ISSN: 2229-371X
Meenu Sahni*1 and D.B. Ojha2
|
Corresponding Author: Meenu Sahni, E-mail: mnu.sahni@rediffmail.com |
Related article at Pubmed, Scholar Google |
Visit for more related articles at Journal of Global Research in Computer Sciences
An 8 order magic square is 8×8 matrix containing integers and addition result of each row, column and diagonally get the same value. We utilize the generalized form of a 8×8 matrix with the help of a special geometrical figure. With the help of 8×8 Magic Square, the process established a new platform to generate key and encrypt the data using ORDES.
Keywords |
Magic Square, Ordeal Random Data Encryption Standard, Cryptography, Random Number. |
INTRODUCTION |
ORDES is a technique of Encryption/Decryption. Cryptography is a branch of applied mathematics that aims to add security in the ciphers of any kind of messages. Cryptography algorithms use encryption keys, which are the elements that turn a general encryption algorithm into a specific method of encryption. The data integrity aims to verify the validity of data contained in a given document [1]. ORDES encryption [2, 3, 4] technique uses random number either generated by PRNG or HRNG. |
Using generalization of 8×8 magic square given by Deo Brat ojha and B L Kaul [5], ORDES generate a key on the pattern of 8×8 magic square image. A 8×8 matrix filled with the integers in such a way that the sum of the numbers in each row, each column or diagonally also remain same, in which one integer use at once only. This scheme utilise the Required Sum of Magic square [5, 6, 7, 8, 9, 10] to generate an encryption key for ORDES. |
Data Encryption Standard (DES) symmetric key cryptosystem, which was the natural choice, given that this cryptosystem had been around since 1976 and adopted by the US government in 1977, is the US government's secret-key data encryption standard and is widely used around the world in a variety applications. |
The input message is also known as "plaintext" and the resulting output message as "ciphertext". The idea is that only recipients who know the secret key can decrypt the ciphertext to obtain the original message. DES uses a 56-bit key, so there are 256 possible keys [2]. Due to its importance, DES has received a great deal of cryptanalytic attention. However, besides using the complementation property, there were no short-cut attacks against the cipher until differential cryptanalysis was applied to the full DES in 1991 [3, 4, 11 ]. |
In [12], Chaum and Evertse presented several meet-in-the-middle attacks on reduced variants of DES. |
In 1987 Davies described a known plaintext attack on DES [13]. In [14] these results were slightly improved but still could not attack the full DES faster than exhaustive key search. |
In 1994 Biham and Biryukov [15] improved the attack to be applicable to the full DES. A chosen ciphertext variant of the attack is presented in [16]; it has a data complexity of 245 chosen plaintexts. The first attack on DES that is faster than exhaustive key search was presented in [17]. In [18] another attack on DES is presented, linear cryptanalysis. This attack was later improved in [19] by exploiting nonlinear relations as well. The improved attack has a data complexity of 242.6 known plaintexts. Using chosen plaintexts, Knudsen and Mathiassen reduced the data complexity in by a factor of 2. |
Even after DES was theoretically broken, RSA published a plaintext and its ciphertext encrypted using DES under some unknown key, and offered a prize of several thousand US dollars for whoever finds the secret key [20]. The first exhaustive key search took about 75 days and the key was found using 14,000–80,000 computers over the Internet [21]. In 1997 the Electronic Frontier Foundation (EFF) built a special purpose machine that costs 250,000 US dollars which retrieved the key in 56 hours by means of exhaustive key search [22]. The approach of treating reduced-round DES as an algebraic equation was also suggested in [23, 24]. |
METHODOLOGY |
Magic Square Generalized Figure: |
ORDES Approach: |
In encryption phase, ORDES take a message block and a new generated key Knew i implement encryption process as per traditional DES. |
PLAUSIBLE KEYING have the property to make various key for various block of message. |
Now, we have a new key for every block of message. This new key Knew i is apply on each block of message . |
In ORDES, New key is also make 16 different key for every round of DES using shifting property as per traditional DES. For every block of message M, new Knew i makes a new key block for every round of DES to implement in the encryption process. |
Decryption Process is the inverse step of encryption process. In decryption, we also use the same key which is used in encryption. |
Sender Initial Phase: |
a. Sender choose a required total sum S & difference d and send it to the reciever. |
b. Then calculate the first no. using the formula 8a +252d = sum required, where a is first no. and d is difference. |
c. Then calculate the sixteen numbers where d chooses already. |
d. Then arrange these sixteen numbers with the help of suggested geometrical figure. |
e. Now Sender takes the centre no. and uses this rather than random no. |
Reciever Initial Phase: |
a. Reciever recieves required total sum S & difference d. b. Then calculate the first no. using the formula 8a +252d = sum required, where a is first no. and d is difference. |
c. Then calculate the sixteen numbers where d gets already. |
d. Then arrange these sixteen numbers with the help of suggested geometrical figure. |
e. Now receiver also takes the centre no. and uses this rather than random no. |
Key Generation Phase: |
F{K, Centre no.} = Knew i |
Function F |
a. Input the bit value of initial key K (56-bit). |
b. Input generated centre no. |
c. Convert Rj (centre number) into 56- bit binary number. |
d. Now, we have |
Key K = {KB1, KB2, KB3, ....................., KB56} |
and |
Centre no. ={Rb1, Rb2, Rb3, ...................., Rb56} |
Where KBr is the bit of Key and Rbr is the bit of centre number. Here r =1, 2, 3...............56. |
e. Apply condition on K and Centre no. IF Rbr = 1 then, Complement (convert 1 to 0 or 0 to 1) of corresponding KBr. |
ANDIF |
Rbr = 0 then, Retain the same (1 to 1 or 0 to 0) of corresponding KBr. 6.Result is Knew i. |
RESULT AND DISCUSSION |
Security Analysis: |
Using Magic Square generalised image and ORDES itself based on random number works like a one-time pad. One time pad has a property termed perfect secrecy, i.e. the ciphertext C gives no additional information regarding plain text M. Thus pre probability of a message M is the same as post of a message M given the resultant cipher text. |
Mathematically, this is expressed asH(M) = H(M|C) , here where H(M) is the entropy of plain text and is the conditional entropy of the plain text given by cipher text is the conditional entropy of the plain text given by cipher text C. |
Perfect secrecy is a strong notion of cryptanalytic difficulty. |
ORDES has some advantage in practice: |
a. ORDES perfectly like a random one-time pad. |
b. 2.ORDES provides secure generation and exchange of the key. |
CONCLUSION |
In ORDES key is used to control the complete operation i.e. Encryption and Decryption both. Key itself a tool to encrypt plain text and decrypt cipher text. A key size should be large enough that a brute force attack against ORDES may be infeasible. It is necessary for the key length to be only used once like one time pad algorithm. To manage a long key is not an easy task. So, ORDES follows the majestic approach to regenerate a new key every time rather than a long key. |
References |
|