167 views

save

- Security Paper
- A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient, and Versatile Data Access Management
- Introduction to Cryptography
- IKC.pptx
- History of Cryptography
- File Locking System Using Aes Algorithm
- Cryptography - lecture3
- Cryptography Report
- MAC Address as a Key for Data Encryption
- 4. Optimum Operational.full
- Online Voting System Powered by Biometric Security using Cryptography and Stegnography
- Cipher
- Secure Data sharing in Dynamic Multi Owner in Cloud Storage
- Quant Cryptography
- Resumen tipos de Cifrado
- Design and Implementation of Hybrid Cryptosystem using AES and Hash Function
- versatile
- Authentication and Authorization Mechanism for Internet of Things Infrastructure
- Traditional Reversible Data Hiding Based Secret Communication
- Advantages of Classical Cryptography Over the Quantum Cryptography
- Pesce Mark Freedom
- Software Project Non Ieee
- Hill Cipher
- Public Key Encryption
- Hybridization of Symmetric Key Encryption and Visual Cryptography
- Hw Ch9 Hernan Ortega 2
- Encriptador y Desencriptador en Ensamblador
- A Modern authorized de-duplication method on hybrid cloud
- Security on the Internet
- Digital Document Processing and Management
- Yes Please
- The Unwinding: An Inner History of the New America
- Sapiens: A Brief History of Humankind
- The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
- Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
- Dispatches from Pluto: Lost and Found in the Mississippi Delta
- Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
- John Adams
- The Prize: The Epic Quest for Oil, Money & Power
- The Emperor of All Maladies: A Biography of Cancer
- This Changes Everything: Capitalism vs. The Climate
- Grand Pursuit: The Story of Economic Genius
- A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
- The New Confessions of an Economic Hit Man
- Team of Rivals: The Political Genius of Abraham Lincoln
- The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
- Smart People Should Build Things: How to Restore Our Culture of Achievement, Build a Path for Entrepreneurs, and Create New Jobs in America
- Rise of ISIS: A Threat We Can't Ignore
- The World Is Flat 3.0: A Brief History of the Twenty-first Century
- Bad Feminist: Essays
- Steve Jobs
- Angela's Ashes: A Memoir
- How To Win Friends and Influence People
- The Sympathizer: A Novel (Pulitzer Prize for Fiction)
- Extremely Loud and Incredibly Close: A Novel
- Leaving Berlin: A Novel
- The Silver Linings Playbook: A Novel
- The Light Between Oceans: A Novel
- The Incarnations: A Novel
- You Too Can Have a Body Like Mine: A Novel
- The Love Affairs of Nathaniel P.: A Novel
- Life of Pi
- The Flamethrowers: A Novel
- Brooklyn: A Novel
- The First Bad Man: A Novel
- We Are Not Ourselves: A Novel
- The Blazing World: A Novel
- The Rosie Project: A Novel
- The Master
- Bel Canto
- A Man Called Ove: A Novel
- The Kitchen House: A Novel
- Beautiful Ruins: A Novel
- Interpreter of Maladies
- The Wallcreeper
- Wolf Hall: A Novel
- The Art of Racing in the Rain: A Novel
- The Cider House Rules
- A Prayer for Owen Meany: A Novel
- Lovers at the Chameleon Club, Paris 1932: A Novel
- The Bonfire of the Vanities: A Novel
- The Perks of Being a Wallflower
- The Constant Gardener: A Novel

**Numeric To Numeric Encryption of Databases: Using 3Kdec Algorithm
**

1 Pursuing M Tech (BBSBEC, Fatehgarh Sahib), 2 Asst. Professor, BBSBEC, Fatehgarh Sahib, 3 Release Manager, Miri InfoTech Chandigarh

Kamaljit Kaur 1, K.S Dhindsa 2, Ghanaya Singh 3

Abstract-the volume of data storage capacity has changed a lot as compared with earlier times. As most computers were standalone and only the users had access to data, security was not a big concern. All this changed when computers became linked in networks, in form of small dedicated networks to large LANs, WANs and the World Wide Web. With the growth of networking the security of data became a big issue. Data passes through various networks, communication protocols, and devices to ultimately reach to the user which has made data security increasingly important. Security is becoming one of the most

consideration like should the encryption be performed inside the database or in the application where the data is generated or in a hardware device? Should encryption keys be kept inside the database or somewhere else where it is more secure? Should the granularity of encrypting data be applied to a database, a table or a column level? [2]

resides in the databases.

