Beruflich Dokumente
Kultur Dokumente
CHAPTER 1:
INTRODUCTION
Now a day’s privacy is the main issue to sending information from one point to another in data
transmission. Encryption of data is the most effective way of computer science concerned with
developing schemes and formula to achieve data & information security. In its course of action, it
allows sequence to be encoded in the form of cipher text where it is extremely difficult to read or
recognize the codes where decryption is the procedure to transforming encoded text into the
original message and information.
In addition, data encryption using strange number system (especially using pentaoctagesimal
(SNS) can make available physical or substantial security to information—allowing updating only
to authorized users.
This algorithm is used pentaoctagesimal strange number system to encrypt data and we propose a
better data encryption and decryption strategy, which will offer better security towards all possible
ways of attacks while data transmission.
CHAPTER 2:
Without security measures and controls in place, the data might be subjected to an attack. Some
attacks are passive, meaning information is monitored; others are active, meaning the information
is altered with intent to corrupt or destroy the data or the network itself.
The networks and data are vulnerable to any of the following types of attacks if we do not have a
security plan in place.
2.1 Eavesdropping
After an attacker has read the data, the next logical step is to alter it. An attacker can modify the
data in the packet without the knowledge of the sender or receiver. Even if you do not require
confidentiality for all communications, we do not want any of our messages to be modified in
transit. For example, if we are exchanging purchase requisitions, we do not want the items,
amounts, or billing information to be modified.
Most networks and operating systems use the IP address of a computer to identify a valid entity.
In certain cases, it is possible for an IP address to be falsely assumed— identity spoofing. An
attacker might also use special programs to construct IP packets that appear to originate from valid
addresses inside the corporate intranet.
After gaining access to the network with a valid IP address, the attacker can modify, reroute, or
delete our data. The attacker can also conduct other types of attacks, as described in the following
section.
A common denominator of most operating system and network security plans is password-based
access control. This means our access rights to a computer and network resources are determined
by who we are, that is, our user name and our password.
Older applications do not always protect identity information as it is passed through the network
for validation. This might allow an eavesdropper to gain access to the network by posing as a valid
user. When an attacker finds a valid user account, the attacker has the same rights as the real user.
Therefore, if the user has administrator-level rights, the attacker also can create accounts for
subsequent access at a later time.
CHAPTER 3:
NETWORK SECURITY
Network Security is the most vital component in information security because it is responsible for
securing all information passed through networked computers. Network Security refers to all
hardware and software functions, characteristics, features, operational procedures, accountability,
measures, access control, and administrative and management policy required to provide an
acceptable level of protection for Hardware and Software , and information in a network.
Network security problems can be divided roughly into four closely intertwined areas: secrecy,
authentication , nonrepudiation , and integrity control. Secrecy, also called confidentiality, has to
do with keeping information out of the hands of unauthorized users.
This is what usually comes to mind when people think about network security. Authentication
deals with determining whom you are talking to before revealing sensitive information or entering
into a business deal. Non repudiation deals with signatures. Message Integrity: Even if the sender
and receiver are able to authenticate each other, they also want toinsure that the content of their
communication is not altered, either malicously or by accident, in transmission. Extensions to the
check summing techniques that we encountered in reliable transport and data link protocols.
Computer systems and networks which are storing, processing and communicating sensitive or
valuable information require protection against such unauthorized access. The only general
approach to sending and storing data over media which are insecure is to use some form of
encryption. A primary concern is that many attacks involve secret manner access to information
resources, and organizations are often unaware of unauthorized access to their information
systems. For that reason the quantum cryptography used.
The security of quantum cryptography maintains in its ability to exchange the encryption key with
absolute security. Cryptography has its origin in the ancient world. The Julius Caesar used simple
cryptography to hide the meaning of his messages. The Caesar cipher is a monoalphabetic
cryptosystem, since it replaces each given plain text letter, wherever in the original message it
occurs, by the same letter of the cipher text alphabet.
However the concepts of source and receiver, and channel codes are modern notions that have
their roots in the information theory. Claude Shannon, in the 1948 provided the information theory
basis for secrecy, which defines that the amount of uncertainty that can be introduced into an
encoded message can’t be greater than that of the cryptographic key used to encode it . Claude
Shannon presented this concept of security in communications in 1949, it implies that an
encryption scheme is perfectly secure if, for any two messages M 1 and M 2, any cipher-text C has
the same probability of being the encryption of M 1 as being the encryption of M 2.
