rsa and ecc thesis.pdf

21
Develop a hybrid approach for encoding of data using RSA and ECC Algorithm A Dissertation proposal Submitted By Harpreet Singh Reg no. 10807828 To Department of computer science & engineering In partial fulfilment of the requirement for the Award of the degree of Master of technology in computer science &engineering Under the guidance of Hardeep singh (December 2014)

Upload: harpreet-singh

Post on 27-Sep-2015

263 views

Category:

Documents


14 download

DESCRIPTION

Hybrid approach cryptography

TRANSCRIPT

  • Develop a hybrid approach for encoding of data using RSA and ECC Algorithm

    A Dissertation proposal

    Submitted

    By

    Harpreet Singh

    Reg no. 10807828

    To

    Department of computer science & engineering

    In partial fulfilment of the requirement for the

    Award of the degree of

    Master of technology in computer science &engineering

    Under the guidance of

    Hardeep singh

    (December 2014)

  • DECLARATION

    I hereby declare that the dissertation p roposa l entitled, Develop a hybrid approach for encoding of

    data using RSA and ECC Algorithm submitted for the M.Tech Degree is entirely my original

    work and all ideas and references have been duly acknowledged. It does not contain any work for

    the award of any other degree or diploma.

    Date:

    Harpreet Singh

    Regn No.: 10807828

  • Acknowledgement I express my sincere gratitude towards my guide Hardeep Singh for her constant help,

    encouragement and inspiration throughout the project work. Also I would like to thank our Head

    of Department, for there able guidance and for providing all the necessary facilities, which were

    indispensable in the completion of this project.

    I take this opportunity to express my hearty thanks to all those who helped me in the completion

    of my research work. I am very grateful to the authors of various articles on the Internet, for

    helping me become aware of the research currently on going in this field.

    I am very thankful to my parent for their constant support. Last, but not the least, I would like to

    thank my classmates for their valuable comments, suggestions and unconditional support.

    Harpreet Singh

  • Contents

    Declaration

    Acknowledge

    List of figures

    1 Introduction 1

    2 Literature Review

    5

    3 Scope of study 10

    4 Objectives 12

    5 Research Methodology 14

    6 References

    17

    List of figures

    5.1 Flowchart

  • 1

    Chapter 1

    INTRODUCTION

    In the current time, when the Internet provides essential communication between millions of

    people and is being increasingly used as a tool for ecommerce, security becomes a

    tremendously important issue to deal with Internet is often used to upload web pages and other

    documents from a private development machine to public webhosting servers. Transfer of files

    like banking transactions e-shopping, tenders etc need special authenticated mechanism.

    Cryptography is a science of secret writing. It is the art of protecting the information by

    transforming it into an unreadable format in which a message can be concealed from the casual

    reader and only the intended recipient will be able to convert it into original text. Cryptography

    is a technique of hiding the plain information from the web. By using cryptography we can

    assist this shaky information by secrete writing on our computer network.

    Cryptography renders the message unintelligible to outsider by various transformations. Data

    Cryptography is the scrambling of the content of data like text, image, audio and video to make

    it unreadable or unintelligible during transmission. Its main goal is to keep the data secure from

    unauthorized access. In traditional (symmetric-key) cryptography, the sender and receiver of a

    message know and use the same secret key. The main challenge is getting the sender and

    receiver to agree on the secret key without anyone else finding out. If they are in separate

    physical locations, they must trust a courier, a phone system, or some other transmission

    medium to prevent the disclosure of the secret key. Anyone who overhears or intercepts the

    key in transit can later read, modify, and forge all messages encrypted or authenticated using

    that key. Because all keys in a secret-key (symmetric-key) cryptosystem must remain secret,

    secret-key cryptography often has difficulty providing secure key management. To solve the

  • 2

    key management problem, Whitfield Diffie and Martin Hellman introduced the concept of

    public-key cryptography in 1976. Public-key cryptography refers to a cryptographic system

    requiring two separate keys, one of which is secret and one of which is public. Although

    different, the two parts of the key pair are mathematically linked. The algorithms used for

    public key cryptography are based on mathematical relationships (the ones being the integer

    factorization and discrete logarithm problems).Although it is easy for the recipient to generate

    the public and private keys, to decrypt the message using the private key, and easy for the

    sender to encrypt the message using the public key, it is extremely difficult for anyone to derive

    the private key, based only on their knowledge of the public key. This is why, unlike symmetric

    key algorithms, a public key algorithm does not require a secure initial exchange of one (or

    more) secret keys between the sender and receiver. In practice, only a hash of the message is

    typically encrypted for signature verification purposes. Public-key cryptography is a

    fundamental, important, and widely used technology. It is an approach used by many

    cryptographic algorithms and cryptosystems.

