Download Full-Text PDF Cite this Publication

**Open Access**-
**Total Downloads**: 4 -
**Authors :**M. Madhurya, Dr. B. Ananda Krishna -
**Paper ID :**IJERTCONV1IS03013 -
**Volume & Issue :**AAMT – 2013 (Volume 1 – Issue 03) -
**Published (First Online):**30-07-2018 -
**ISSN (Online) :**2278-0181 -
**Publisher Name :**IJERT -
**License:**This work is licensed under a Creative Commons Attribution 4.0 International License

#### A Novel Cryptographic Algorithm for Data Security in Manets

A Novel Cryptographic Algorithm for Data Security in Manets

,

ECE dept Gudlavalleru Engineering College, of ECE dept Gudlavalleru Engineering College,

E-Mail: ,

Abstract:

In modern era, evaluation of networking and wireless networks has come forward to grant communication anywhere at any time. Mobile adhoc networks are the wireless infrastructure less networks can be easily formed or deployed due to its simple infrastructure. So the needs of protecting of such networks are increased by using the different encryption algorithms. Cryptology is a science that deals with codes and passwords. Cryptography provides solutions for four different security areas: confidentiality, authentication, integrity and control of interaction between different parties involved in data exchange finally which leads to security of information. This paper provides a fair performance comparison between various cryptographic algorithms on different settings of data packets. These settings include different data type, block size, key size, number of rounds, encryption/decryption time, CPU processing time, CPU clock cycles and power consumption. A novel cryptographic algorithm for data security is proposed in this paper to prevent the outside attacks to obtain any information from any data exchange in WLAN.This algorithm avoids the key exchange between users and reduces the time taken for encryption, decryption and authentication process. By using NOVEL algorithm we are expecting to generate data security with higher throughput & efficiency than already existing algorithms.

Keywords: encryption, decryption, network security, adhoc WLANs.

#### Introduction

Autonomous systems which comprise a collection of mobile nodes that use wireless transmission for communication is known as MANETS is shown in figure1. They are selforganized, selfconfigured and self-controlled infra-structure less networks. These networks are mainly used by community of users such as military, civilian and emergency services.

The advantages of the MANETS[3] are smaller in size, more convenient, more powerful, support high speed multimedia services, high mobility, device portability and low cost. And the limitations are securing data, link failures, power consumption and limited transmission range.

Symmetric key encryption use only key to encrypt and decrypt data. Key plays an important role in encryption and decryption. The size of the key determines the strength of Symmetric key encryption. Symmetric algorithms are of two types: block ciphers and stream ciphers. The block ciphers are operating on data in groups or blocks. Stream ciphers are operating on a single bit at a time.

In Asymmetric key encryption, two keys are used: private keys and public keys. Public key is used for encryption and private key is used for decryption (e.g Digital Signatures). Public key is known to the public and private key is known only to the user. The most common classification of encryption techniques can be shown in Figure 2.

Fig.2: Overview of cryptographic algorithms

1.1 Brief History Of Encryption Techniques

DES: Data Encryption Standard was the first encryption standard published by NIST (National Institute of Standards and Technology)[4].The DES was developed

Fig.1: Types of wireless networks

The security in WLAN is based on cryptography [1] the science and art of transforming messages to make them secure and immune to attacks by authenticating the sender to receiver within the WLAN. The cryptography algorithms are divided into two groups[2]: symmetric encryption algorithms and asymmetric encryption algorithms.

and authorized by the U.S. government in 1977 as an official. It is based on the IBM proposed algorithm called Lucifer.

3DES: In Triple DES encryption method is similar to the one in the original DES but applied 3 times to increase the encryption level and the average safe time. 3DES is slower than other block cipher methods.

AES: Advanced Encryption Standard is a winning algorithm, Rijndael, which was developed by two Belgian cryptologists, Vincent Rijmen and Joan Daemen. AES provides strong encryption and was selected by NIST (FIPS-197) which can be used to protect electronic data.

RC2: "RC" stands for "Rivest Cipher" alternatively "Ron's Code". It is a variable-key-length cipher, Designed by Ronald Rivest in 1987 for RSA Data Security

RC6: It was designed by four analysts named Ron Rivest, Matt Robshaw, Ray Sidney, and Yiqun Lisa Yin. RC6 is block cipher derived from RC5. It was designed to meet the necessities of the AES competition.

