In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the key matrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In this paper a novel modification is performed to the double guard Hill cipher in order to reduce the number of calculation to obtain the cipher text by using non-square matrices. This modified double guard Hill cipher uses a non-square matrix of order (p × q) as its private keymatrix.
Recent advancement in computer industry, communication and technology leads to an information revolution for past two decades. In information revolution, securing the information is the major issue. Also it throws many unique challenges in transmitting the digital information, a digital data or a multimedia data, through an unsecured wireless network. Cryptology is the science used to secure the information. Cryptology is a Greek word compounded by “kryptos” means hidden and “logos” means word. The study of “cryptology” is called cryptography. The art of sending message secretly was in practice even before four thousand years as a safety measure in military and diplomatic communications.
In cryptography and network security by William stallings, encryption and decryption are the two terms used for secured communication. In encryption, the information which is to be transmitted safely (plaintext) is converted to cipher text using any algorithm or logic. In decryption, the received cipher text is decrypted using the same algorithm or logic used during the encryption to obtain the original information.
Nowadays, the computer ciphers substitute the mechanical cryptology techniques. Many ciphers are formulated with the help of substitution and transposition principles. All the ciphers depend on choosing a key either public or private. Three issues have to be addressed to propose a new cipher. The operations used to convert plaintext to cipher text and cipher text to plaintext are formed meticulously. Then the status of keys used for encryption and decryption as private or public and number of keys used in the process are arrived and the processing of the plaintext had to finalized.
All traditional cryptosystems developed before 1970s are symmetric key cryptosystems. Most of the contemporary cryptosystem are symmetric such as Advanced Encryption Standard [
In Hill cipher alphabets, A to Z was masked with the values of 0 to 25 and ciphered using private key matrix. Hill cipher is capable of encrypting alphabets alone not the numerals and special characters. It is susceptible to “Known Plain text attack” as the key matrix is not permutated. To conquer this security flaw, many researchers proposed the unique modification. Ismail et al. [
V. U. K. Sastry et al. [
Many researches are performed to improve the security flaws in Hill cipher by strengthening the key matrix. To prevent the vulnerability against the known plaintext attack Yeh et al. [
Hill cipher is modified using Maximum Distance Separable (MDS) variable length key matrix to strengthen the security of the cryptosystem [
The Double Guard Hill Cipher is modified with the non-square key matrix of the order (p × q) and the message matrix is obtained with respect to the values of p and q of key matrix. This novel modification is performed expecting to reduce the computational time and the number of bits transmitted. The permutation procedure is replaced by simply exchanging either rows or columns without changing its determinant. The encryption and decryption algorithm of the proposed modified double guard Hill cipher is
The encryption algorithm (
1) Let [K] by the non-square key matrix of p × q. If p > q, it is called as vertical matrix else it is horizontal matrix.
2) The message matrix [M] is arranged according the key matrix [K].
For vertical key matrix: order of the message matrix [M] is q × n.
For horizontal key matrix: order of the message matrix [M] is m × p.
3) Obtain the encrypted cipher matrix [C] by
For vertical key matrix:
For horizontal key matrix:
Note: In a non-square matrix, two matrix [A] and [B] of different order is not associative.
4) Before transmitting, the rows and columns are interchanged so that it is prone to various attacks like “known plain text attack”, “chosen plain text attack”, “cipher text attack” as well as “chosen cipher text attack”.
Thus the encrypted matrix is obtained for transmission. As the permutation of the key matrix is not performed, there is no need to transmit the “t” matrix along with the encrypted matrix.
The decryption algorithm (
1) Received encrypted matrix is rearranged with respect to the key matrix.
2) Plain text is obtained by multiplying the Mod-128 inverse key with the rearranged encryption matrix.
For vertical key matrix,
For horizontal key matrix,
Note: According to theorem 1 [
Theorem 1
Every non singular horizontal matrix A having a right inverse
The modified Double Guard Hill Cipher is illustrated with a sample message as
Message: “Meet on 3-3@ #R”
ASCII value: [77 101 101 116 32 111 110 32 51 45 51 64 35 82]
Encryption for vertical key matrix:
Key matrix of order 4 × 3:
Since the message matrix should have 3 × n, it is arranged to 3 × 5 for the given key matrix. Arrange [M] column wise
The encrypted matrix in row wise,
[C] = [82 17 23 114 23 64 20 19 28 23 27 41 56 29 114 31 47 79 96] is transmitted.
Decryption for vertical key matrix:
The received encrypted cipher matrix is rearranged column wise with respect to the column of mod-128 inverse of the key matrix, [K−1]
Note: The determinant of the non-square matrix is obtained by using the Theorem 2 and the modulo inverse of the non-square matrix is obtained by Theorem 3.
Theorem 2
The determinant of a non-square matrix is given as
If
If
Theorem 3
Inverse of the non-square matrix is given by
The mod-128 inverse of the key matrix [K] is
Similarly the encryption and decryption for horizontal key matrix can be performed.
The cipher text obtained by using the vertical key matrix and horizontal key matrix are different for the same plaintext. Similarly, according to the non-square matrix theorem, right inverse matrix exist for the horizontal matrix and left inverse matrix exist for the vertical matrix. The original plaintext cannot be retrieved if the inverse matrices are multiplied reversely.