    As a communications and transmission of files over internet has increased exponentially since

    last few years, there is need of security in such file transfer. One of the solutions to secure

    communication is cryptography. It is the process of converting plain text into encrypted text

    and decrypt cipher text to plain text at other end. In a distrusted medium cryptography becomes

    essential part of secure communication.

    There are two types of cryptographic algorithm to accomplish these goals:

  • 3

    1. Symmetric cryptography,

    2. Asymmetric cryptography.

    The initial unencrypted data is referred as normal text. It is encrypted into cipher text with a

    cryptographic algorithm, which will in turn be decrypted into usable plaintext. In symmetric

    cryptography single key is used for encryption and decryption e.g. Data Encryption Standard

    (DES) and Advanced Encryption Standards (AES).

    In Asymmetric algorithm different keys are used to encrypt and decrypt the data e.g. RSA and

    Elliptic Curve Cryptography. RSA is widely used in electronic ecommerce protocols. With

    sufficiently long keys and the use of up-to-date implementations; RSA is believed to be totally

    secure. There are two ways in which we can achieve security

    1. Encrypted file transfer

    2. Strong secure protocol for transmission of files.

    RSA (Rivest, Shamir & Adleman) is asymmetric cryptographic Algorithm developed in 1977.

    It generates two keys: public key for encryption and private key to decrypt message. RSA

    algorithm consist of three phases, phase one is key generation which is to be used as key to

    encrypt and decrypt data, second phase is encryption, where actual process of conversion of

    plaintext to cipher text is being carried out and third phase is decryption, where encrypted text

    is converted in to plain text at other side. As a public key is used for encryption and is well

    known to everyone and with the help of public key, hacker can use brute force method to find

    private key which is used to decrypt message. Secure RSA prevents files from hackers and

    help safe transmission of files from one end to other.

  • 4

    ECC (Elliptic Curve cryptography) is kind of public key cryptography like RSA. But it differ

    from RSA in its quicker evolving capacity and by providing attractive way to researchers of

    cryptography algorithm. The security level which is given by RSA can provider even with

    smaller keys of ECC. For example the 1024 bit security of a rsa could be offered by 163 bit

    security strength of ECC. And it is well suited for wireless communications.

  • 5

    Chapter 2

    LITERATURE REVIEW

    1. Vivek Katiyar (2010) A Survey on Elliptic Curve Cryptography for Pervasive Computing

    Environment In todays era of the ubiquitous computing, the Internet has become the main

    mode of data communication. Most of the devices used in wireless/mobile environments, that

    form wireless networks, ad-hoc networks and wireless sensor networks etc., have low

    computational power, memory and limited battery power. In such a Pervasive Computing

    environment, providing security to data becomes a complex task. Elliptic Curve Cryptography

    (ECC) has become the preferred choice for the pervasive computing environment because of

    its suitability to the devices having limited bandwidth, battery power, less computational

    resources and less memory. This paper provides an introduction to ECC and presents a survey

    on the current use of ECC in the pervasive computing environment.

    2. k. Naga Divya (2012) A Routing-Driven elliptic Curve cryptography Based Key

    Management Scheme for Heterogeneous Sensor Networks sensor networks are deployed in

    a hostile environment, security becomes extremely important. Abstract- sensor networks are

    deployed in a hostile environment, security becomes extremely important. An efficient Key

    Management Scheme to provide security in HSN. In HSN, Clusters are formed as shown in

    below figure. Routing is done in two phases: 1) Intra-cluster routing each L-sensor sends data

    to its cluster head(H-Sensor) via multi hops of other L-sensors ; 2)Inter-cluster routing a

    cluster head aggregates data from multiple L-sensors and then sends the data to the sink via

    the H-sensor backbone. This Project focuses on intra cluster routing using MST (minimum

    spanning tree) algorithm to approximate the least energy consumption case. After constructing

    SPT(Spanning tree), every L-sensor node sends sensor information to H-sensor(Cluster head)

  • 6

    with in a cluster. In this presents a preventive technique to overcome non-differential side

    channel attack in HSN by enhancing Elliptic Curve Cryptography and it minimizes storage

    space requirement, communication overhead and energy consumption in HSN.

