Please use this identifier to cite or link to this item: http://inet.vidyasagar.ac.in:8080/jspui/handle/123456789/5330
Title: A Cascaded Toolkit for Secure Data Transmission
Authors: Das, Ramkrishna
Dutta, Saurabh
Keywords: Security
Authentication
Encryption Key
Decryption Key
Issue Date: 27-Dec-2019
Publisher: Department of Computer Science, Vidyasagar University , Midnapore , West Bengal , India
Abstract: Cryptography is the practice and study of techniques to hide information in storage or transit for secure communication in the presence of adversaries. Private key cryptography uses the same cryptographic keys for both encryptions of plaintext and decryption of ciphertext.The keys may be identical or there may be a simple transformation to go between the two keys. Authentication is a process that ensures a user’s identity. Steganography is the process of hiding information using a cover carrier like text, image, audio, and video. In the last two decades, researchers have derived new algorithms and information hiding models using cryptography, authentication, and steganography.There is a scope to develop a security toolkit by combining newly implemented independent models using cryptography, authentication, and steganography all together in a cascading manner which provides better security for transmitting data as compared to the standard algorithms.The basic objective of the work is to design an integrated ciphering system or a so called, ‘security toolkit’. Such a system has been formed by combining a set of newly developed independent bit-level ciphering protocols. Each of these protocols ultimately has acted as the ‘building block’ for that implemented ‘security toolkit’. For the purpose of assessing each ‘building block’ which has been developed during the work, different standard algorithms and parameters have been used.The contribution of the abstract of this research is threefold. In the first part, ‘user authentication building blocks’ have been introduced based on CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) code generated from personal information and OTP (One Time Password) formulated on biometric image.Three authentication schemes have been implemented namely “CAPTCHA Code based on User Personal information and Likings (CCUPL)”, “Secret Value based on Randomized One Time Password (SVROTP)” and “Numeric and biometric Image-based One Time Password (NIOTP)” for ‘authentication building blocks’.CAPTCHA or OTP generation time, their randomness and how they provide security over different network attacks have been considered as standard parameters for assessing the performances of newly implemented schemes.The distribution of the private key without interpretation is very hard to achieve. So, in the second part, an attempt has been made to design a predefined secret procedure to retrieve the secret value from the private key, as well as securing both the actual private key value and the secret procedure from unauthorized access at the time of encrypting character based plain text. Both the encryption and decryption have been done by the secret value derived from the private key. Seven text encryption algorithms have been implemented namely “Prime number with Alphabetic Group based text encryption (PAG)”, “Palindrome number with Alphabetic Group and Operator based text encryption (PAGO)”, “Multiple Operator and Even Odd position based text encryption (MOEO)”, “Multiple Operator and ASCII Value based text encryption (MOAV)”, “Multiple Operator and number of Zeros and Ones based text encryption (MOZO)”, “Armstrong and Perfect number with Cipher Sequencing based text encryption (APCS)” and “Amicable number with Cipher Sequencing based text encryption (ACS)” for ‘text encryption building blocks’.Multiple parameters like time requirement for phase wise (encryption + decryption) execution, degree of freedom value, formulation of the structure of private key being used, Pearsonian chi-square value have been considered for measuring the performance of ‘text encryption building blocks’. The result of each of the algorithms has been compared with standard AES (Advanced Encryption Standard), Triple DES (Data Encryption Standard), Twofish, Blowfish and Serpent algorithms where satisfactory outcomes have been observed. In the third part, image partitioning, key based encryption, digital enveloping and user defined steganographic scheme based new ‘image encryption building blocks’ have been introduced. Three new image encryption schemes have been implemented namely “Even Odd block based Digital Enveloping scheme (EODE)”, “Cumulative Image encryption using Digital enveloping, Key based encryption with image Partitioning (CIDKP)” and “Cumulative Image encryption using Steganographic scheme with Pixel repositioning (CISP)” for ‘image encryption building blocks’.Encryption speed, cryptographic security, Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Structural Similarity Index Measure (SSIM), Universal Image Quality Index, Bit Error Rate (BER), Correlation Coefficient (CC) and Normalized Cross Correlation (NCC) have been considered as parameters for measuring the performances of the implemented ‘ image encryptions building blocks’. Based on all these and few more new parameters, the performance of each ‘building block’ has been compared with two selected standard existing protocols. After the successful completion of designing and developing all the ‘building blocks’ in an independent manner, all such blocks have been cascaded by formulating proper schematic characteristics as well as operational characteristics. A satisfactory outcome of implementing this ‘security toolkit’ in a stand-alone system has been experienced, which has indicated that the successful completion of this chain of actions has been ultimately reached to the end of this research work.
URI: http://inet.vidyasagar.ac.in:8080/jspui/handle/123456789/5330
Appears in Collections:Computer Science - Ph.D

Files in This Item:
File Description SizeFormat 
01_title.pdf49.02 kBAdobe PDFView/Open
02_certificate.pdf57.41 kBAdobe PDFView/Open
03_abstract.pdf24.33 kBAdobe PDFView/Open
04_declaration.pdf52.91 kBAdobe PDFView/Open
05_acknowledgement.pdf14.44 kBAdobe PDFView/Open
06_contents.pdf29.18 kBAdobe PDFView/Open
07_list_of_tables.pdf20.62 kBAdobe PDFView/Open
08_list_of_figures.pdf33.9 kBAdobe PDFView/Open
09_list_of_abbreviations.pdf16.74 kBAdobe PDFView/Open
10_chapter1.pdf218.4 kBAdobe PDFView/Open
11_chapter2.pdf252.83 kBAdobe PDFView/Open
12_chapter3.pdf187.45 kBAdobe PDFView/Open
13_chapter4.pdf4.26 MBAdobe PDFView/Open
14_chapter5.pdf1.25 MBAdobe PDFView/Open
15_chapter6.pdf504.73 kBAdobe PDFView/Open
16_chapter7.pdf5.59 MBAdobe PDFView/Open
17_chapter8.pdf533.13 kBAdobe PDFView/Open
18_conclusion.pdf1.29 MBAdobe PDFView/Open
19_bibliography.pdf87.75 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.