CFP last date
20 December 2024
Reseach Article

Add-on Security Level for Public Key Cryptosystem using Magic Rectangle with Column/Row Shifting

by D. I. George Amalarethinam, J. Sai Geetha, K. Mani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 14
Year of Publication: 2014
Authors: D. I. George Amalarethinam, J. Sai Geetha, K. Mani
10.5120/16866-6755

D. I. George Amalarethinam, J. Sai Geetha, K. Mani . Add-on Security Level for Public Key Cryptosystem using Magic Rectangle with Column/Row Shifting. International Journal of Computer Applications. 96, 14 ( June 2014), 38-43. DOI=10.5120/16866-6755

@article{ 10.5120/16866-6755,
author = { D. I. George Amalarethinam, J. Sai Geetha, K. Mani },
title = { Add-on Security Level for Public Key Cryptosystem using Magic Rectangle with Column/Row Shifting },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 14 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 38-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number14/16866-6755/ },
doi = { 10.5120/16866-6755 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:21:47.922509+05:30
%A D. I. George Amalarethinam
%A J. Sai Geetha
%A K. Mani
%T Add-on Security Level for Public Key Cryptosystem using Magic Rectangle with Column/Row Shifting
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 14
%P 38-43
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's world, security is required to transmit confidential information over the network. Security is also demanded in wide range of applications. Cryptographic algorithms play an important role in providing the data security against malicious attacks. The efficiency of cryptographic algorithm is not only based on its time taken for encryption and decryption, and it also accounts for number of stages used to obtain the cipher text from a plain text. Rivest-Shamir-Adleman (RSA) algorithm is a popular encryption scheme that guarantees confidentiality and authenticity over an insecure communication channel. However, several attacks are introduced to break the security of these algorithms due to certain constraints. Also, it may not be guaranteed that the cipher text is fully secured. One such limitation in the past crypto system is using ASCII Characters for numerical representation of the selected text. To overcome the above said issue, an innovative algorithm, namely, Magic Rectangle is being proposed in this work. It is helpful to enhance the security on account of its complexity of the encryption process. The singly even magic rectangle is constructed based on the seed number, start number, row sum and column sum. It is very difficult to trace these values because of their randomness. After construction of the rectangle, the columns / rows of resultant rectangle are shifted based on the seed value. The proposed work introduces additional level of security in public key algorithms such as RSA, ECC and Rabin, Elgamal etc. Finally, Magic Rectangle helps to rectify the existing issues of public key cryptosystem. Cipher text generated by using the proposed method can be completely different when compared to the plain text and will be suitable for the secured communication through the internet. Since this model is acting as a wrapper to public key algorithm, it confirms that the network security is reasonably improved.

References
  1. A. J. Menezes ,P. C. Van Oorschot, and S. Vanstone , "Handbook of Applied cryptography", CRC Press, Boca Ration,Florida, USA,1997.
  2. Amare Anagaw Ayele1 , Dr. Vuda Sreenivasarao. ," A Modified RSA Encryption Technique Based on Multiple public keys, International Journal of Innovative Research in Computer and Communication Engineering ISSN (Online): 2320 – 9801Vol. 1, Issue 4, June 2013
  3. Gopinath Ganapathy, and K. Mani , " Add-On Security Model for public key Cryptosystem Based on Magic Square Implementation", ISBN 978-988-17012-6-8, Proceedings of the world congress on Engineering and Computer Science 2009 Vol I, San Fransisco, USA.
  4. Sonia Goyat. ," Genetic key generation for public key cryptography ",International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3, July 2012.
  5. B. R. Ambedkar and S. S. Bedi,"A New Factorization B. R. Ambedkar and S. S. Bedi,"A New Factorization Vol. 8, Issue 6, No 1, November 2011,ISSN :1694-0814.
  6. Sonal Sharma, Saroj Hiranwal, Prashant Sharma A new variant of subset-sum cryptosystem over RSA, International Journal of Advances in Engineering & Technology, Jan 2012. ©IJAET ISSN: 2231-1963
  7. Sharma, P. Gupta, A. K. ; Vijay, A. "Modified Integer Factorization Algorithm Using V-Factor Method" Page(s): 423 - 425 ,978-0-7695-4640-7/12, IEEE 2012.
  8. Ravi Shankar Dhakar, Amit Kuar Gupta, Prashant Sharma "Modified RSA Encryption Algorithm(MREA)"- 978-0-7695-4640-7/12, IEEE2012
  9. Adam Rogers, and Peter Loly ,"The inertial properties of Squares and Cubes", Nov-2004, pp. 1-3.
  10. en. wikipedia. org/wiki/Golden_rectangle?
  11. Omotheinwa T. O, Ramon S. O. , " Fibonacci Numbers and Golden Ratio in Mathematics and Science", International Journal of Computer and Information Technology (ISSN"2279-0764) Volume 03-Issue 04, July 2013
  12. Mohammad Zaidul Karim and Nargis Akter, " Optimum Partition Parameter of Divide-And-Conquer Algorithm for solving closest-Pair Problem", International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 5,Oct 2011.
  13. B. Schenier. "Applied Cryptography", John Wiley & Sons Inc, New York, Second Edition, 1996.
  14. William Stallings, "Cryptography and Network Security", Prentice Hall, Upper Saddle River, New Jersy, USA, Second Edition ,1997.
  15. Ashish Agarwala R Saravanan," A Public Key Cryptosystem Based on Number Theory" 978-1-4673-0255-5/12,IEEE2012.
Index Terms

Computer Science
Information Sciences

Keywords

Magic Rectangle Column/Row shifting Public Key Cryptosystem RSA Security Public key Secret Key MR