    3. D. Sravana Kumar (2012) ENCRYPTION OF DATA USING ELLIPTIC CURVE

    OVER FINITE FIELDS Cryptography is the study of techniques for ensuring the secrecy

    and authentication of the information. Public key encryption schemes are secure only if the

    authenticity of the public-key is assured. Elliptic curve arithmetic can be used to develop a

    variety of elliptic curve cryptographic (ECC) schemes including key exchange, encryption and

    digital signature. The principal attraction of elliptic curve cryptography compared to RSA is

    that it offers equal security for a smaller key-size, thereby reducing the processing overhead.

    In the present paper we propose a new encryption algorithm using Elliptic Curve over finite

    fields.

    4. Lekha Bhandari (2013) Speeding up Video Encryption using Elliptic Curve

    Cryptography (ECC) Advances in digital content transmission have been increased in the

    past few years. Security and privacy issues of the transmitted data have become an important

    concern in multimedia technology. In this paper, we propose a computationally efficient and

    secure video encryption algorithm. This makes secure video encryption feasible for real time

    applications without any extra dedicated hardware. In addition, special and reliable security in

    storage and transmission of digital images and videos is needed in many digital applications

    such as confidential video conferencing and medical imaging systems, etc. Unfortunately, the

    classical techniques for data security are not appropriate for the current multimedia usage. As

    a result, we need to develop new security protocols or adapt the available security protocols to

    be applicable for securing the multimedia applications. In this paper implementation of elliptic

  • 7

    curve cryptography (ECC) and RC5 algorithm are mentioned. RSA based encryption has

    significant problems in terms of key size. Currently, the RSA algorithm requires the key length

    of at least 1024 bits for long term security, whereas it seems that 160 bits are sufficient for

    elliptic curve cryptographic functioning.

    5. Vivek B. Kute (2009) A SOFTWARE COMPARISON OF RSA AND ECC To meet a

    users needs cryptographic algorithm needs to be selected on the basis of attributes like security

    and performance. One of the tasks of a cryptosystem designer is to weigh the advantages and

    disadvantages and select the algorithmic tools that best address the problem to be solved. RSA

    is the most popular public-key cryptosystem today but long term trends such as the

    proliferation of smaller, simpler devices and increasing security needs will make continued

    reliance on RSA more challenging over time. Hence Elliptic Curve Cryptography (ECC) is a

    suitable alternative.This paper focuses on performance attribute of public key cryptosystems.

    The algorithms studied and compared are RSA, ECC. We have implemented these algorithms

    in Java in order to perform software tests so that we may gain insight into the relative

    performance of each algorithm and its associative parameters. Software based tests are

    performed to yield an overall analysis of key generation, message encryption and decryption.

    Implementations are in Java and executable in the Windows environment. Each algorithm is

    tested for key generation and encryption/decryption of ordinary but large files.

    6. Fathima Nizar(2014) RSA Based Encrypted Data Embedding Using APPM This paper

    introduces a new encrypted data hiding method based on Adaptive Pixel Pair Matching and

    RSA encryption algorithm. The basic idea of Pixel Pair Matching is to use the values of pixel

    pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel

  • 8

    pair according to a given message digit. The pixel pair is then replaced by the searched

    coordinate to conceal the digit. The text data to be hidden undergoes a pre-processing step

    which encrypts the data using RSA encryption before it is embedded into the cover image.

    7. Gajendra Singh Chandel (2013) A Review: Image Encryption with RSA and RGB

    randomized Histograms In this paper we discuss and survey several aspects of Image

    Encryption and Decryption. In todays era it is a crucial concern that proper encryption

    decryption should be applied so that unauthorized access can be prevented. For this we will

    survey related researches and done some problem identification. Based on our survey we

    suggest some future suggestion which can be useful for image encryption.

