Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Add-on Security Level for Public Key Cryptosystem using Magic Rectangle with Column/Row Shifting

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 14
Year of Publication: 2014
Authors:
D. I. George Amalarethinam
J. Sai Geetha
K. Mani
10.5120/16866-6755

George D I Amalarethinam, Sai J Geetha and K Mani. Article: Add-on Security Level for Public Key Cryptosystem using Magic Rectangle with Column/Row Shifting. International Journal of Computer Applications 96(14):38-43, June 2014. Full text available. BibTeX

@article{key:article,
	author = {D. I. George Amalarethinam and J. Sai Geetha and K. Mani},
	title = {Article: Add-on Security Level for Public Key Cryptosystem using Magic Rectangle with Column/Row Shifting},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {96},
	number = {14},
	pages = {38-43},
	month = {June},
	note = {Full text available}
}

Abstract

In today's world, security is required to transmit confidential information over the network. Security is also demanded in wide range of applications. Cryptographic algorithms play an important role in providing the data security against malicious attacks. The efficiency of cryptographic algorithm is not only based on its time taken for encryption and decryption, and it also accounts for number of stages used to obtain the cipher text from a plain text. Rivest-Shamir-Adleman (RSA) algorithm is a popular encryption scheme that guarantees confidentiality and authenticity over an insecure communication channel. However, several attacks are introduced to break the security of these algorithms due to certain constraints. Also, it may not be guaranteed that the cipher text is fully secured. One such limitation in the past crypto system is using ASCII Characters for numerical representation of the selected text. To overcome the above said issue, an innovative algorithm, namely, Magic Rectangle is being proposed in this work. It is helpful to enhance the security on account of its complexity of the encryption process. The singly even magic rectangle is constructed based on the seed number, start number, row sum and column sum. It is very difficult to trace these values because of their randomness. After construction of the rectangle, the columns / rows of resultant rectangle are shifted based on the seed value. The proposed work introduces additional level of security in public key algorithms such as RSA, ECC and Rabin, Elgamal etc. Finally, Magic Rectangle helps to rectify the existing issues of public key cryptosystem. Cipher text generated by using the proposed method can be completely different when compared to the plain text and will be suitable for the secured communication through the internet. Since this model is acting as a wrapper to public key algorithm, it confirms that the network security is reasonably improved.

References

  • A. J. Menezes ,P. C. Van Oorschot, and S. Vanstone , "Handbook of Applied cryptography", CRC Press, Boca Ration,Florida, USA,1997.
  • Amare Anagaw Ayele1 , Dr. Vuda Sreenivasarao. ," A Modified RSA Encryption Technique Based on Multiple public keys, International Journal of Innovative Research in Computer and Communication Engineering ISSN (Online): 2320 – 9801Vol. 1, Issue 4, June 2013
  • Gopinath Ganapathy, and K. Mani , " Add-On Security Model for public key Cryptosystem Based on Magic Square Implementation", ISBN 978-988-17012-6-8, Proceedings of the world congress on Engineering and Computer Science 2009 Vol I, San Fransisco, USA.
  • Sonia Goyat. ," Genetic key generation for public key cryptography ",International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3, July 2012.
  • B. R. Ambedkar and S. S. Bedi,"A New Factorization B. R. Ambedkar and S. S. Bedi,"A New Factorization Vol. 8, Issue 6, No 1, November 2011,ISSN :1694-0814.
  • Sonal Sharma, Saroj Hiranwal, Prashant Sharma A new variant of subset-sum cryptosystem over RSA, International Journal of Advances in Engineering & Technology, Jan 2012. ©IJAET ISSN: 2231-1963
  • Sharma, P. Gupta, A. K. ; Vijay, A. "Modified Integer Factorization Algorithm Using V-Factor Method" Page(s): 423 - 425 ,978-0-7695-4640-7/12, IEEE 2012.
  • Ravi Shankar Dhakar, Amit Kuar Gupta, Prashant Sharma "Modified RSA Encryption Algorithm(MREA)"- 978-0-7695-4640-7/12, IEEE2012
  • Adam Rogers, and Peter Loly ,"The inertial properties of Squares and Cubes", Nov-2004, pp. 1-3.
  • en. wikipedia. org/wiki/Golden_rectangle?
  • Omotheinwa T. O, Ramon S. O. , " Fibonacci Numbers and Golden Ratio in Mathematics and Science", International Journal of Computer and Information Technology (ISSN"2279-0764) Volume 03-Issue 04, July 2013
  • Mohammad Zaidul Karim and Nargis Akter, " Optimum Partition Parameter of Divide-And-Conquer Algorithm for solving closest-Pair Problem", International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 5,Oct 2011.
  • B. Schenier. "Applied Cryptography", John Wiley & Sons Inc, New York, Second Edition, 1996.
  • William Stallings, "Cryptography and Network Security", Prentice Hall, Upper Saddle River, New Jersy, USA, Second Edition ,1997.
  • Ashish Agarwala R Saravanan," A Public Key Cryptosystem Based on Number Theory" 978-1-4673-0255-5/12,IEEE2012.