CRYPTANALYSIS OF THE PERMUTATION CIPHER OVER COMPOSITION MAPPINGS OF BLOCK CIPHER

Similar documents
Chapter 4 The Data Encryption Standard

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

DUBLIN CITY UNIVERSITY

Classical Cryptography

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

Diffie-Hellman key-exchange protocol

CPSC 467: Cryptography and Computer Security

A basic guitar is a musical string instrument with six strings. In standard tuning they have the notes E, A, D, G, B and E

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

Some Cryptanalysis of the Block Cipher BCMPQ

Keywords: dynamic P-Box and S-box, modular calculations, prime numbers, key encryption, code breaking.

A Secure Image Encryption Algorithm Based on Hill Cipher System

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

An enciphering scheme based on a card shuffle

Lecture 1: Introduction

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator.

Block Ciphers Security of block ciphers. Symmetric Ciphers

Linear Congruences. The solutions to a linear congruence ax b (mod m) are all integers x that satisfy the congruence.

4. Design Principles of Block Ciphers and Differential Attacks

EE 418 Network Security and Cryptography Lecture #3

Symmetric-key encryption scheme based on the strong generating sets of permutation groups

Public-Key Cryptosystem Based on Composite Degree Residuosity Classes. Paillier Cryptosystem. Harmeet Singh

V.Sorge/E.Ritter, Handout 2

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India. P = [ p

Classification of Ciphers

Math 1111 Math Exam Study Guide

Public Key Cryptography

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Cryptanalysis on short messages encrypted with M-138 cipher machine

Proposal of New Block Cipher Algorithm. Abstract

Data security (Cryptography) exercise book

Cryptanalysis of Ladder-DES

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

OFDM Based Low Power Secured Communication using AES with Vedic Mathematics Technique for Military Applications

Successful Implementation of the Hill and Magic Square Ciphers: A New Direction

A Fast Image Encryption Scheme based on Chaotic Standard Map

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

1 Introduction to Cryptology

Introduction to Cryptography

Cryptography s Application in Numbers Station

Codes and Nomenclators

Triple-DES Block of 96 Bits: An Application to. Colour Image Encryption

Distribution of Primes

Introduction to Cryptography

Comments on An Image Encryption Scheme Based on Rotation Matrix Bit-Level Permutation and Block Diffusion

A Cryptosystem Based on the Composition of Reversible Cellular Automata

Secure Function Evaluation

Pattern Avoidance in Unimodal and V-unimodal Permutations

Analysis of Secure Text Embedding using Steganography

Image Encryption Based on the Modified Triple- DES Cryptosystem

Network Security: Secret Key Cryptography

Generic Attacks on Feistel Schemes

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

Week 3: Block ciphers

II. RC4 Cryptography is the art of communication protection. This art is scrambling a message so it cannot be clear; it

Modular Multiplication Algorithm in Cryptographic Processor: A Review and Future Directions

The number theory behind cryptography

EE 418: Network Security and Cryptography

TMA4155 Cryptography, Intro

Math 1111 Math Exam Study Guide

Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen

MA 111, Topic 2: Cryptography

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

Generation of AES Key Dependent S-Boxes using RC4 Algorithm

A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map

Number Theory and Public Key Cryptography Kathryn Sommers

Double Phase Image Encryption and Decryption Using Logistic Tent Map and Chaotic Logistic Map

Introduction to Cryptography CS 355

RSA hybrid encryption schemes

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Purple. Used by Japanese government. Not used for tactical military info. Used to send infamous 14-part message

On Permutation Operations in Cipher Design

Colored Image Ciphering with Key Image

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR

NEW METHOD FOR USING CHAOTIC MAPS TO IMAGE ENCRYPTION

DUBLIN CITY UNIVERSITY

A NOVEL METHOD OF IMAGE ENCRYPTION USING LOGISTIC MAPPING

Random Bit Generation and Stream Ciphers

Bijective Function with Domain in N and Image in the Set of Permutations: An Application to Cryptography

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

ElGamal Public-Key Encryption and Signature

Differential Cryptanalysis of REDOC III

Vernam Encypted Text in End of File Hiding Steganography Technique

RSA hybrid encryption schemes

An Efficient Quasigroup Block Cipher

Course Business. Harry. Hagrid. Homework 2 Due Now. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Location: Right here

Pseudorandom Number Generation and Stream Ciphers

A Novel Encryption System using Layered Cellular Automata

Proceedings of Meetings on Acoustics

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

Study of Perfect Shuffle for Image Scrambling

Image Encryption using Pseudo Random Number Generators

Stream Ciphers And Pseudorandomness Revisited. Table of contents

Transcription:

CRYPTANALYSIS OF THE PERMUTATION CIPHER OVER COMPOSITION MAPPINGS OF BLOCK CIPHER P.Sundarayya 1, M.M.Sandeep Kumar 2, M.G.Vara Prasad 3 1,2 Department of Mathematics, GITAM, University, (India) 3 Department of Mathematics,VITS College of Engineering, (India) ABSTRACT In this paper using secret key algorithm focus on composition mappings of permutation cipher and block cipher to encrypt and decrypt the plaintext messages without using residue modulo. This paper discuss about block of permutation cipher using plain text and cipher text over composition mapping of permutation. The proposed concept is easy to implement without confusion. Keywords: Permutation Cipher, Blockcipher, Composition Map, Inverse Permutation, Encryption, Decryption. I. INTRODUCTION Cryptography is the science of using mathematics to encrypt and decrypt messages. A cipher is a mathematical function used in the encryption and decryption process. The main problems in cryptography are the development of reliable cryptographic schemes and the search for new effective methods of deciphering existing schemes A cryptographic approach to secure information implies its transformation which enables it to be read only by the owner of the secret key. The reliability of a cryptographic method of securing data depends on cryptanalysis stability of the used scheme. When we talk about cryptanalysis we assume that we know the cryptographic scheme. In other words, a cipher breaking problem is a problem of finding only one true secret key among all possible secret keys, i.e. it is a search problem. The search space is large and the criterion of found solution s "quality" is not usually purely formalized [2]. The security of encrypted data is entirely dependent on two things one is strength of cryptographic algorithm, second one is secrecy of key In this article we focus on the cryptanalysis problem of the block permutation cipher to encrypt and decrypt the plaintext over composition of mappings to avoid residue modulo. An enciphering transformation is a function f from the P of set of all plaintext message units to the set C of all possible cipher text message units.applying function f to the plain text convert as a cipher text. A deciphering transformation f -1 the set C of all possible cipher text message units to the P of set of all plaintext message units. A deciphering transformation f -1 the set C of all possible cipher text message units to the P of set of all plaintext message units Applying function f -1 to the cipher text convert as a plain text[1].it can be represented as 1245 P a g e

P C P P is finite set of possible plain text C is is finite set of possible cipher text II. GENERAL METHOD OF PERMUTATION CIPHER Permutation technique is oneinwhich the plaintext remains the same, but the order of characters is shuffled. One simple technique forencryptionis based on the mathematical notation of permutation.the main idea of the permutation cipher is permutation of the position of letters. A permutation is a bijective map from n-element set into itself. Thus every permutation has inverse.in Permutation cipher,k consists set of all possible permutations of N symbols 0,1,2, N-1,For each permutation K, definec=ap and define P=A -1 C where A -1 is the inverse permutation to A. This can be observed as follows P C P P is plain text C is cipher text is permutation 2.1 A Block of Permutation Cipher In this article we consider the particular cryptographic scheme the symmetric block permutation cipher. The main idea of this cipher is that convert into the input text into blocks, i.e. into symbol strings with the length equal to N, and then symbols in every block are rearranged in accordance with the given permutation. is block of a plain text is block of a cipher text 2.2 Composition Map of Permutation Cipher In cryptography, P be a plain text and f be a permutation then construct P 1 then convert into P 1 0f using co domain of P 1, we getcipher text C,Now C 1 0f=P 1 0f0f -1 by using co domain ofp 1 0f then we can get plain text P. This can be observed as follows Encryption Plain text=p P 1 P 1 0f C=cipher text Decryption 1246 P a g e

cipher text=c P 1 0f C 1 0f -1 =P plain text The following algorithms can give complete information of this method. 2.3 Encryption Algorithm Step1: given P= plaintext Step2: construct block of plain text Step3: Key K= permutation (bijection) Step4: calculate P 1 0K = block of cipher text Step5: write C= cipher text 2.4 Decryption Algorithm Step1: take C= cipher text Step2: P 1 0K = block of cipher text Step3: Key K -1= permutation (bijection) Step4: calculate C 1 0K -1 =block of plain text Step5: write P= plaintext III. AN EXAMPLES OF ALGORITHM S WORK 3.1 Example P= GITAM is plain text is block of plain text. KEY K= is permutation Encryption: P 1 0K C= AMGIT is cipher text is block of Cipher text KEY K -1 = is permutation Decryption: C 1 0K 3.2 Example P= GITAM is plain text 1247 P a g e

P= GOOGLE is plain text is block of plain text KEY K= is permutation Encryption: P 1 0K C= GOGEOL is cipher text is block of Cipher text KEY K -1 = Decryption:: C 1 0K 3.3 Example P= GOOGLE is plain text. P= MATHEMATICS is the plain text is block of plain text KEY K= Encryption: P 1 0K C= ACAIMHTTEMS is cipher text is block of Cipher text KEY K -1 = Decryption:: C 1 0K P= MATHEMATICS is the plain text IV. CONCLUSION 1248 P a g e

With the power of computers, permutation encryption can be easily cryptanalyzed, In this paper composition of permutation cipher and block cipher to encrypt and decrypt messages easily without using residue modulo. Since every permutation is bijective,so easily we can find inverse permutation. The composition Of these two basic techniques is a bridge from classic to modern ciphers. With the advanced technologies, things are more complex these days, but the philosophy remains the same. The primary change is that algorithms work on characters. The proposed concept is easy to implement with out confusion. REFERENCES [1]. Neal Koblitz. A Course in Number Theory and Cryptography. Second Edition.Springer-Verlag. New York Berlin Heidelberg London Paris. Tokyo Hong Kong. [2]. Genetic algorithm for finding the key s length and cryptanalysis of the permutation cipher international Journal "Information Theories & Applications" Vol.15 [3]. W. Stallings, Cryptography andnetworksecurity,prenticehall,200 1249 P a g e