    8. Rajan.S.Jamgekar (2013) File Encryption and Decryption Using Secure RSA In this paper

    we have introduced secure RSA for secure file transmission. There are many cases where we

    need secure file transmission for example in banking transactions, e-shopping etc. In this paper

    we present modified RSA algorithm for secure file transmission. RSA algorithm is asymmetric

    key cryptography also called Public Key cryptography. Two keys are generated in RSA, one

    key is used for encryption &other key which is only known to authenticated receiver can

    decrypt message. No other key can decrypt the message. Every communicating party needs

    just a key pair for communicating with any number of other communicating parties. Once

    someone obtains a key pair, he /she can communicate with anyone else. RSA is a well known

    public key cryptography algorithm and was one of the first great advances in public key

    cryptography. Even if it is efficient algorithm it is vulnerable to attackers. With the help of all

    brute force attacks hacker can obtain private key. Many improvements has been done to

    improve RSA like BATCH RSA, MultiPrime RSA, MultiPower RSA, Rebalanced RSA,

  • 9

    RPrime RSA etc. As craze of internet is increasing exponentially, it is used for email, chatting,

    transferring data and files from one end to other. It needs to be a secure communication among

    the two parties [4]. This paper focuses on file transfer using Secure RSA, which eliminates

    some loopholes of RSA that might prevent a hacker from stealing and misuse of data. This

    paper also presents comparison between RSA file transfer and Secure RSA file transfer.

    9. Dr.R.Sshanmugalakshmi and M.Prabu Research Issues on Elliptic Curve Cryptography and its

    applications: developing technologies in field of network security. In this article serious

    discussion about the comparison between ECC and other algorithm. ECC uses with smaller

    keys to provide high security, high speed in a low bandwidth. In this paper it explain advantage

    over various algorithm basically it cover differences or comparison between RSA and ECC.

    This paper also explain the key size used by various algorithm. It provides us to understood

    different application of ECC like ECDSA.

  • 10

    Chapter 3

    Scope of Study

    The main aim or scope of my research work is study of two Cryptography algorithm they are

    RSA and ECC and In this thesis we are going to develop an algorithm which will encrypt the

    data of user in complex manner with more security and accuracy by using multilevel and

    hybridization of RSS and ECC algorithms. By developing hybrid approach or algorithm we

    can make more securce method for protecting our data

    3.1 PROBLEM FORMULATION

    The idea that technology is moving beyond the personal computer to everyday devices with

    embedded technology and connectivity, as computing devices become progressively smaller

    and more powerful, is called ubiquitous computing or pervasive computing. It is the result of

    computer technology advancing at an exponential speed. Pervasive computing goes beyond

    the realm of personal computers: it is the idea that almost any device, from clothing to tools,

    appliances, cars, homes, human body and even your coffee mug, can be embedded with chips

    to connect the device to an infinite network of other devices. The goal of pervasive computing,

    which combines current network technologies with wireless computing, voice recognition,

    Internet capability and artificial intelligence, is to create an environment where the connectivity

    of devices is embedded in such a way that the connectivity is unobtrusive and always available.

    So there is need for such an algorithm which will do the secure connections to each other, to

    ensure that the information they provide remains confidential, and that only those authorized

    to control these devices can do so. Providing security in such environment will be a critical

    task.

  • 11

    For that there is need for such an algorithm which is more secured and has fast cryptographic

    property along with fast encoding.

  • 12

    Chapter 4

    OBJECTIVES

    1. To develop an hybrid approach for encoding of data

    2. Design and analysis of cryptographic scheme with multilevel hierarchy

    3. Performance analysis of new proposed algorithm

    4.1 PROPOSED WORK

    In this thesis we are going to develop an algorithm which will encrypt the data of user in

    complex manner with more security and accuracy. This will include the multilevel and

    hybridization of RSS and ECC algorithms.

    Elliptic Curve Cryptosystem (ECC) Elliptic Curve Cryptography (ECC) was discovered in

    1985 by Victor Miller (IBM) and Neil Koblitz as an alternative mechanism for implementing

    public key cryptography. Elliptic curve cryptography (ECC) can provides the same level and

    type of security as RSA but with much shorter keys. Elliptic curve cryptography (ECC) is an

    approach of public-key cryptography based on the algebraic structure of elliptic curves over

    finite fields. Advantage of Elliptic curve cryptography is the public key and private keys have

    smaller size. The computation is fast as compared to other method and also it needs less storage

    space. Whereas the drawback of EC curves generation is complex, and difficult to implement

    a sustainable ECC algorithm. However, implementers can rely on third parties for curves,

    which can be validated

    RSA is widely used in encrypted connection, digital signatures and digital certificates core

    algorithms. Public key algorithm invented in 1977 by Ron Rivest, Adi Shamir and Leonard

