 Open Access
 Total Downloads : 0
 Authors : U. Thirupalu , Dr. E. Kesavulu Reddy , E. Spandhana
 Paper ID : IJERTV7IS100089
 Volume & Issue : Volume 07, Issue 10 (October – 2018)
 Published (First Online): 05012019
 ISSN (Online) : 22780181
 Publisher Name : IJERT
 License: This work is licensed under a Creative Commons Attribution 4.0 International License
Security Analysis of Cryptographic Algorithms in Cloud Computing
Security Analysis of Cryptographic Algorithms in Cloud Computing
U. Thirupalu 
E. Spandhana 
Dr. E. Kesavulu Reddy 
Research Scholar 
M.Sc Final 
Assistant Professor 
Dept. of Computer Science 
Dept. of Computer science 
Dept. of Computer Science 
S V U CM&CSTirupati 
S V U CM&CSTirupati 
S V U CM&CSTirupati 
India517502 
India 517502 
India517502 
Abstract: Cloud computing is one of the fastest rowing internet based technology. Data encryption is one of the widely used methods to ensure the data confidentiality in cloud environment. In this paper, we discuss the symmetric and Asymmetric algorithms to provide security in the field of cloud computing with different parameters and propose a new approached public key cryptosystem for security in cloud computing.
Keywords: Security, Encryption, Decryption, Cloud Computing, Data Storage, RSA Algorithm.

INTRODUCTION
Cloud computing illustrate Information Technology as a fundamentally diverse operating model that takes advantage of the maturity of web applications and networks and the rising interoperability of computing systems to provide IT services. Data security is becoming a fundamental obstruction in cloud computing. Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. Examples of cloud services include online file storage, social networking sites, webmail, and online business applications. Many giant IT firms have launched cloud services viz. Apple, Amazon EC2, Google, Microsoft, Rackspace etc., who provide several storage tier plans
tailored for both consumers and businesses. Some firms may proclaim themselves asloud services, but ironically they tend to serve online backup or file sharing services. Cloud computing combines the datasharing model and
service statistical model. From a technical point of view, cloud computing has the following three basic characteristics [2]

Hardware infrastructure architecture is based on the clusters, which is largescale and lowcost. The

infrastructure of cloud computing is composed of a large number of lowcost servers, and even the X86 server architecture. Through the strong performance, the traditional mainframes prices are also very expensive

Collaborative development of the underlying services
and the applications is to achieve maximum resource utilization. By this way, applications construction is improved. But for traditional computing model, applications to be complete dependent on the underlying service.

The redundant problem among multiple lowcost servers is solved by the software method. Because of using a large number of lowcost servers, Failure between nodes cannot be ignored, so the issue of fault tolerance among nodes should be taken into account, when designing software [2].


RELATED WORK
In [8] analyze the security challenges in cloud data with overcome the possible solutions. They analyze the different levels of security the data may be process, transmit and depicted. In [9] the issues in security associated with cloud data storage and it is effective to handle certain failures, malicious data modification attack and server colluding attacks. This scheme is drawback to new research areas and leading to unexpected mockeries. In [10] The privacy issues describes in cloud computing and also focuses on the risks, threats, design patterns and accountability with in cloud computing scenario. In this paper [11] provides an overview of security mechanisms in the context of cloud computing and describes various threats and relevance to realworld environment. In this paper [12] they provide the security through public key cryptosystem RSA algorithm and to storage of data in cloud in virtualized environment. The RSA algorithm would guarantee high security, but simultaneously issue is in related to performance.

CRYPTOGRAPHIC ALGORITHMS IN CLOUD
COMPUTING
They are two types of cryptographic Algorithms are

Symmetric key cryptographic Algorithms

Asymmetric Key cryptographic Algorithms

Symmetric key cryptographic Algorithms
Symmetric key systems use the same key for both encryption and decryption. In order to communicate securely using a symmetric system, two parties must agree on the key using some preexisting secure channel. When more than two parties are involved key distribution becomes even more complicated, and historically key distribution has been a major obstacle for particle uses of cryptography. Typical symmetric ciphers use very convoluted transformations to obscure any patterns in the original message. The key controls how the transformations operate, and provides a map for reversing a transformations during decryption.

DES

BLOWFISH

RC5

3DES

AES


DES
DES is first block symmetric encryption algorithm published by NIST designed by IBM on 1974. The same key is used for both encryption and decryption; DES uses 64bit key in terms of 8bits for error correction and 56bits as a key but in every byte 1 bit in has been selected as a 'parity' bit, and is not used for encryption mechanism. The 56 bit is permuted into 16 sub keys each of 48 bit length. It also contains 8 S boxes and same algorithm is used in reversed for decryption [3]. The implementations of the DES (data encryption standard) algorithm based on hardware are low cost, flexible and efficient encryption solutions.
Algorithm:
DES_ Encrypt (X, Y) where E = (L, R) X IP (M)
\For round 1 to 16 do Yi SY (Y, round)
L L xor F(R, Ki) swap (L, R)
End
swap (L, R)
XIP1(X)
return X. End

