Introduction To Encryption and Decryption Information Technology
Introduction To Encryption and Decryption Information Technology
Introduction To Encryption and Decryption Information Technology
Objective
This project will meet the following objectives:
Scope
The scope of this project includes the following features:
Data encryption is also used to provide the security and safety of the files and other
important documents from the opponent so that while sending the files or documents
nobody else other than the recipient can see it.
This project has the similar mechanism to provide the security and safety of the files by
using a public key algorithm named DSA.
Today’s the prominence of internet day to day increased a lot and the transfers of files
and confidential information over the internet demands the security and safety of the
files and this can be accomplished by using encryption and decryption. In current
scenario, encryption and decryption are most widely used in every field like defence,
banking,
Types of Encryption Algorithms -
1) Symmetric Key Algorithms
Symmetric key encryption algorithms use a single secret key to encrypt and decrypt
data. You must secure the key from access by unauthorized agents because any
party that has the key can use it to decrypt data. Secret-key encryption is also
referred to as symmetric encryption because the same key is used for encryption and
decryption. Secret-key encryption algorithms are extremely fast (compared to public-
key algorithms) and are well suited for performing cryptographic transformations on
large streams of data.
Digital Signature
The importance of high confidence in sender authenticity is especially obvious in a
financial context. Integrity can be defined as, in many scenarios, the sender and receiver
of a message may have a need for confidence that the message has not been altered
during transmission. Although encryption hides the contents of a message, it may be
possible to change an encrypted message without understanding it. Non- repudiation,
By this property an entity that has signed some information cannot at a later time deny
having signed it. Similarly, access to the public key only does not enable a fraudulent
party to fake a valid signature.
The Digital Signature Algorithm includes two processes: Signature Generation and
Signature Verification. Encryption is done at the Signature Generation process by using
private key of the sender while decryption is done at the Signature verification process
by using public key of the sender. The hash algorithm used in the algorithm for creating
the message digest is SHA-I (Secure Hash Algorithm-I).The algorithm computes the
following values during these two processes.
1) choose a prime p,between 512 and 1024 bits in length.The number bits in p must
be a multiple of 64.
2) Choose a 160 bit prime q in such a way that q divides (p-1).
3) create e1 to be the qth root of 1 modulo p (e1p =1 mod p).choose a element e0
and calculate e1=e0(p-1)/q mod p.
4) choose d as private key and calculate e2=e1d mod p.
5) public key is (e1,e2,p,q); private key is (d).
5.Send M, S1 and S2
Authentication, Although messages may often include information about the entity
sending a message, that information may not be accurate. Digital signatures can be
used to authenticate the source of messages. When ownership of a digital signature
secret key is bound to a specific user, a valid signature shows that the message was sent
by that user. The importance of high confidence in sender authenticity is especially
obvious in a financial context. For example, suppose a bank's branch office sends
instructions to the central office requesting a change in the balance of an account. If the
central office is not convinced that such a message is truly sent from an authorized
source, acting on such a request could be a grave mistake.
Security Issues
The state of security in the real world is lucidly discussed in. Though there have been
many intellectual successes in the areas of access control, information flow based
multilevel security, public key cryptography and the development of esoteric
cryptographic protocols, the security of millions of the deployed systems is such that
any determined attacker can break in and compromise the information infrastructure.
The security issues include security weaknesses in the operating systems of attached
computers as well as vulnerabilities in Internet routers and other network devices. These
include denial of service attacks; IP spoofing, in which intruders create packets with false
IP addresses and exploit applications that use authentication based on IP; and various
forms of eavesdropping and packet sniffing in which attackers read transmitted
information, including logon information and database contents. Over time, the attacks
on Internet and Internet – attached systems have grown more sophisticated while the
amount of skill and knowledge required to mount an attack has declined. Attacks have
become more automated and can cause greater amounts of damage.
Cryptography has long been of interest to intelligence gathering and law enforcement
agencies. Secret communications may be criminal or even treasonous. Because of its
facilitation of privacy, and the diminution of privacy attendant on its prohibition,
cryptography is also of considerable interest to civil rights supporters. Accordingly, there
has been a history of controversial legal issues surrounding cryptography, especially
since the advent of inexpensive computers has made widespread access to high quality
cryptography possible.
