Multi-party Supportive Symmetric Encryption
Assistant Professor, Computer Centre, Alagappa University,Karaikudi, Tamilnadu, INDIA, Email: firstname.lastname@example.org
Professor, Department of Computer Applications, VelammalCollege of Engineering, Chennai, Tamilnadu, INDIA,Email: email@example.com
Dr. S.S. Dhenakaran
Assistant Professor, Computer Centre, Alagappa University,Karaikudi, Tamilnadu, INDIA, Email: ssdarvind @yahoo.com
Business data is a valuable asset for manyOrganizations. Organizations need security mechanisms thatprovide confidentiality for outsourcing their data services.Encrypting sensitive data is the normal approach in such asituation. Applications typically use Symmetric keys forencryption, or Asymmetric keys for their transmissions. In caseof Asymmetric encryptions they use the public keys of the signersalong with files sent. Since these identity strings are likely to bemuch shorter than generated public keys, the identity based keygeneration is an appealing option. A multi-signature schemeenables a group of signers to produce a compact, joint signatureon a common document, and has many potential uses. Existingschemes with multi signers impose requirements that make themimpractical, such as requiring a dedicated, distributed keygeneration protocol amongst potential users. These requirementslimit the use of the schemes. Multi-Party or co-operativeauthentication on information is a trusted source of security. Inthis paper, we propose an encryption scheme where eachauthorized user’s information is used to encrypt and decryptdata. This paper, presents a multi-party yet supportive, secureand identity-based scheme based on symmetric encryption,Multi-party Supportive Symmetric Encryption (MSSE). Thispaper takes an effort to resolve the security issues and also reporton the results of the implementation
Symmetric Encryption, Sub-key, Key Management,Key generation, Multi-party
Information channels are generally vulnerable toeavesdropping and attacks from outsiders. Strong cryptographyis needed to protect these channels. Traditional access controlsthat provided confidentiality were designed in-house anddepended on authorization policies. According to Forrester Research, enterprise storage needs grow at 52 percent per year  and organizations chose to outsource their data storage tothird parties. One of the biggest challenges raised by datastorage outsourcing was security and trust. Cryptographicapproach also provided data confidentiality. Encryption is amethod to securely share data over an insecure network or storage site. Users who communicated needed to establish amutually held secret key k. In public key cryptography twoparties communicated with a public and private key. Thefunctionality allowed the parties to establish a sharedsymmetric key and to encrypt and decrypt messages in an idealway using this key. The key was meant to be a long-termshared key never given to the parties, but be a part of thefunctionality.II.
ENCRYPTIONMultiple encryption is the process of encrypting an alreadyencrypted message one or more times, either using the same or a different algorithm. Multiple encryption algorithms allowusers to pick their own logic and the benefit of this approach isthat if an algorithm turns out to be seriously broken, supportingmultiple algorithms can make it easier for users to switch.Multiple algorithms add more complexity to the application.III.
Multi-signature schemes  allows different signers withpublic keys to collectively sign a message, yielding a multi-signature. Multi-signature schemes greatly save oncommunication costs. In most applications these public keyswill have to be transmitted along with the multi-signature. Thepublic keys of all cosigners are needed to verify the validity of such a multi-signature schemes. The inclusion of informationthat uniquely identifies the cosigners seems inevitable for verification For example, the signers’ user names or IPaddresses could suffice for this purpose; this information mayeven already be present in package headers:IV.
DENTITY BASED SIGNATURES
In an identity-based signature scheme , the public key of a user is simply his identity, e.g. his name, email or IP address.A trusted key distribution center provides each signer with thesecret signing key corresponding to his identity. When allsigners have their secret keys issued by the same keydistribution center, individual public keys become obsolete,removing the need for explicit certification and all associatedcosts. These features make the identity-based paradigmparticularly appealing for use in conjunction with multi-signatures, leading to the concept of identity-based multi-signature (IBMS) schemes. Application implementations of IBMS schemes are rather limited. While pairings have turnedout extremely useful in the design of cryptographic protocols,they were only recently brought to the attention of cryptographers , and hence did not yet enjoy the sameexposure to cryptanalytic attacks by experts as other, older problems from number theory such as discrete logarithms,
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No. 2, February 2011229 http://sites.google.com/site/ijcsis/ISSN 1947-5500