The only general approach to sending and storing data over media which are insecure is to use
some form of encryption. A primary concern is that many attacks involve secret manner access to
information resources, and organizations are often unaware of unauthorized access to their
information systems. For that reason the quantum cryptography used. The security of quantum
cryptography maintains in its ability to exchange the encryption key with absolute security.
Cryptography has its origin in the ancient world.
CHAPTER 4:
TURING MACHINE
In reference to data security, a Turing-Machine is a device based on hypothesis that manages
numbers dexterously on stripe of tape according to conditions of the table. In contempt of its
simplicity, Turing-Machine can be pertinent at any computer algorithm after simulating the logic
that would be useful in illuminating the function of a CPU. In this research-work authors have
proposed a notion that takes binary number for a given decimal number and simulate the binary
number through Turing-Machine. As a result of which the next number can be generated in binary
form. Further if again we calculate the decimal of the obtained binary digits, the resultant decimal
number is one more than the previous decimal number. This approach would be helpful to generate
next successor decimal number from a given decimal number. Further this approach of number
generation through Turing machine would be helpful in cryptographic techniques where, generated
number can be applied for data security enhancement at both sender as well as receiver end.
“Turing –Machine can also perform arithmetic andalgorithmic procedure which can be performed
only by human beings or computers.”
• Tape
• Controller
4.1 Tape:
4.2 Controller:
In modern computers the Theoretical counter part of central processing unit is Controller. A
machine that has predetermined finite number of states and move from onestate to another on the
basis of Input given is called Finite-State Automaton. Controller is working as a finite-state
automaton.
The head is working on the instructions of controller. At the time of computation the head points
to a symbol or number from leftmost side of the tape that’s why we call this symbol or number a
current symbol or number. The head reads a symbol at a time and after writing moves left or right
in the tape and points to other symbol forprocessing and head do this processing one’s at a
time.Turing-Machine basically performs some operations on the tape which are as follows:
We take this approach to solve & generate the decimal number system in the reverse binary form
which after one total conversion gives many numbers of sequences in the binary form either in
increasing or decreasing order.
CHAPTER 5:
BACKGROUND
5.1:Number System
The numeration system is a consistent method of representing numbers which is a mathematical
notation applied on a given set having the symbols or digits. It is a pattern of writing for expressing
numbers. For an instance it allows symbol “11” to be interpreted in other forms as the binary
symbol for 3, the decimal symbol for 11 or using a symbol for other numbers having different
bases. The numbers represented by this system is called the value.
As we all know that computer only understands the numbers format so when we write letters or
words it translates into numbers for its ease. Computer system only understands the positional
number system having symbols called as ‘Digits’ and according to position of the number these
patterns representing different values.
Each and every digit value having numbers can be determined by:
1) Digits.
2) It’s Position.
3) And by the base of number system (which is defined as the total number of digits presented in
the number system).
Number system is used just about everywhere, especially traditional number system (binary, octal,
decimal and hexadecimal). People count by decimal number system and machine count by binary
number system. But there are countless other ways to count. The numbers in strange number
system (SNS) are those numbers which are other than the numbers of traditional number system.
Apart from these traditional number systems, the strange number system also plays a significant
role in computing. The numbers in strange number system (SNS) are those numbers which poses
some extra features than the numbers of traditional number system (TNS) viz. decimal (base 10),
binary (base-2), octal (base-8) and hexadecimal (base 16). Some of the strange numbers are unary,
ternary, …, Nonary, ..., unodecimal, …, vigesimal… sexagesimal, etc.
The revolution of digital technologies has changed the way human beings number representation
and application from traditional number system to strange number system. In this day and age,
most people tend to use strange number system in the various field of computing to perform a
variety of tasks. The invention of ternary computer is the best example of such changes to science
and technology.
The number system with base eighty five is known as the pentaoctagesimal number system is a
form of binary-to-text encoding developed by Paul E. Rutter for the btoa utility. By using five
ASCII characters to represent four bytes of binary data, it is more efficient than uuencode or
Base64, which use four characters to represent three bytes of data. The basic need for a binary-to-
text encoding comes from a need to communicate arbitrary binary data over preexisting
communications protocols that were designed to carry only human-readable text. In the
pentaoctagesimal SNS eighty five symbols are used to represent numbers and these are numerals
0 through 9, capital alphabets Athrough Z, small alphabets a through z and special symbol !, #, $,
%, &, (, ), *, +, -, ;, <, =, >, ?, @, ^,_,`, {, |, }, and ~.