TripleDES
TDES is an enhanced version of DES is based on Feistel structure. The CPU power consumed by TDES is three times more than DES. The 3DES uses a 64 bit plain text with 48 rounds and a Key Length of 168bits permuted into 16 sub keys each of 48 bit length. It also contains 8 S boxes and same algorithm is used in reversed for decryption [4]. Triple DES the algorithm is considered to be practically secure, in spite of having theoretical attacks.
Algorithm For j = 1 to 3
{
Cj,i = EK3 (DK2 (EK1 (Pj,i Cj,i1)))
Output Cj,i
}
}

Blowfish
Blowfish algorithm was first introduced in 1993.The Blowfish is highly rated secure variable length key encryption algorithm with different structure and functionality than all other algorithms. Blowfish is a block cipher that uses a 64 bit plain text with 16 rounds, allowing a variable key length, up to 448 bits, permuted into 18 sub keys each of 32 bit length and can be implemented on 32 or 64bit processors. It also contains 4 S boxes and same algorithm is used in reversed for decryption [5].
Algorithm
Divide x into two 32bit lengths : xL, xM For i = 1to 16:
XL= XL XOR Pi
xM = F (XL) XOR xM
Swap XL and xM Next i
Swap XL and xM (Undo the last swap.) xM = xM XOR P17
xL = xL XOR P18 then
Combine XL and xM.

RC5
It was developed in 1994. The key length if RC5 is MX2040 bit with a block size of 32, 64 or 128. The use of this algorithm shows that it is Secure. The speed of this algorithm is slow. [5]
Algorithm
A = A + S[0];
B = B + S[1];
for i = 1 to r do
A = ((A Xor B) <<< B) + S[ 2 * i ]
B = ((B Xor A) <<< A) + S[ 2 * i + 1]
Next
Cj,0 = IVj
For i = 1 to nj
{

AES
AES is also a symmetric key algorithm based on Feistel structure is developed by Joan Daemen and Vincent Rijmen is new one in October 2000 declared by NIST. The AES is a
block cipher that uses a 128 bit plain text with variable 10, 12, or 14 rounds and a variable Key Length of 128, 192, 256
bit permuted into 10 sub keys each of 128, 192, 256 bit length respectively[7].. It only contains a single S box and same algorithm is used in reversed for decryption. Rijndael's default number of Rounds is dependent on key size i.e. Rounds = key length/32 + 6. Rijndael AES provides great flexibility for implementing based on parallel structure with effective resistance against attacks [5] [6].
Algorithm
Cipher (byte [] input, byte [] output)
{

Key generation

Encryption

Decryption
Algorithm

Key Generation; KeyGen (p,q)
Input : Select two prime integers p ,q.

Compute n = p q , (n ) = (p1)(q1)

Choose e as exponent then gcd (e, p1) = 1
byte[4,4] State;
copy input[] into State[] Add Round Key for (round = 1; round < Nr1; ++round)
{
SubBytes ShiftRowsMixColumns AddRoundKey
}
SubBytes ShiftRows AddRoundKey
copy State[] to output []
}
B. Asymmetric Key cryptographic Algorithms
Publickey cryptosystems help solve the key distribution problem by using separate keys for encryption and decryption, and making the encryption key public. One party can encrypt the message with public key (known) and other party processes decrypt message with private key (unknown). Public key systems rely on oneway trap door functions, which are interesting mathematical functions that can be easily computed in one direction but are very difficult to reverse unless a secret key is known (the trap door).
4. gcd (e, q1) = 1
5. gcd (e, (p1) (q1)) = 1

Compute d such that ed =1(mod (n))

Compute d = e1 (mod (n)) Find a unique value d such that
(n) divides 5d1 value — pi Key Public Key = (n, e).
Private Key = (n, d). Encryption
C M E (mod N)

Encrypt the message M C M E (mod N) Decryption

To decrypt the cipher text we have

RSA

DSA

DiffieHellman

ELGAMMAL




RSA ALGORITHM
RivestShamirAdleman (RSA) is a special type of public key cryptography which over the years has reigned supreme as the most widely accepted and implemented general purpose approach publickey encryption techniques [4]. The RSA algorithm follows a block cipher encryption technique, in which the plaintext and the cipher are integers between 0 and n 1 for some n. A typical size for n is 1024 bits, or 309 decimal digits. That is, n is less than to1024.RSA algorithm has three major steps.
M = Cd (mod n) M = Plain Text.

DSA
The Digital Signature Algorithm (DSA) was proposed by the National Institute of Standards and Technology (NIST) in August 1991. DSA, the entropy, secrecy, and uniqueness of the random signature value k is critical [6]. It is so critical that violating any one of those three requirements can reveal the entire private key to an attacker. Using the same value twice (even while keeping k secret), using a predictable value, or leaking even a few bits of k in each of several signatures, is enough to break DSA. [7]

DiffieHellman Key Exchange (DH)
DiffieHellman key exchange is a specific method of exchanging cryptographic keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The DiffieHellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.

