Professional Documents
Culture Documents
695
Addition of numbers 80 (Maximum number) and 20 For example an operation on 16 bits has been
(Minimum number) is 100. Element of Matrix1 will displayed
be subtracted from 100 & create Matrix 2 0100010001001010
0 1 0 0 0 1 0 0 0 1 0 0 1 0 10
Matrix2
31 27 20 35
22 26 35 22
26 28 27 24
21 23 80 48 0101001000100010
0101001000100010
Each element of Matrix1 will be divided by each 01 01 00 10 00 10 00 10
element of Matrix2 & take integer part to create
Matrix3
Matrix3
2 2 4 1
3 2 1 3 10 00 10 00 10 00 01 01
2 2 2 3 1000100010000101
3 3 0 1 1000 1000 1000 0101
Encryption: -
If the input stream is “Don’t waste time”. The ASCII
of this stream is
68 111 110 39 116 32 119 97 115 116 101 32 0001 0001 0001 1010
116 105 109 101 0001000100011010
0001000100011010
Process 1:
The converted ASCII Elements of the Key are 33, 30,
22, 38, 24, 28, 37, 25, 30, 29, 29, 80, 22, 26, 83, 49.
The Encryption process will be execute like 33+68,
30+111, 22+110, 38+39, 24+116, 28+32, 37+119, 0101100010001000
49+101. 0101100010001000
696
This implementation has been done using high-level
language. Due to page restriction we have given only
Study on DLL files.
Table2
File Size v/s Decryption time, DLL files (for
SKBMIET, RSA and T-DES algorithm)
Source file Source Decryption time (second)
name file size T-
RSA SKBMIET Figure 2a: Distribution of characters in source file
(*.DLL) (in bytes) DES
dfrgres.dll 51,200 ~0 5 ~0
cssqchk.dll 73,728 ~0 7 ~0
atxprsxy.dll 101,888 ~0 10 ~0
ylogin.dll 128,216 ~0 12 ~0
msgint.dll 151,583 ~0 14 ~0
vcdmenu.dll 180,288 1 18 ~0
script.dll 202,752 1 20 ~0
Figure 2b: Distribution of characters in RSA
swg.dll 256,440 1 25 0.1
slbcsp.dll 306,176 1 30 0.2
wmadmod.dl 408,064 1 40 0.6
mapi.dll 520,128 1 51 0.9
vqfdeclib.dll 667,648 2 66 1
dbgeng.dll 847,872 2 85 1.5
mtb40bas.dll 1,017,248 2 101 1.8
vcmmgr.dll 2,019,328 5 204 2.9
Figure 2c: Distribution of characters in T-DES
697
Figure 3:
Chi-Square Values for SKBMIET, T-DES & RSA
7. Conclusion
Figure 2d: Distribution of characters in SKBMIET
Figure 2: The proposed technique presented in this paper is
Frequency distribution graph of the file ‘noise.txt’ for simple, easy to implement. The performance of the
SKBMIET, T-DES and RSA as the source file system increases with the varying block-size. Prior to
the communication of the confidential message, the
maximum and minimum block-size and the block-
6. Tests for Non-Homogeneity division algorithm must be exchanged between the
sender and receiver side. The algorithm produces a
The well accepted parametric test has been good competitive Chi-Square values and wide
performed to test the non-homogeneity between frequency distribution in its preliminary testing part
source and encrypted files. The large Chi-Square while comparing with the RSA and T-DES system.
values may conform the heterogeneity of the source Cascading of the technique with variable block sizes
and the encrypted files [11]. Text files are taken for and session key may increase the security further.
experiment. The Chi-Square test has been performed
using source file and encrypted files for SKBMIET
technique and existing RSA and TDES techniques.
8. References
Table 3 shows the values of Chi-Square for different
[1] J.K. Mandal, S. Dutta, “A Universal Bit-Level
file sizes, which show that the value of Chi-Square Encryption Technique, 7th State Science and
mostly increasing as file the size increases. Ten files Technology Congress, Jadavpur University, February
of different sizes are taken. Further the high chi- 2000.
square values may ensure the non- homogeneity [2] S. Mal, J.K. Mandal , S. Chatterjee, S. Sinha, “A
between source and encrypted files. In all three cases Microprocessor Based Encoder Through Transposition
of implementation a good degree of non-homogeneity of bits”, Proceeding of the International Symposiumon
observed. From table 3 it is clear that in some cases Information: Emerging trends, IIT ,Allahabad, 19-21
better chi-square values are obtained compared to T- September,2003,pp 17-27.
[3] S. Mal, J.K. Mandal , S. Dutta, “A 256-Bit Recursive
DES. So it may be inferred that proposed SKBMIET
Pair Parity Encoder for encryption”, accepted for
technique may ensure optimal security in transmission. publication in AMSE Journal, France 2003.
The pictorial representations of chi-square values are [4] W. Stallings, “Cryptography and Network Security:
given in figure 3. Principles and Practices”. Pearson Education, 2004.
Table 3 [5] A. Menezes, P. Van Oorschot, S. Vanstone, “Handbook
Chi-Square Values of Applied Cryptography”, CRC Press 1996.
File Name RSA TDES SKBMIET [6] Simon Singh, “The Code Book”, 4th Estate.
ils.txt 2038.374 1922.287 1992.6432 [7] Kanetkar, “Let Us C”, BPB Publication, 4th Edition,
leesmy.txt 3984.8607 3814.2818 3903.2875 2002.
ukrain.txt 8935.8820 8956.6987 8555.8843 [8] Y. Kanetkar, “C Projects” BPB Publications, 2002.
cp1257.txt 18132.3847 17449.9907 17880.3742 [9] E. Balagurusamy, “Programming in ANSI C”, TATA
roman.txt 27437.2854 25790.1278 26365.3506 McGraw HILL, Second Edition, 2001.
corpchar.txt 36220.3704 34413.9289 35174.4786
[10] Ankit Fadia, “Network Security”, MACMILLAN
oemeula.txt 44187.7863 41665.7520 42492.5293
Publications, 2007.
incidia.txt 52680.738 49729.6400 50567.3143
reedme.txt 61404.1060 57999.7515 59025.5998 [11] Subhranil Som, Dipanjan Mitra, Jhilam Haldar,
schedule.txt 62525.2805 58604.5273 60038.3182 “Secure-Bit Rotate and Swapped Encryption Technique
(SBRSET)”, National Conference on Trend in Modern
Engineering System (IConTiMES 2008), JIS College of
Engineering, Feb. 2008.
698