In this paper we will focus on a security solution for protection of data at rest, specifically protection of numeric data that

urgent challenges in database research and industry. Instead of building walls around servers, a protective layer of encryption should be provided around specific sensitive data-items. This also allows us to define which data stored in databases are sensitive and thereby focusing the protection only on the sensitive data, which in turn minimizes the delays or burdens on the system that may occur from other bulk encryption methods.

ENCRXTION

la Il:tlXXT

PLAINTEXT

|0|0001234

ENCRYPTION

|3412 4

This paper describes a highly original and new approach of securing numeric data of databases. It presents a practical solution to the problem where numeric data was converted to alphanumeric type and hence encrypted data was not possible to be stored in the existing numeric field. The proposed algorithm allows transparent record level encryption that does not change the data field type or fixed length.

**ENCRPTT N PRO(CESS
**

Figure 1. Illustrating encryption of Plaintext (as numeric data) to Ciphertext (again numeric data)

DECRPThON

|IYffRTE

P =:ET

NT

Keywords-Encryption; Decryption; Symmetric Encryption; Block Cipher; Key Expansion; Substitution box; Row Shifting; AddKey. INTRODUCTION The best way of securing the data is to restrict access to the data which can be achieved by the process of authentication

I.

5334f2

L00Q012 34

LDECRXTPTION PROCESS

and authorization. A user should be asked for authenticatingF nform zation Figure 2. Illustrating decryption of numeric data as Plaintext into numeric bef ounlyc informnation before accessing the dataand should only be and sorul data as Ciphertext allowed to perform the operations for which access rights are available. If the data to be accessed is on a local machine, II. ABOUT 3KDEc ALGORITHM applying access control is easy, but if data is accessed from a remote client, user credentials and data needs to be secured on The algorithm is named 3Kdec from its working as it the network. In such situations security protocols are used. encrypts numeric data which is in form of decimal using three Incase that a malicious user somehow breaches the above keys which can be changed anytime. security provisions and gets access to data; the only solution is 3Kdec is a Symmetric key Block encipherment scrambling the data. So encrypting the data whether it is inmotion or at-rest - is the next level of security that will make algorithm. the data worthless for the hacker the data wortless for thehacker [10].Symmetric key algorithm is one which uses a single secret F[10]. Encryption is the process of disguising data in such a way key for both encryption and decryption. Encryption/Decryption to hide its substance, is a very effective way to achieve security as visualized in Figure 1 and 2 above can be considered as an for data at rest. Implementation of a database encryption electronic locking where sender puts the message in a box and strategy raises several important factors that must be taken into locks the box using the shared secret key; receiver unlocks the

978-1-4244-2928-8/09/$25.00 ( 2009 IEEE

1501

Authorized licensed use limited to: K.S. Institute of Technology. Downloaded on July 18, 2009 at 02:27 from IEEE Xplore. Restrictions apply.