Problem Statement
Encryption has long been used by militaries and governments to facilitate secret
communication. It is now commonly used in protecting information within many kinds
of civilian systems. Now a day, there are various security services which are used for
secure communication over Internet and other networks are:
1) Authentication
Although messages may often include information about the entity sending a
message, that information may not be accurate. Digital signatures can be used to
authenticate the source of messages. When ownership of a digital signature
secret key is bound to a specific user, a valid signature shows that the message
was sent by that user. The importance of high confidence in sender authenticity
which is provided especially obvious in a financial context.
2) Integrity
In many scenarios, the sender and receiver of a message may have a need for
confidence that the message has not been altered during transmission. Although
encryption hides the contents of a message, it may be possible to change an
encrypted message without understanding it.
3) Non-repudiation
Non-repudiation or more specifically non-repudiation of origin, is an important
aspect of digital signatures. By this property, an entity that has signed some
information cannot at a later time deny having signed it. Similarly, access to the
public key only does not enable a fraudulent party to fake a valid signature.
Encryption is also used to protect data in transit, for example data being transferred
via networks (e.g. the Internet, e-commerce), mobile telephones, wireless
microphones, wireless intercom systems, Bluetooth devices and bank automatic
teller machines. There have been numerous reports of data in transit being
intercepted in recent years. Encrypting data in transit also helps to secure it as it is
often difficult to physically secure all access to networks. Encryption, by itself, can
protect the confidentiality of messages, but other techniques are still needed to
protect the integrity and authenticity of a message; for example, verification of
a Message Authentication Code (MAC) or a Digital Signature. Standards
and cryptographic software and hardware to perform encryption are widely available,
but successfully using encryption to ensure security may be a challenging problem. A
single slip-up in system design or execution can allow successful attacks. If an
adversary can find the message in between then he/she may fully responsible for the
tampering of the message. So, the sender must use the Digital Signature and hash
algorithm to provide security of the message and hence it can’t be read by any other
party and the sending of the message may be successful.
While the field of cryptography has been studied extensively from the very earlier, most
of the work has concentrated on discovery of security in terms of encryption and
decryption of the messages when communicated over non secure channel. As in this
work, it has been mentioned that various algorithms have been used from the very
beginning for encryption and decryption of the files, messages when communicated
over internet to provide the enhanced security so that it is not attacked by any adversary
as provided.
That means the biggest advantage is that the security of the files has been increased too
many folds by the use of cryptographic algorithms. The features like authentication,
confidentiality, non-repudiation and integrity are provided by the DSA algorithms that
are used for encryption and decryption of the text files and hence the security aspect
also enhanced. The adversary will not be able to attack the messages or files in between
and if possible unable to alter it. Due to the various features provided by the DSA
algorithm in this work; Security is enhanced a lot that brings the whole system more
reliable.
SYSTEM DESIGN
Modules and their Description
This thesis work contains the following four modules:
Grid Reading
Grid Writing
Encryption
Decryption
1) Grid Reading
Grid Reading is nothing but it is the generation of combination of ASCII values of
the plaintext in a grid size of 32X32. It means that we take the plaintext and get
the 8-bit ASCII values of each character in the plaintext and fill the grid of size
32X32. The numbers of grids are generated according to the size of the plaintext.
The size of the grid is fixed for a file for each session. If the grid is not filled with
the given data from the file then the grid can be padded by adding 0’s at the
end.
2) Grid Writing
Data encryption is the conversion of data into a form, called a cipher text that
cannot be easily understood by unauthorized people. Decryption is the process
of converting encrypted data back into its original form, so it is easily understood.
Encryption is done by using public key algorithm called DSA with the use of
private key of the sender and data is converted into unreadable form called
Cipher text.
3) Decryption
Decryption is the process of converting encrypted data back into its original form
called plaintext, so that it is easily understood. Decryption is done by using the
same algorithm as used in encryption with the public key of the sender which
provides authentication, confidentiality and non-repudiation. Decryption is the
reverse process of encryption.
4) Encryption
Data encryption is the conversion of data into a form, called a cipher text that
cannot be easily understood by unauthorized people. Decryption is the process
of converting encrypted data back into its original form, so it is easily understood.
Encryption is done by using public key algorithm called DSA with the use of
private key of the sender and data is converted into unreadable form called
Cipher text.