    Adleman (RSA). The security of RSA comes from integer factorization problem. RSA

  • 13

    algorithm is relatively easy to understand and implement RSA algorithm is based on the theory

    of a special kind of reversible arithmetic for modular and exponent RSA is used in security

    protocols such as IPSEC/IKE, TLS/SSL, PGP, and many more applications

  • 14

    Chapter 5

    Research Methodology

    5.1 FLOW DIAGRAM

    Fig 5.1 Flowchart

    Get the data to encrypt

    From User

    Apply RSA algorithm for Data

    encryption as per Key Generated by

    algorithm

    Apply ECC algorithm for Data

    encryption as per Key Generated by

    algorithm

    Apply RSA algorithm for Data

    encryption as per Key Generated by

    algorithm

    Multilevel and hybrid approach

    based encrypted data

    RSA key number

    1 generation

    ECC key

    generation

    RSA key number

    2 generation

    Using below keys used for

    encryption data will be decrypted

    Data decryption as per vice versa

    process

  • 15

    5.2 Algorithm

    RSA ALGORITHM

    Choose two large prime number P and Q.

    Such as P = 7, Q= 17

    1. Calculate N = P * Q

    SUCH as N= 7 * 17 = 119

    2. Select the public key (Encryption key) E such that it is not factor of (P-1) and (Q-1)

    (P-1) * (Q-1) = 6* 16 =96

    =2*2*2*2*2*3

    We have to choose E such that none of the factors of E is 2 and 3.

    Let us choose E =5

    3. Select the private key (Decryption key) D such that the following eq is true:

    (D * E) mod (P-1) * (Q-1) = 1

    (D*5) mod (6*16) =1

    (D*5) mod 96 = 1

    D= 77

    4. For encryption, calculate the chipper text CT from the plain text as follows : CT =

    PT^E mod N

    Suppose PT = 10

    CT = 10^5 mod 119 =40

    5. SEND CT as the cipher text to the receiver.

    CT= 40

    6. For decryption, calculate the plain text PT from the chipper text CT as follows: PT =

    CT^D mod N

    PT= 40^77 mod 119 =10

    PT= 10

    Elliptic Curve cryptography Aglorithm

  • 16

    An elliptic curve is a set of points (x, y), for which it is true

    Y2 = x3 + ax +b

    Certain Chosen number a and b. typically the number are integer, it can also work on

    principle of real number. Curves do not have an elliptic shape. For example, a = -4 and b =

    0.67 gives the elliptic curve with equation y2 = x3 -4x + 0.67

    If x +ax +b contains no repeated factors, or if 4a + 27b is not 0, then the elliptic curve can be

    used to form group. A group is simply a set of points on the curve. For cryptographic

    purpose, an elliptic curve must have only points with all coordinates whole number in the

    group.

    Generating an Elliptic Curve public key:

    AI = As * F

    AI is public key

    As is secret key

    And same for other user or recvier

  • 17

    REFRENCES

    1. Vivek Katiyar (2010) A Survey on Elliptic Curve Cryptography for Pervasive Computing

    Environment

    2. Rajan.S.Jamgekar (2013) File Encryption and Decryption Using Secure RSA

    3. Gajendra Singh Chandel (2013) A Review: Image Encryption with RSA and RGB randomized

    Histograms

    4. Fathima Nizar(2014) RSA Based Encrypted Data Embedding Using APPM

    5. Vivek B. Kute (2009) a software comparison of rsa and ecc

    6. Lekha Bhandari (2013) Speeding up Video Encryption using Elliptic Curve Cryptography

    (ECC)

    7. D. Sravana Kumar (2012) encryption of data using elliptic curve over finite fields

    8. K. Naga Divya (2012) A Routing-Driven elliptic Curve cryptography Based Key Management

    Scheme for Heterogeneous Sensor Networks

    WEBSITES

    [1] FROM Wikipedia http://en.wikipedia.org

    [2] https://www.cs.utexes.edu/

    [3] https://engineering.purdue.edu/