In pentaoctagesimal number system the leftmost bit is known as most significant bit (MSB) and
the right most bit is known as least significant bit (LSB). The following expression shows the
DEPT OF ECE, JSSATE 2017 Page 10
DATA SECURITY ENHANCEMENT USING NUMBER SYSTEM
CHAPTER 6:
THEORY OF AUTOMATA
In Computer Science, Automata and its theory have occupied a space as it included as one of the
most important and constructive branch. In the early 20th-Century several mathematicians begin
emerging both hypothetically and accurately–machines which execute definite features like human
were.
Inputs:
Having a finite-set of input key indicator ‘I’ it is assumed that sequence of symbols is selected.The
set ‘I’ represents {x1, x2, x3….. x k} where‘k’ is the ‘number- of- inputs’.
Out-puts:
Likewise input it also has a finite set ‘Z’ which represents values {y1, y2, and y3…….y m} where
‘m’ represents ‘number- of –outputs’.
Positions:
The predetermined set ‘Q’ which is used in states has definition depend on Automation and its
type. Automata include four important parts which are as
1. A Finite-State-Machine
2. PDA (Push-Down Automata)
3. Linear-Bounded –Automata
4. The Turing -Machine
In Automata there are different sub-levels presented in hierarchical form in which ‘Finite – State’
is initial and easy where the final and complicated one is ‘Turing-Machine’. In this research paper
the main concept is Turing-Machine where it is used as a Finite-State-Machine but basis of ‘finite
– conceptually its inverse is not achieved.
CHAPTER 7:
METHODOLOGY
As previously described that Turing-Machine working on following components:
• Tape (Finite/ Infinite)
• Controller
• Read/ Write Head
1. Reads ‘a’
2. Write ‘k’
3. Move Left
1. Read ‘b’
2. Write ‘f’
3. Moves Right
The conversion process involves three conditions which convert the decimal number into binary
and after representation convert binary to the next decimal number.
For example if we take binary of decimal number 12 and representing the binary sequence on the
tape then it is like,
But for getting the next decimal number in binary should be reversed i.e. why for this purpose
reverse binary representation is used.
Previously we work on three conditions but now it is reduce to 2 conditions. Like for decreasing
order reverse binary representation is,
CHAPTER 8:
AREAS OF APPLICATION
Many applications and fields are related to Turing-Machine but this approach is taken to applied
in the field of cryptography for security purpose.
Turing-Machine approach is apply in Cryptography where usually the data is encrypted either in
the form of plain
8.1.2 Cryptographic principle 2: Some method is needed to foil replay attacks. One such measure
is including in every message a timestamp valid only for, say, 10 seconds. The receiver can then
just keep messages around for 10 seconds, to compare newly arrived messages to previous ones to
filter out duplicates. Messages older than 10 seconds can be thrown out, since any replays sent
more than 10 seconds later will be rejected as too old.
In general cryptosystems are taxonomies into two classes, symmetric or asymmetric, depending
only on whether the keys at the transmitter and receiver are easily computed from each other. In
asymmetric cryptography algorithm a different key is used for encryption and decryption. In the
symmetric encryption, Alice and Bob can share the same key (K), which is unknown to the
attacker, and uses it to encrypt and decrypt their communications channel.
Cryptographic systems are used to provide privacy and authentication in computer and
communication systems. As shown in Fig. 1, encryption algorithms encipher the plaintext, or clear
messages, into unintelligible cipher text or cryptograms using a key. A deciphering algorithm is
used for decryption or decipherment in order to restore the original information. Ciphers are
cryptographic algorithms; cryptography is the science of secret communications; cryptanalysis is
the science of breaking ciphers; and cryptology is the science of cryptography and cryptanalysis.
Cryptosystems are either symmetric, in which case both the enciphering and deciphering keys must
be kept secret, or asymmetric, in which case one of the keys can be made public without
compromising the other.
There are practical problems associated with the generation, distribution and protection of a large
number of keys. A solution to this key-distribution problem was suggested by Diffie and Hellman
in 1976. A type of cipher was proposed which uses two different keys: one key used for
enciphering can be made public, while the other, used for deciphering, is kept secret. The two keys
are generated such that it is computationally infeasible to find the secret key from the public key.
