Beruflich Dokumente
Kultur Dokumente
The Society of Digital Information and Wireless Communications (SDIWC) 2012 (ISSN: 2305-0012)
1 INTRODUCTION
ABSTRACT
Information security is one of the most
Security becomes an important issue when important issues to be considered when
secure or sensitive information is sent over a describing computer networks. The
network where all computers are connected existence of many applications on the
together. In such a network a computer is Internet, for example e-commerce
recognized by its IP address. Unfortunately, (selling and buying through the Internet)
an IP address is attacked by hackers; this is
is based on network security. In addition,
where one host claims to have the IP address
of another host and thus sends packets to a the success of sending and receiving
certain machine causing it to take some sort sensitive data using wireless networks
of action. In order to overcome this problem depends on the existence of a secure
cryptography is used. In cryptographic communication (the Virtual Private
application, the data sent are encrypted first Network, VPN) [11]. One of the
at the source machine using an encryption methods which are used to provide
key then the encrypted data are sent to the secure communication is Cryptography.
destination machine. This way the attacker
will not have the encryption key which is Cryptography (or sometimes referred to
required to get the original data and thus the as encipherment) is used to convert the
hacker is unable to do anything with the
plain text to encode or make unreadable
session. In this paper, we propose a novel
method for data encryption. Our method is form of text [9]. An Encryption method
based on private key encryption. We call our uses what is known as an encryption key
method Text-To-Image Encryption (TTIE). to hide the contents of a plain text (make
it unintelligible). Without knowing the
KEYWORDS decryption key it is difficult to determine
Network; Secured Communication; Text-to- what the plain text is. In computer
Image Encryption; Algorithm; Decryption; networks; the sensitive data are
Private key; Encoding. encrypted on the sender side in order to
have them hidden and protected from
263
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(4): 263-271
The Society of Digital Information and Wireless Communications (SDIWC) 2012 (ISSN: 2305-0012)
unauthorized access and then sent via the Some of the techniques that are used to
network. When the data are received verify the user identity (i.e. to verify that
they are decrypted depending on an a user sending a message is the one who
algorithm and zero or more encryption he claims to be) are the digital signature
keys as described in "Fig.1". and the digital certificate [5]. Digital
Decryption is the process of converting signature and digital certificate are not
data from encrypted format back to their the focus of this research.
original format [3]. Data encryption
becomes an important issue when There are some standard methods which
sensitive data are to be sent through a are used with cryptography such as
network where unauthorized users may private-key (also known as symmetric,
attack the network. These attacks include conventional, or secret key), public-key
IP spoofing in which intruders create (also known as asymmetric), digital
packets with false IP addresses and signature, and hash functions [17]. In
exploit applications that use private-key cryptography, a single key is
authentication based on IP and packet used for both encryption and decryption.
sniffing in which hackers read This requires that each individual must
transmitted information. One of the possess a copy of the key and the key
applications that are attacked by the must be passed over a secure channel to
hackers is the E-mail. There are many the other individual [15]. Private-key
companies providing the E-mail service algorithms are very fast and easily
such as Gmail, Hotmail and Yahoo mail. implemented in hardware. Therefore
These companies need to provide the they are commonly used for bulk data
user with a certain data capacity, speed encryption.
access, as well as a certain level of
security. Security is an important issue Mainly, there are two types of private-
that we should consider when we choose key encryption; stream ciphers and block
Web Mail [14]. ciphers [1].
Decryption Key
Secure Receiver
Channel
Figure 1 Encryption and Decryption methods with a secure channel for key exchange.
264
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(4): 263-271
The Society of Digital Information and Wireless Communications (SDIWC) 2012 (ISSN: 2305-0012)
265
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(4): 263-271
The Society of Digital Information and Wireless Communications (SDIWC) 2012 (ISSN: 2305-0012)
work differs from their work. In their operation should be carried out; another
work they used public-key technique random number is generated and then
whereas in our work we use private key divided by 3. The reminder of the
technique. They encoded each character division is 0, 1, or 2. The reminder
by its ASCII value but we encode each represents the transformation operation.
character by one pixel (three integer In case of row transformation, two
values - R for Red, G for Green and B distinct rows were selected randomly by
for Blue). generating two distinct random numbers
say R1 and R2. Another two distinct
Singh and Gilhorta [15] proposed random numbers were generated c1 and
encrypting a word of text to a floating c2 that represent two distinct columns.