6 or 9) Algorithm operates on following steps in sequence for set number of rounds as illustrated in Figure 3: With variable number of rounds and varying key expansions the complexity of algorithm increases. 7 2 1. To create plaintext from the ciphertext receiver uses a decryption algorithm and the same secret key. If P is the plaintext. P= DK (C) = DK (EK (x)) = EK (DK (x)) = x Block Ciphers means a group of plaintext symbols of size a of m (where m>1) are encrypted together creating a group of ciphertext of the same size [5]._ .~~ T ~ ~ 4 2 ~~~~~~~~~~~~~~ 1 5 .. Key 12 is shifting the row 1 one times. row 2 elements two times and row 3 elements zero times with respect to original key Keyl. ICey I 5 2 X 2 5 -5 l I 2_ | 12 2 7. In symmetric key encipherment the encryption and decryption algorithms are inverses of each other. * Three keys (stored as three 3 X 3 matrix) * Substitution Box (commonly referred as SBox) and an inverse S-box * Variable number of Rounds ( which can be 3. III.. The process of expansion of Key 1 into its constituent Key 10.. row 2 elements one time and row 3 elements two times with respect to original key Keyl. C is the ciphertext. 2 2 2 7 0 4 ~ 1 2 Input K1|EYA N . Institute of Technology. Illustration of 3Kdec Algorithm Working 1.S. 2009 at 02:27 from IEEE Xplore. 4 4 X. Key 31 and Key 32. Add set Key A. Encryption: C= EK (P) 2..2 a 0 DD: 0 . Key 22. the decryption algorithm DK(X) creates the plaintext from the ciphertext. while incase of 6 rounds there will be a complexity of two and similarly three incase of 9 rounds. Row Shift 4. KEY COMPONENTS OF 3KDEC ALGORITHM 3Kdec algorithm uses: * Numeric data to be encrypted.. Encryption algorithm EK(x) and the decryption algorithm DK(x) are inverses of each other and they cancel the effect of each other when applied one after the other on the same input. Downloaded on July 18. Find and Substitute 3.. h. To create ciphertext from the plaintext sender uses an encryption algorithm and a shared secret key. The complexity of key expansion is directly depending on number of rounds. Key 1l and Key 12 and similarly Key 20.Key 30. Restrictions apply. and K is the key. The key can be visualized as a set of values/numbers that the cipher as an algorithm operates on [1]. the single key of the three keys are expanded to as many as three keys summing up the total of nine keys to be used in the maximum nine rounds. the encryption algorithm EK(x) creates the ciphertext from. The original message is called plaintext and the message sent through the channel after encryption is called ciphertext. 5 2 4 2|t1 - IROW S=TT AJ~I'Y DI 1 R~E Output I IyS l I E 2 I 0 5 0 a1 5 I i 5 II5 9 R} 0 Figure 3. Incase of 3 rounds there will be algorithm complexity of one. Key Expansion Process 11502 2009 IEEE Internactionalz Advance Computing Conference (IACC 2009) Authorized licensed use limited to: K. KEYEXPANSION In this step. Key 21. Keyl is expanded as Key 10. Key and Key12 is as follows in Figure 4: Key 10is same as Key 1 1 groupofpl Blokerem>l) areCencrypter togetheansreati Key 11 is shifting the row 1 zero times.box with the same key and takes out the message. Decryption: P= DK (C) That is. . Key Expansion Figure 4.

The number of shifts depends on the row number of the matrix.e. second row of matrix is shifted one time and the third row is shifted two times This transformation step shifts towards the left. the byte to be encrypted is found and substituted independently to provide the confusion effect. 3| L DESCRIPTION OF 3KDEc ALGORITHM our algorithm is applied to it: Let us have a look on the input data will be processed when Figure 6. the input to be encrypted becomes: 000001234 NUMBER OF ROUNDS: 9 In this step. The entries of S-box can be different in different encryption processes. FIND AND SUBSTITUTE 1. Institute of Technology. In the next round Key 11 and then Key 12 andsoon. Example: 7 0 3 3 1 6 2 3 1 o 4 1 2 6 3 1 0 9 Substitution Box 4 5 2 6 6 2 5 7 7 0 4 8 8 9 8 9 5 9 Figure6belowillustratestheabovestatedprocess: 4 Inverse Substitution Box 8 5 7 II ° 77 2 3 4 6 1 2 7 68 5 7 7 1 2 9 7 8 2 1 Figure 5. This means 6 3 5 1 0 5 process is carried out and the shifting is done towards the right. . There is no fixed mechanism or any mathematical correlation in the formation of S-box. S-box and Inverse S-box C. 2009 at 02:27 from IEEE Xplore. ADD SETKEY I~~~~~~~~~~7 lel31 81 8 7 9 4 4 4 o L With each round the matrix is added using XOR operation with the above expanded keys. INPUT: 1234 The initial step is to pad the input data with Os i. Initially the user will be prompted for the plaintext to be encrypted and the number of rounds of the encryption process that the user want to carry out. Now the three transformations: Find and Substitute. the Inverse Row Shift D. This means during first round of encryption Key 10 is used. IV.S.B. Where Row 0 has: no shift Row 1: Shift 1 2 Row 2: Shift2 oW 3 towards the left. During the decryption process. Encryption Process 2009 IEEE Inxternational Advanxce Computing Conference (IACC 2009) 1503 Authorized licensed use limited to: K. ROW SHIFT that the first row of matrix is shifted zero times.. The number of shifts is same as the row number. So the simple structure and variable entries of Substitution Box makes the algorithm eligible to be used as a Personal Encryption Algorithm where different S-Box variants can be used in encryption process depending on the party we are dealing with and the varying complexity levels can be set according to our needs. Downloaded on July 18. Row Shift and Add Set Key are carried out on input for the set number of rounds. THREE SET OF KEYS where eachkey is 3X3 matrix Then the three are expanded using the Key expansion process as described above. Number of key expansions depends upon the user input of number of rounds. Restrictions apply..