If user A wants to communicate with user B, A can use B's public key (from a public directory) to
encipher the data. Only B can decipher the cipher text since he alone possesses the secret
deciphering key. The scheme described above is called a public-key cryptosystem or an
asymmetric cryptosystem. If asymmetric algorithms satisfy certain restrictions, they can also be
used for generating so-called digital signatures.
In Symmetric Cryptography the message or text is encrypted or decrypted using the same key i.e.
public key which somehow have the security issues and facing the problem of data leakage.
While in Asymmetric Cryptography approach the message or text is encrypted using the public
key but decryption of the text is done by private key which is known only to receiver.
So for both the approaches our methodology properly works and enhances the level of security.
Step-3: [Proposed Approach] Use the decrement conditions of Turing - Machine and decrease
the number by one which is the value of different letter or symbol.
Step-4: Now, after decrement in value generate corresponding binary value. (If the number is not
8 bit number then add required numbers of zeros in right.)
Step-7: After applying division ,we have remainder (3digits max.) which is added first and
quotient (5 digits max.) at last.( If conditions is not satisfied and the value of quotient & remainder
is less ,add required numbers of 0’s in left which gives a text pattern called ‘Cipher text’).
Case Study 1:
Take alphabet ‘U’ and apply the conditions of encryption.
Step 2: In Binary form ‘U’ is represented as ‘1010101’ and after reversing it becomes ‘1010101’
Step 3: [Proposed Approach] After applying decrement conditions of Turing Machine the value
is ‘0010101’
Step 4: Add required numbers of ‘0’s’ in left to make it an 8 –bit string but the value is in reverse
order that is why
Step 5: Now use 4- digits number string for division i.e. ‘1000’.
Step 6: ‘T’ is divided by ‘1000’ which gives the Remainder ‘r’ – 10 and Quotient ‘q’- 101.
Step 7: According to conditions add required numbers of ‘0’s’ to make Remainder ‘r’3-digits
number – ‘010’ and Quotient ‘q’5-digits number –‘00101’. By adding (r + q) it gives Cipher text
– ‘01000101’ i.e. 69 – ‘E’.
Step-1: For getting normal text multiply last 5- digits of cipher text by ‘1000’.
Step-2: From cipher -text takes first 3- digits and adds it in the value evaluated in previous step.
Step-3: If the value calculated in step 2 is not an 8-bit integer then add required numbers of ‘0’s’
to make it 8-bit number.
Step-4: [Proposed Approach] Apply the conditions of Turing Machine as a private key on this
reverse binary number to get the required binary number format.
Case Study 2:
Step 1: Multiply final 5-digits by ‘1000’ i.e. ‘Q’ of Cipher text which gives ‘00101000’.
Step 2: Take first 3-digits ‘010’ and add it in the pattern getting in previous step which gives
‘00101010’ -> ‘T’
Step 3: If a number is not a 8- bit number add required number of zeros but the number is 8 bit so
no need to add it.
Step 4: [Proposed Approach] apply the increment conditions of Turing Machine to get required
plain text i.e. ‘10101010’.
Step 5: After reversing above number ‘01010101’ specific plain text ‘U’ is generated.
CHAPTER 9:
SUMMARY
This paper provides an excellent data encryption and decryption technique to increases the data
security and transfer rate during data communication. The algorithm can be used as an encoding
converter in text files. In the present network system, to increase security, every encryption
algorithm is to make it as difficult as possible to decrypt the generated cipher text without using
the key. Our proposed technique fulfils all such requirements as this technique use the concept of
data encryption and decryption. The most prominent feature of strange number system is its full
fleshed Cryptography that provides techniques of encryption and decryption while hiding all the
technical details. In conclusion, data Encryption with pentaoctagesimal SNS, a base conversion
routine, symbol remapping, and a dynamic algorithm is the only encryption algorithm that is as
secure as one-time pad.
REFERENCE
[1] Theory of Computer Science (Automata, Languages and Computation) By K.L.P Mishra And
N. Chandrasekaran 3 r d Edition Published In 2009
[8]S. William, Cryptography and Network Security: Principles and Practice, 2nd edition,
Prentice-Hall, Inc., 1999 pp 23-50
APPENDIX