Blowfish: Blowfish was designed in 1993 by Bruce Schneier as a fast alternative to existing encryption algorithms [4]. Blowfish can be used as a replacement for the DES algorithm. Blowfish is unpatented, license- free, and is available free for all uses. Blowfish is successor to Twofish. Though there is a complex initialization segment required before any encryption can

take place, the actual encryption of data is very efficient on large microprocessors.

This paper organized as follows: Related work in section 2. Analysis of existing algorithm in section 3. Proposed algorithm in section 4.Implementation and Expected results in section 5. The future scope in section 6 and the conclusion in section 7.

#### Related work

To give more prospective about the performance of the compared algorithms, this section discusses the results obtained from other resources.

In [5] energy consumption of different common symmetric key encryptions on handheld devices. It is found that after only 600 encryptions of a 5 MB file using Triple-DES the remaining battery power is 45% and subsequent encryptions are not possible as the battery dies rapidly.

In [6] AES is faster and more efficient than other encryption algorithms. When the transmission of data is considered there is insignificant difference in performance of different symmetric key schemes. Increasing the key size by 64 bits of AES leads to increase in energy consumption about 8% without any data transfer. The difference is not noticeable.

In [7] a study of security measure level has been proposed for a web programming language to analyze four Web browsers. This study consider of measuring the performances of encryption process at the programming languages script with the Web browsers. This is followed by conducting tests simulation in order to obtain the best encryption algorithm versus Web browser.

In [8] consider the performance of encryption algorithm for text files. AES, DES and RSA algorithms has been evaluated from the parameters like Computation time, Memory usage, and output bytes. Comparing these three algorithms they found RSA takes more time for computation process. The memory usage of each algorithm is considered as memory byte level. RSA takes more memory than AES and DES. Finally, the output byte is calculated by the size of output byte of each algorithm. The level of output byte is equal for AES and DES, but RSA algorithm produces low level of output byte.

In [9] it is conducted for different popular secret key algorithms such as DES, 3DES, AES, and Blowfish. They were implemented, and their performance was compared by encrypting input less of varying contents and sizes. The results showed that BlowFish had a very good performance compared to other algorithms. Also it showed that AES had a better performance than 3DES and DES. It also shows that 3DES has almost 1/3 througput of DES, or in other words it needs 3 times than DES to process the same amount of data.

#### Analysis of existing algorithms

Longer key lengths mean more effort must be put forward to break the encrypted data security. So, here Blowfish has the longer key size as compared to other algorithms. Since the evaluation test is meant to evaluate the results when using block cipher, due to the memory constraints on the test machine (1 GB) the test will break the load data blocks into smaller sizes. The load data are divided into the data blocks and they are created using

the Random Number Generator class available in System. This section we discusses the result obtained from added resources, to give more potential about the performance of the all the above described algorithms shown in table 1.

Table 1: performance comparison of symmetric algorithms

Algorithm

Key size

(bits)

Block

size(bits)

Number of

Rounds

DES

64

64

16

3DES

168

64

48

AES

128,192 or 256

128

18

RC-2

64

64

18

RC-6

128,192 or256

128

16

BLOWFISH

From 8 To 448

64

16

To asses all the algorithms in this paper, the performance data is collected using a laptop with Pentium IV of 2.4 GHz CPU Speed, by which we encrypt a different range of file size from 49 K byte to 7.310 Mega Byte which were displayed in table 2. A number of performance metrics are calculated based on the following :

Encryption/decryption time.

CPU processing time: In the form of throughput

CPU clock cycles and battery power.

The Encryption time is the time taken by an Encryption algorithm to generate a cipher text from a given plaintext. Encryption time is used to calculate the throughput of an encryption method which indicates the speed of encryption and similarly the decryption in table 3.

=

Throughput (Mega bytes/second)

Input size

(KB)

DES

3DES

AES

RC2

RC6

BLOW FISH

49

29

54

56

57

41

36

59

33

48

38

60

24

36

100

49

81

90

91

60

37

247

47

111

112

121

77

45

321

82

167

164

168

109

45

694

144

226

210

262

123

46

899

240

299

258

268

162

64

963

250

283

208

295

125

66

5345.28

1296

1466

1237

1570

695

122

7310.336

1695

1786

1366

1915

756

107

Average time

389

452

374

480.