content. s 11 116 111 4 0 3 4 0 0 amount of memory needed to store the algorithm and the data and the time complexity which refers to amount of time needed to run the algorithm and get the results. Bit operation can be defined as the time required for the computer to add. Institute of Technology. B. Incase of 3Kdec algorithm the S-box values are not fixed and does not depend on any algebraic structure the sender may use different S-box values each time attempting to encrypt the input. d decimal digits can be calculated as: d log2 10.Similarly the process of Decryption can be carried out as follows: 9 I~ 043 90i 4~ 4 $ 5 15 1 | R{'dE' 2 4 11 73 1t 1 T 3 3 0 1 l 21t 5 40 0i 00 oi1 have low level of complexity and we need an algorithm used by the cryptanalyst who is trying to break the code to have high level of complexity. combinations. As in our algorithm the three keys are expanded as if the encrypted data is itself the original based on the number of rounds. Differential cryptanalysis/Chosen-plaintext attack needs the analysis of encryption algorithm to collect information about plaintext-ciphertext relationships.. It appears apossible keys. multiply or divide two single bits ortoperform one singlebit shift. with the goal of finding the cipher key [11]. Lack of weak keys is another advantage of 3Kdec algorithm. . 2009 at 02:27 from IEEE Xplore. The time complexity of 3Kdec algorithm can be measured (independent of the computer on which it is running) by defining the bit-operation complexity which counts the number of bit operations the computer needs to perform to create the output from the input. * * * * STRENGTHS OF 3KDEC 1) Brute. 3Kdec Algorithm Complexity To analyze the computational complexity of a cryptographic algorithm we need an encryption algorithm to The algorithm was designed to be resilient to linear and differential attacks. there will be 10 27 dfferent key content. The probabilistic relationship can be created from the information about the S-box input/output table. Restrictions apply. V.Force attack As the encryption is from numeric to numeric. This means we need to perform encryption and decryption in short span of time. As the number of keys are more and hence the key combination increases to 10 27 which makes guessing of keys harder.. encrypted data is possible to be stored in the existing numeric field thereby algorithm does not change the data field type and set fixed data length. Downloaded on July 18. but at the lComplexity & infinitely if trying to break the code. subtract. one Also known as Exhaustive key search method tries to use all cannot know that the information is encrypted. Decryption Process The main strength of 3Kdec algorithm is that it converts the numeric data input to numeric data output which makes it harder to see and guess whether the input is even encrypted or not. 3KIDEC ALGORITHM ANALYSIS A. 2) Statistical Attacks The strong confusion and diffusion provided by the As S-Box has simple structure and variable entries so Substitution Box lookup and Row Shift transformations the 3Kdec algorithm can be used as Personal removes any frequency pattern in the plaintext. 1 ~~~~~~For example: bit operation complexity of function that adds two integers each having. So the 1504U 2009 IEEE Internaftionazl Advalnce Computing Conference (IACC 2009) Authorized licensed use limited to: K. RMu6 $ 23 7 a 7 7 7 3 0 0 1 2 3Kdec Algorithm Security 11 |0| | 1 | 6 111 4 Figure 7. 3) DifferentialandLinearAttack Since 3Kdec Algorithm encrypts numeric to numeric data.S.. Encryption Algorithm where different encryption processes can be carried out with varying degree of complexity depending on the user requirements. same time we want the intruder to run her computer of program is based on two which types of refers to oresources: space complexity of algorithm | 3 lD 13 W1 1315 06 13 15 1 14 1 7 1 lo 14144 2 9|| 1° 16 15 14 1 1| 02 12 1411T|131 .