EIGamel
In cryptography, the EIGamel encryption system is an asymmetric key encryption algorithm for publickey cryptography which is based on the DiffieHellman key exchange. It was described by Taher EIGamel in 1984. EIGamel encryption is used in the free GNU Privacy Guard software, recent versions of PGP, and other cryptosystems. The Digital Signature Algorithm is a variant of the EIGamel signature scheme, which should not be confused with EIGamel encryption. EIGamel encryption can be defined over any cyclic group .Its security depends upon the difficulty of a certain problem in related to computing discrete logarithms.



PROPOSED MODEL FOR SECURITY IN
CLOUD
RSA key generation is the initial stage wherein two keys are generated using various methods that would be further used for encryption and decryption purpose. RSA's encryption products use two keys.
Example: suppose person A send a message to person B. person A uses a Private key that is associated with an encryption algorithm and he wants send/receive encrypted data , he needs to share his public key with the person B wants to send/receive encrypted information
For Example: – Consider a person A who possess public key and a private key that is associated with an encryption algorithm, if he wished to send/receive encrypted data, he needs to share his public key with the person he wants to send/receive encrypted information. Using encryption the public key is wrong between A and B or in a cloud number of users. In addition person A could send two pieces of information, one original and other scrambled. When this information is decrypted and they match, it guarantees that the information is genuine and has not been tampered. Thus RSA not only secures the data, but also authenticates the senders identity, which verifies the integrity of received data.
A.Enhanced RSA algorithm
The proposed algorithm has also three major steps 1.Key Generation using big or large integers 2.Encryption
3. Decryption
We can avoid above problem to implement the Decryption with Big Integers of 2 Complement using Chinese Remainder Theorem.. In Decryption may be to representation of 2complement form of the big integers to splitting the encrypted data two computations.
M = Cd (mod n)
Pair of public key = (e,N)
Pair of private key = ( p,q, dp,dq) The CRT is x1 = a1(mod n1 )
x2 = a2(mod n2 )
.
.
.
Xn ar (mod nr) Mp = Cdp (modp) Mq = Cdq (modq)
Similar to CRT i.e.
M = (Mpq (q1 mod p) + Mqp (p1mod q)) mod N
So the decryption process may split encrypted data into two computations. So the decryption processes may be faster than RSA Algorithm.

COMPARISON OF CRYPTOGRAPHIC
ALGORITHMS
RSA, a cryptographic algorithm whose encryption key is public and differs from the decryption key which is kept secret. Data Encryption Standard (DES) and Simplifies Data Encryption Standard (SDES), where DES used symmetric key for encryption and decryption. Secure Socket Layer (SSL) 128 bit encryption, it is commonlyused protocol for managing the security of a message transmission on the Internet and it uses public and private key encryption system. Mixed encryption algorithms.RC5 which is a symmetric key block cipher and it consists of a number of modular additions and Exclusive OR (EXOR).

CONCLUSION
Cloud computing is latest development that provides easy access to high performance computing resources without installation of software. It provides many benefits for itsusers but it suffers with some security threats. Security of data is one of the top list impediments in the growth of this latest technology. Security is a major requirement in cloud computing while we talk about data storage. There are number of existing techniques used to implement security in cloud. In this paper, we discussed number of symmetric and asymmetric algorithms. Our future will be considering some problems related to existing security algorithms and implement a better version of DES, 3DES, AES, RSA, IDES, Blowfish..
REFERENCES
[1] NIST SP 800145, A NIST definition of cloud computing. [2] NIST SP 500292, "NIST Cloud Computing Reference Architecture. [3] Cong Wang, Qian Wang, Kui Ren and Wenjing Lou Ensuring Data Storage Security in Cloud Computing. IEEE 2009. [4] Yogesh Kumar, Rajiv Munjal andn Harsh Sharma Comparison of Symmetric and Asymmetric Cryptography With Existing Vulnerabilities and Countermeasures IJCSMS International Journal of Computer Science and anagement Studies, Vol. 11, Issue 03, Oct 2011. [5] D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud, Performance Evaluation of Symmetric Encryption Algorithms, Communications of the IBIMA Volume 8, 2009.
[6] Gurpreet Singh, Supriya KingerIntegrating AES, DES, and 3 DES Encryption Algorithms for Enhanced Data Security International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July2013. [7] Uma Somani, Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing," 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC – 2010). [8] T V Sathyanarayana and Dr. L. Mary Immaculate Sheela "Data Security in Cloud Computing", International Conference on Green Computing, Communication and Conservation of Energy (ICGCE) 2013, pp 810813, 14362505/2013. [9] Cong Wang, Qian Wang and Kui Ren,Ensuring Data Storage Security in Cloud Computing 9781 4244 38761/2009 IEEE. [10] Siani Pearson Taking account of Privacy when Designing Cloud computing Services CLOUD09, May 23, 2009, Vancouver, Canada, 2009 IEEE. [11] Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacono, On technical security issues in cloud computing 2009, IEEE Computer Society . [12] Pachipala Yellamma, Challa Narasimham, Velagapudi Sreenivas, DATA SECURITY IN CLOUD USING RSA ComputingCommunications and Networking Technologies (ICCCNT), 2013 Fourth International Conference, pp.16, 978 1,2013.