7

217

60.3

Through put

(MB/s)

4.01

3.45

4.17

4

3.25

7.19

25.89

Table 2: Throughput for encryption algorithms

Throughput (Megabytes/second)

Input size (KB)

DE S

3DE S

AE S

RC2

RC 6

BLO

W FISH

49

50

53

63

65

35

38

59

42

51

58

59

28

26

100

57

57

60

90

58

52

247

72

77

76

95

66

66

321

74

87

149

161

100

92

694

120

147

142

165

119

89

899

152

171

171

183

150

102

963

157

177

164

194

116

80

5345.28

783

835

655

904

684

149

7310.336

953

1101

882

1216

745

140

Average

time

246

275.6

242

313.

210

83.4

2

Throughpu

6.35

5.67

6.45

4.98

7.43

18.72

t

5

(MB/s)

example consider a 16-bit block of plain text (ie,1011110100011001).

Decryption:

Cipher text: Plain text:

C

M =

(mod n)

Perform circular left shift or rotation by m number of bits on the plain text (ie., if m=2 then the resultant plain text is 1111010001100110) .

Table 3: Throughput for decryption algorithms

The CPU process time is the time that a CPU is committed only to the particular process of calculations. It reflects the load of the CPU. The more CPU time is used in the encryption process, the higher is the load of the CPU. The CPU clock cycles are a metric, reflecting the energy consumption of the CPU while operating on encryption operations. Each cycle of CPU will consume a small amount of energy[10].

Key generation:

Select p , q p and q both prime,

p q

Calculate n = p*q

Calculate (n) = (p-1)(q-1)

Select integer e gcd ( (n),e)=1; 1< e < (n)

Calculate d d= mod (n)

Public key KU= {e, n}

Private key KR= {d, n}

The encryption time is considered the time that an encryption algorithm takes to produce a cipher text from a plaintext. It reflects the load of the CPU. The CPU clock cycles are a metric, reflecting the energy onsumption of the CPU while operating on encryption operations. Each cycle of CPU will consume a small amount of energy.

#### Proposed Algorithm

The novel cryptographic algorithm consists of modified RSA algorithm, which gives the data security with authentication. The encryption and decryption of this novel algorithm is shown in figure 4 and 5.

Encryption: The figure 4 shows the encryption algorithm considering a small example which can be described in the following steps:

Here the plain text can be considered as n

number of bits (i.e., 8,16,32,64,128,256). For

Perform symmetric encryption with a symmetric key which yields cipher text 1 ie.,

. The key must be the same size of the plain text.

This is divided into two blocks (a & b) and then performs the initial permutation on both the sides.

The input to the permutation block is an 8-bit block of cipher text 1, which we perform using IP function. Here the first 8-bits are assigned to a block and next 8-bits are assigned to b block.

By considering this IP block we do the permutation to each block.

IP

2 6 3 1 4 8 5 7

a-block = 8 bits:

1 2 3 4 5 6 7 8: 1 1 1 1 0 1 0 0

2 6 3 1 4 8 5 7: 1 1 1 1 1 0 0 0

b-block = 8 bits:

1 2 3 4 5 6 7 8: 0 1 1 0 0 1 1 0

2 6 3 1 4 8 5 7: 1 1 0 0 0 0 0 1

Again perform left shift for a and right shift for b by S number of bits ( ie., if S =3 then the resultant is as follows.

a-block = 8 bits:

Permuted bits: 1 1 1 1 1 0 0 0

Left shift by 3 bits: 1 1 0 0 0 1 1 1 b-block = 8 bits:

Permuted bits: 1 1 0 0 0 0 0 1

Right shift by 3 bits: 1 0 0 1 1 0 0 0

Then combine both the blocks and perform the function of RSA algorithm to generate the final cipher text 2 by adding a public key to the function block. Public key is the key which is the known key to all users in the network. The key generation, encryption and decryption process of RSA algorithm steps are shown in figure [3].