In the modified double guard Hill cipher the encryption time is reduced as it avoid the permutation and the transmitted are reduced as it avoids the transmission of ‘U’ matrix along with the cipher text. The execution time and the encryption speed (
The proposed cipher is strengthened against the ‘known plaintext attack’ without the procedure of permutation by the property of non-square matrix and shuffling the order of the cipher text. The transmission of ‘U’ matrix along with encrypted cipher text in double guard Hill cipher is eluded by evading permutation. So, in the modified double guard Hill cipher the encryption time is reduced by reducing the number of computation, also it reduce the bits transmitted when compared with double guard Hill cipher. The proposed cipher is capable of encrypting the data faster than the various ciphers.
Cipher | Execution time of Encryption/Bytes in ms | Length of plain text in binary | Length of key in binary | Encryption Bytes/Second |
---|---|---|---|---|
DES | 31.1/320 | 64 | 56 | 7988 |
AES | 61.2/320 | 128 | 128 | 5320 |
Block cipher with blending of Hill cipher and playfair cipher | 11.5/288 | 112 | 448 | 25,043 |
Large block cipher involving key dependent permutation, interlacing and iteration | 8.5/256 | 448 | 384 | 30,608 |
A double guard Hill cipher | 6.12/256 | 448 | 288 | 32,520 |
Modified Double guard Hill cipher | 5.4/256 | 448 | 384 | 37,224 |
In Wireless Sensor Network (WSN), data can be securely transmitted in an energy efficient manner using modified LEHS (Low Energy High Secured) algorithm. In modified LEHS algorithm, the backbone of the network to transmit the data to the base station is configured by Losningen cross-layer approach (LCA) to enable the energy efficient transmission in order to enhance the network’s lifetime and the data is secured using modified Double Guard Hill cipher. Losningen approach [
Routing performance can be increased enormously by this approach as the link quality and the congestion information are revealed to network layer immediately. The cross-layer designs with tight coupling between many layers become hard to review and redesign. Since changing one subsystem leads to changing of all other parts because of interconnection. Hence in Losningen cross layer approach, the merging of MAC layer with the network layer preserves the modularity of the network to ease the review and redesign for the future enhancement.
An earnest effort has been made to develop the cross layer approach [
At the network layer, the traffic is balanced through the AOMDV routing protocol. AOMDV routing protocol allows significant energy conservation as it has the ability to reduce the route discovery frequency. This routing algorithm is on-demand algorithm that enables self-starting, dynamic, multihop routing when a source node wants to send a data packet. Since the routing messages are of small fixed length packets and uses it on-demand basis, it suits well for WSNs. As it is capable of providing multiple redundant paths, the data can be transferred using alternate path during path failure.
The three main phases of this algorithm are route discovery, route updation and route re-establishment. When a node wants to transmit a data to another node without prior knowledge of the destination, it enables the route discovery phase by flooding the route request (RREQ) in order to notify the destination of the data packet. To minimize the energy required for flooding, the length of the request is small and constant.
The propagation of RREQ from the source to the sink (destination) node launches multiple reverse paths at the intermediate nodes as well as the destination nodes. The frequency of route discovery is reduced as the AOMDV routing protocol provides the alternate paths for the intermediate nodes too. The destination node responds to the first received request and discards the duplicate ones. It sends the route reply (RREP) back to the source node on the fastest route called on-route nodes. This routing protocol establishes and maintains efficient routes in dynamic topology. When the routes are disconnected, the routing protocol makes use of local topology information gathered by the medium access protocol to re-establish the route efficiently.
Performance of the modified LEHS algorithm for data transmission is simulated using network simulator-2 (NS2). Simulation results are obtained by considering maximum of 100 nodes randomly deployed in a uniform rectangular field of dimension 1000 m × 1000 m. Traffic pattern between the chosen source sink pair consist of several CBR/UDP connections. Let the packet size be 500 bytes and the number of packets transmitted per second be 25 with the packet transfer interval time of 0.04 seconds.
The metric used to evaluate the performance is network lifetime. Network lifetime measures the amount of time before a certain percentage of sensor nodes run out of battery power. During the simulation, the whole network is considered to be down when 25% of the normal sensor nodes are depleted of power. The simulation result of modified LEHS algorithm for data transmission is compared with LEHS algorithm with DGHC in order to prove the enhancement of network’s lifetime. From the readings, the network lifetime of LEHS-MDGHC is seems to be enhanced by 2.4 times than LEHS-DGHC as shown by
In the modified double guard Hill cipher, the non-square matrices are used as private key matrix. Because of the property of non-square matrix and obtaining the cipher text by twisting the order of the cipher text strengthen the proposed cipher against the “known plaintext attack” without the procedure of permutation. Also by avoiding permutation, the transmission of “U” matrix along with encrypted cipher text in double guard Hill cipher is eluded. So, in the modified double guard Hill cipher the number of computation is reduced by avoiding the permutation, also it reduce the bits transmitted when compared with double guard Hill cipher. The proposed cipher is capable of encrypting the data faster than the various ciphers. Therefore in future, it can be refined for image encryption in wireless sensor network in order to enhance the network’s lifetime for secure image transmission.
C. Bennila Thangammal,D. Praveena,P. Rangarajan, (2016) Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network. Circuits and Systems,07,1190-1198. doi: 10.4236/cs.2016.78102