Institute of Technology. [11] Srdjan Holovac "Securing Data at Rest: Database Encryption Solution using Empress RDBMS". Koblitz.But the strong point of our algorithm is that every time the three keys as well as S-box entries can be changed which makes it difficult to find the appropriate relationships among the plaintext and the ciphertext pair. Developing a Database Encryption Strategy. Inc. data should be well protected. Behrouz A. New York: Springer-Verlag. Issue 3. Proper access control mechanism should be enforced for securing the data. "Securing Data at Rest.personal to corporate secrets . It is advisable to encrypt the data before putting it on a network even if it passes through a secure channel. CONCLUSION Understanding the need to secure your data is the first step towards securing it. Encryption in relational database management systems. 2007. This algorithm does not take into consideration decimal point numeric data which opens up another area of research and improvements. G. J. Tata McGraw Hill.. Relationship between previous pair is used to analyze the current ciphertext. Linear Cryptanalysis/Known-Plaintext Attack where the attacker needs to have information about plaintext/ciphertext pairs in addition to the intercepted ciphertext that needs to be broken along with the assumption that key has not changed. and J. . 2009 at 02:27 from IEEE Xplore... For computers and networks which store and transfer this data. Kam." The Design and Implementation of Database Encryption"." White Paper. N. 2000.pagel22 Rakesh Agrawal Jerry Kiernan Ramakrishnan Srikant Yirong Xu. Noor Habibah Arshad. ACM Transactions on Database Systems. John Wiley & Sons. Maurer." ACM SIGMOD. 6(2).attacker has to even guess what were the values used for the SBox in encrypting that data.Forouzan. D. While in motion. Volume 1. A database encryption system with Sub keys. Saharbudin Naim Tahir Shah. Applied Cryptography. Restrictions apply. "The Role of Cryptography in Database Security.is present in form of data. It is for us to realize the damage this data can do if it falls into the hands of an unscrupulous person. U. the Netherlands. C. In today's age every detail . Security Whitepaper."Securing Data-At-Rest". Wang.3 Working Conference on Database Security (DBSec'00).. [3] [4] [5] [6] [7] [8] [9] 2009 IEEE Inxternational Advanxce Computing Conference (IACC 2009)j 1505 Authorized licensed use limited to: K. Fourteenth Annual IFIP WG 11. Simplicity and Cost The 3Kdec algorithm has a simple structure that it can be easily implemented using cheap processors and minimum amount of memory. 1981. 1988. or on an organizations storage network. it must be secured and should not come in the hand of an unauthorized entity. Azlinah Mohamed. Downloaded on July 18." Order Preserving Encryption for Numeric Data". VI. 2002. Abdul Manaf Mamat. International Journal Of Applied Mathematics And Informatics. Literature by Tata Consultancy Services. School.S. A Course in Number Theory and Cryptography. In Proc. The algorithm can be implemented for securing any corporate related accounting information to data of personal use. Inc. 1996. Whether the data is on your laptop. Davida. it is just numbers. REFERENCES [1] [2] B. [10] SK Bhatnagar. He and M. IBM Almaden Research Center RSA Security. VII. Schneier.pagel 15. desktop.Cryptography and Network Security. 2004. Wells.

- Security PaperUploaded byKalai Mani M
- A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient, and Versatile Data Access ManagementUploaded byIRJET Journal
- Introduction to CryptographyUploaded bysrid_v
- IKC.pptxUploaded bydineshpilla
- History of CryptographyUploaded byrestlesskid
- File Locking System Using Aes AlgorithmUploaded bydhana pal
- Cryptography - lecture3Uploaded byAbhijeet
- Cryptography ReportUploaded byJohn
- MAC Address as a Key for Data EncryptionUploaded byijcsis
- 4. Optimum Operational.fullUploaded byTJPRC Publications
- Online Voting System Powered by Biometric Security using Cryptography and StegnographyUploaded byrashmibunty
- CipherUploaded byrudy_tanaga
- Secure Data sharing in Dynamic Multi Owner in Cloud StorageUploaded byijircee
- Quant CryptographyUploaded byshireeshagudimalla
- Resumen tipos de CifradoUploaded byMiguel Alvarenga
- Design and Implementation of Hybrid Cryptosystem using AES and Hash FunctionUploaded byIOSRjournal
- versatileUploaded bypostscript
- Authentication and Authorization Mechanism for Internet of Things InfrastructureUploaded byDhanushka Dolapihilla
- Traditional Reversible Data Hiding Based Secret CommunicationUploaded byIJSTE
- Advantages of Classical Cryptography Over the Quantum CryptographyUploaded byTI Journals Publishing
- Pesce Mark FreedomUploaded byMichael Labay
- Software Project Non IeeeUploaded bytechmindz
- Hill CipherUploaded byANISH JAIN
- Public Key EncryptionUploaded byNancy
- Hybridization of Symmetric Key Encryption and Visual CryptographyUploaded byseventhsensegroup
- Hw Ch9 Hernan Ortega 2Uploaded byHernán Esteban Ortega
- Encriptador y Desencriptador en EnsambladorUploaded byLalo Glezz
- A Modern authorized de-duplication method on hybrid cloudUploaded byIRJET Journal
- Security on the InternetUploaded byKerca Vini
- Digital Document Processing and ManagementUploaded byjuan_bohorquez6180