point number that lies in range from 0 to The two columns c1 and c2 were
1. The floating point number is then generated in order to determine the range
converted into binary number and after of rows in which transformation had to
that one time key is used to encrypt this be performed. After the completion of
binary number. In this paper, we encode each transformation a sub-key is
each character by one pixel (three generated and stored in a file key. The
integer values R, G and B). file key is then sent to the receiver to be
used as decryption key. The sub-key
Kiran et al. [6] proposed a new method format is (T, Op, R1, R2, Min, Max)
for data encryption. In their method the where:
original text (plain text) was ordered into T: the transformation applied to either
a two-directional circular queue in a row or column.
matrix say A of a given size say m x n. In Op: the operation type coded as 0, 1, or
their work data encryption is reliant on 2, e.g., shift left array contents, shift
matrix disordering. To do so, they right array contents, and reverse array
proposed to perform transformation contents.
operations on the rows or the columns of R1 and R2: two random rows or
matrix A a number of times. They columns.
proposed three types of transformation Min, Max: minimum and maximum
operations to be performed on A. These values of range for two selected R1 and
operations were encoded as follows; 0 R2.
for circular left shift, 1 for circular right
shift, and 2 for reverse operation. The 3 OUR ALGORITHM
matrix disordering was carried out by
generating a positive random number say Here we describe the main features of
R, and then this number is converted to a our proposed algorithm TTIE. Our
binary number. The decision on which to algorithm includes two main phases
perform rows or columns transformation namely the TTIE phase (this is where
was based on the value of the individual our work is based) and the ISE (Image-
bits in the binary number. For example if Shuffle Encryption) phase. In the TTIE
the binary bit is 0 then row phase the plain text is transformed
transformation is performed otherwise (if (encrypted) into an image. In this phase
the binary bit is 1) column the plain text is concatenated as one
transformation is performed. To string and then this string is stored into
determine which transformation an array of characters say C. For each
266
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(4): 263-271
The Society of Digital Information and Wireless Communications (SDIWC) 2012 (ISSN: 2305-0012)
character in C, one pixel of the resulting work carried out by Kiran et al. [6]. In
image is generated. Each pixel consists the ISE phase the matrix M is shuffled a
of three integers created randomly in number of times. The shuffle process
advance and before the transformation includes row swapping and column
(encryption) begins (see Fig 3-A, key 1). swapping. In row swapping, two rows
Each integer of the three integer values are selected randomly and then swapped.
represents one color. The color value is In column swapping two columns are
in the range from 0 to 255. The result of selected randomly and then swapped.
this phase is a matrix, say M, in which This matrix disordering makes it
each three contiguous columns in a difficult for hackers to guess the original
given row represent one character of the order of the matrix M. The shuffle key
original text (plain text). This is done in (key 2) is shown in Fig. 3-B. These two
order to make it difficult for hackers to phases (the TTIE and the ISE) are
guess what the plain text is. To the best carried out on the sender machine (in
of our knowledge, no previous work has this paper it is the server machine) as
attempted transforming a text file into an described in Fig. 2.
image.
Server
Client
Plaintext
Plaintext cryptography cryptography
c y
c y Use key 1 …
Key1 R1,R2,R3 R34,R35,R36
Key 1 is
generated R1,R2,R3 … R34,R35,R36
randomly.
3 random Pixels
numbers Matrix Get the pixel’s matrix
for each
(RGB) or (RGB) or
character …
pixel 1 pixel 12
Figure
Figure2 2The
Themain
mainsteps
stepsofofthe
theText-to-Image-Encryption
Text-to-Image-Encryption(TTIE)
(TTIE)algorithm
algorithm
The second phase is the ISE phase. The The encrypted message is then sent to
work in this phase is based on a previous the client machine where the message is
267
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(4): 263-271
The Society of Digital Information and Wireless Communications (SDIWC) 2012 (ISSN: 2305-0012)
decrypted using key2 and key1 examples are morse code and ascii
respectively. simple ciphers include the substitution of
letters for numbers the rotation of letters
4 OUR EXPERIMENT in the alphabet and the scrambling of
voice signals by inverting the sideband
Java NetBeans is used as a vehicle to frequencies". [13].
carry out our experiments. We build the
client's and server's programs on "Fig. 3" shows part of the generated keys
different machines and then we tested namely "Key 1" and "Key 2" whereas
sending and receiving data on both sides. "Fig. 3" (A) shows the format of "Key
We use the following text message in 1". Each value is delimited by the #
our experiments: symbol. The first three values (0, 5, 5)
represent one pixel in the result image.
