N*N*…..*N) *……………………………* O (N*N*…..*N).
(Depending upon the multiplicity of the Encryption Technique involved.)

Conventional Encryption Technique (Using Ceaser Cipher encryption technique)

Original Data/ Plain Text – GURUKULA
Algorithm – C = P + 3 (Key as Second successor of plaintext)
Cipher Text – JXUXNXOD

Multiple Encryption Technique

In cryptography, by encrypting a message twice with some block cipher, either with the same key or by using two different keys, then we would expect the resultant encryption to be stronger in all but some exceptional circumstances. And by using three encryptions, we would expect to achieve a yet greater level of security.

For instance, the use of double encryption does not provide the expected increase in security when compared with the increased implementation requirements, and it cannot be recommended as a good alternative. Instead, triple-encryption is the point at which multiple encryptions give substantial improvements in security.

Example of Existing Multiple Encryption
Original Data/ Plain Text – GURUKULA
Algorithm – C = ((P + 3) + 3) + 3 …………. + 3) (N Times)
Cipher Text – JKOCPUJW (After First Cycle)
MNRFSXMZ (After Second Cycle)
PQUIVAPC (After Third Cycle)
…………………………………….
……………………………………..
ENCRYPTED N TIMES

In such a way, multiple encryptions will occur in each phase and this process will be repeated number of times up to desired extent. So, multi-phase encryption comprises number of such phases which are strongly protected due to multiple encryption in each phase.

Multiphase Encryption Technique

Multiphase Data Encryption describes the enhanced complexity of data encryption due to performing the same operation multiple times in existing way (single phase encryption techniques).

Example of proposed Multi-phase Encryption
Original Data/ Plain Text – GURUKULA
Algorithm – C = ((P + 1) + 3) + 5 ………….. (N Times)
Cipher Text – HVSVLVMB (After First Cycle) KYVYOYPE (After Second Cycle) PDADTDUJ (After Third Cycle)

…………………………………….
……………………………………..

ENCRYPTED N TIMES

In such a way, multiple encryption occurs with different encryption keys (encryption algorithms) in each phase of multiphase encryption.

Functional Description of Multiphase Encryption Technique

In the single phase of multiphase encryption is described as multiple encryption where at each cycle different encryption key is used. In this encryption technique, decryption will be performed in reverse order. In multiphase encryption, such processes will be repeated number of times to enhance the complexity in encryption/decryption as well as security of data. Cryptographic algorithms and key sizes have been selected for consistency and to ensure adequate cryptographic strength for Personal Identity Verification (PIV) applications. Multiphase encryption may reduce the problem of key management in the existing technology of Personal Identity Verification (PIV) due to use of different encryption algorithms with fixed size keys instead of large number of variable length keys.

Benefits of Multiphase Encryption Technique

Multiphase Data Encryption is an ambivalent technique for data & information security and plays an important role in modern Cryptography. Multi-phase Data Encryption describes the enhanced complexity of data encryption due to multiple operations of single phase encryption techniques in cryptography. The advantage of multiple encryptions is that it provides better security because even if some component ciphers are broken or some of the secret keys are recognized, the confidentiality of original data can still be maintained by the multiple encryptions. The study of multi-phase encryption aims to enhance the potential of upcoming encryption technologies and its implications to defense and government users. The implementation of multi-phase encryption is a strong and positive move in the way of defining a standard for network security. However, as the amount of confidential data communication increases over the insecure wireless network, multi-phase encryption must also be reviewed from a security prospective.

References

[1][2][3]

  1. ^ Network Security Essential, William Staling, Pearson Publications Ltd
  2. ^ A Patent titled as "A Technique & Device for Multiphase Encryption" by Himanshu Gupta published in International Journal of Patent Department, Govt. of India(December, 2010
  3. ^ Web Document available on weblink as http://ipindia.gov.in/ipr/patent/journal_archieve/journal_2010/pat_arch_122010/official_journal_31122010_part_i.pdf


Author's Detail:

Himanshu Gupta Senior Faculty Member, Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida.
Contact No.: +91 - 9911987390 Weblink: http://www.amity.edu/aiit/faculty.asp Himanshu Gupta 14:33, 4 June 2011 (UTC)


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Neural cryptography — is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially neural network algorithms, for use in encryption and cryptanalysis. Contents 1 Definition 2 Applications 3 Neural key e …   Wikipedia

  • Virtual Private Network — VPN (англ. Virtual Private Network виртуальная частная сеть) логическая сеть, создаваемая поверх другой сети, например Интернет. Несмотря на то, что коммуникации осуществляются по публичным сетям с использованием небезопасных протоколов, за счёт… …   Википедия

  • Виртуальная частная сеть — VPN (англ. Virtual Private Network виртуальная частная сеть) логическая сеть, создаваемая поверх другой сети, например Интернет. Несмотря на то, что коммуникации осуществляются по публичным сетям с использованием небезопасных протоколов, за счёт… …   Википедия

  • List of computer science conferences — This is a list of academic conferences in computer science. Most of these academic conferences are annual or bi annual events.The order with which the conferences are listed in their respective fields corresponds to a rough and non authoritative… …   Wikipedia

  • Нейрокриптография — Нейрокриптография  раздел криптографии, изучающий применение стохастических алгоритмов, в частности, нейронных сетей, для шифрования и криптоанализа. Содержание 1 Определение 2 Применение …   Википедия

  • Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… …   Wikipedia

  • Bluetooth — This article is about the electronic protocol. For the medieval King of Denmark, see Harald I of Denmark. Bluetooth logo Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength …   Wikipedia

  • CISSP — Dieser Artikel oder Abschnitt besteht hauptsächlich aus Listen, an deren Stelle besser Fließtext stehen sollte. Der Certified Information Systems Security Professional (CISSP) ist eine Zertifizierung, die vom International Information Systems… …   Deutsch Wikipedia

  • Research In Motion — Limited Type Public Traded as TSX: RIM NASDAQ:  …   Wikipedia

  • AES-128 — AES Der Substitutionschritt, einer von 4 Teilschritten pro Runde Entwickler Joan Daemen, Vincent Rijmen Veröffentlicht 1998, Zertifizierung Oktober 2000 Abgeleitet von Sq …   Deutsch Wikipedia

  • AES-256 — AES Der Substitutionschritt, einer von 4 Teilschritten pro Runde Entwickler Joan Daemen, Vincent Rijmen Veröffentlicht 1998, Zertifizierung Oktober 2000 Abgeleitet von Sq …   Deutsch Wikipedia


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.