Encryption :

Plain text: Cipher text:

M < n C =

(mod n)

#### Fig3: The RSA algorithm at function block

This gives the cipher text 2 which is the data to be transmitted over the network. This entire process is shown in the figure [4] that gives the encryption of the pain text which is to be send in a network.

Plain text

Circular rotation of bits

a /

C= (p + k)mod n

Symmetric key

IP

IP

Rotate left

Rotate right

Function

Public Key

Cipher text

Fig4: Encryption of plain text Decryption:

The figure [5] shows decryption algorithm, in which the private key is generated and decrypted the received cipher text2, produces cipher text 1. Decryption is the reverse process of encryption algorithm.

Plain text is a readable message or data that is fed into the algorithm as input.

Cipher text is a scrambled message produced as output. It depends on the plain text and the key. For a given message two different keys will produce two different cipher texts.

Cipher text

a /

Function

Private Key

Rotate right

Rotate left

C= (p + k)mod n

Circular rotation of bits

Symmetric key

Plain text

/ b

Fig 5:Decryption of cipher text

At the end of the algorithm inverse permutation is used.

4 1 3 5 7 2 8 6

it is easy to show by example that the second permutation is the reverse of the first permutation ie.,

[ (IP (X)) = X]#### Implementation and expected results

The proposed algorithm is going to simulate in GLOMOSIM. We are going to develop a stronger Encryption Algorithm which gives high throughput, less processing time and low power consumption. The algorithm will help the authentication protocols to reduce the delay taken by them, and gives the channel the data security wanted. So that the experiments can be performed on data, image & audio.

#### Future Scope

We need a way to make decisions about energy consumption and security to reduce the consumption of battery powered devices. We examine a method for analyzing trade-offs between energy and security. The goal is to aid the design of energy efficient secure communication with authentication schemes for the wireless environment in the future.

#### Conclusion

We are expecting the results to show the superiority of proposed algorithm with others in terms of the throughput, processing time and power consumption. More the throughput, more the speed of the algorithm & less will be the power consumption. The algorithm will help the authentication protocols to reduce the delay taken by them, and gives the channel the data security wanted. The programs ensure the key updated without any problem on the decryption of the text or the image, and show that the algorithm reduce the time used in the encryption or decryption process. It is efficient and useable for the security in the WLAN systems.

#### References

Diaa Salama, Hatem Abdual Kader, and Mohiy Hadhoud, Studying the effects of Most Common Encryption Algorithms, International Arab Journal of e-Technology, Vol. 2, No. 1, January 2011

W.Stallings, ''Cryptography and Network Security 4th Ed,''

Prentice Hall, 2005, PP. 58-309.

Subir kumar sharkar, T.G.Basavaraju, C.Puttamadappa, Adhoc mobile wireless networks. Principles, protocols and applications.

Diaa Salama, Hatem Abdual Kader, and Mohiy Hadhoud, Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. International Journal of Network Security, Vol.11, No.2, PP.78-87, Sept. 2010

El-Fishawy.N(2007)," Quality of Encryption Measurement of Bitmap Images with RC6,MRzC6, and Rijndael Block Cipher Algorithms", International Journal of Network Security, PP.241251.

Ruangchaijatupon.P, Krishnamurthy.P (2001), ''Encryption and Power Consumption in Wireless LANs-N. The Third IEEE Workshop on Wireless LANs – Newton, Massachusetts.

Shih.E, Cho.S, Ickes.N, Min.R, Sinha.A, Wang.A, and Chandrakasan.A(2001),

"Physical layer driven protocol and algorithm design for energy- efficient wireless sensor networks," in Proceedings of The 7th ACM Annual International Conference on Mobile Computing and Networking (Mobi Com), Rome, Italy,pp.272-287.

Shashi Mehrotra Seth, Rajan Mishra on

Comparative Analysis Of Encryption Algorithms For Data communication in IJCST Vol. 2, Issue 2, June 2011 I ,pp. 292-

294

A. Nadeem and M. Y. Javed, A performance comparison of data encryption algorithms," Information and Communication Technologies, ICICT 2005, pp.84-89, 2005.

Gurjeevan Singh, Ashwani Kumar Singla, K.S. Sandha, Performance Evaluation of Symmetric Cryptography Algorithms.