"encryption is the conversion of data In this pixel, R (the Red color value) = 0,
into a form called a cipher text that G (the Green color value) = 5, and B
cannot be easily understood by (the Blue color value) = 5. In order to
unauthorized people. decryption is the guarantee that distinct letters have
process of converting encrypted data unique colors i.e. unique RGB values,
back into its original form so it can be we create 26 different ranges because of
understood. The use of encryption 26 alphabets. For example, these ranges
decryption is as old as the art of are unique subsets of the main set which
communication in wartime. a cipher ranges from 0 to 255. The letter A may
often incorrectly called a code can be be represented by RGB values in the
employed to keep the enemy from range from 0 to 9, the letter B may be
obtaining the contents of transmissions. represented in the range from 10 to 19
technically a code is a means of and so on. This pixel (0, 5, 5) represents
representing a signal without the intent the letter A. The next three values (12,
of keeping it secret. 13, 17) are another pixel which
represents the letter B and so on.
0#5#5#12#13#17#20#25#25#30#32#32#37#41#37#47#52#53#55#56#60#68#69#68#78#74#79#88#82#86#9
(A) Part of Key 1
5736834348:644:34:3641834:868:4348:644,34:364,438:1643,34::6413:316:33::6:4:38:364:138136::8313463:
268
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(4): 263-271
The Society of Digital Information and Wireless Communications (SDIWC) 2012 (ISSN: 2305-0012)
"Fig. 3" (B) shows the format of "Key2". Table-2 describes the matrix after
Each two contiguous values represent shuffling (Table-2 describes a simple
two columns in the matrix M. The first swap operation where column 1 is
pair in Key 2 is 375:364 which means swapped with column 2).
that column number 375 is swapped with
column number 364 and so on. Table 1 Pixels before shuffling- each three
contiguous integers in a row represent one pixel
or one letter.
"Fig. 4" shows the cipher text (is the text Letter R-value G-value B-value
after it is encrypted as an image). The A 0 5 5
image in Fig. 4 is zoomed out many B 12 13 17
times to make it clear. In this image C 20 25 25
pixels are created randomly and thus D 30 32 32
they do not form a known shape like Table 2 Pixels after column 1 is swapped with
tree, fish, mobile, etc. The image shown column 2
in "Fig. 4" is sent to the client and on the Letter R-value G-value B-value
client side we decrypt the cipher text ? 5 0 5
shown in "Fig. 4" then we finally get the ? 13 12 17
original text message (i.e. the plain text). ? 25 20 25
? 32 30 32
5 ANALYSIS
In our algorithm each letter is Using statistical analysis, hackers may
represented by a random pixel, i.e., three guess the letters from Table-1. However,
random values namely R, G and B. To it is very difficult for hackers to guess
attack the data, hackers need to guess the the letters from Table-2 because the
following: order of the values RGB is changed. In
1. That each three contiguous values other words, each three contiguous
represent one letter. Since we send the values RGB in Table-1 which represent
data as integers’ values, it is hard to one letter are now distributed randomly
guess that each three contiguous values in Table-2 and thus make it difficult to
represent one letter. guess that letter even if hackers use
2. If a hacker is able to guess point 1, statistical analysis (a method involving
then he needs to guess what random a statistical breakdown of byte patterns
numbers represent the letters A, B, C, such as the number of times any
etc. In other words, a hacker needs to particular value appears in the
guess the value of key 1 "Fig. 3". Note encrypted output would quickly reveal
that guessing the value of key 1 is whether any potential patterns might
difficult since we shuffle (scramble) the exist). Similarly, it is hard for "letter A
matrix using key 2 (key 2 is based on the follows letter B" analysis to decrypt the
algorithm described in [6]). For cipher text.
example, suppose that the message we With the simple calculation, the number
want to send is "abcd". Using key 1 of possible permutations to encrypt 26
"Fig. 3" (A) the random numbers letters is-
generated for "a", “b”, “c” and “d” are
(0,5,5), (12,13,17), (20,25,25), and ((256)3)26) (1)
(30,32,32) respectively. The matrix
before shuffling is described in Table-1. Since each pixel consists of three values
and each one of these values is in the
269
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(4): 263-271
The Society of Digital Information and Wireless Communications (SDIWC) 2012 (ISSN: 2305-0012)
270
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(4): 263-271
The Society of Digital Information and Wireless Communications (SDIWC) 2012 (ISSN: 2305-0012)
271