A Key Generation Algorithm For Cryptographic Algorithms To Improve Key Complexity and Efficiency
A Key Generation Algorithm For Cryptographic Algorithms To Improve Key Complexity and Efficiency
Efficiency
Mr.B.Umapathy Dr.G.Kalpana
Research Scholar, Department of Computer Science, Associate professor & Head, Department of Computer
College of Science and Humanities, Science, College of Science and Humanities,
SRM Institute of Science and Technology, Kattankulathur, SRM Institute of Science and Technology, Kattankulathur,
Chennai, Tamil Nadu- 603203, India. Chennai, Tamil Nadu- 603203, India.
[email protected] [email protected]
Abstract: In the recent days people use a variety of The energy costs of asymmetric and hash
online software applications to move data from one algorithms are the highest and lowest, respectively.
location to another. To secure personal data from The energy cost of asymmetric algorithms depends
hackers, software or applications use cryptographic- on the key size, whereas those of symmetric
based algorithms. The encryption and decryption
algorithms are not significantly impacted by key size.
processes are the foundation of the cryptographic
algorithm, which will be carried out with the help of a The energy consumption of a symmetric algorithm
key. Cryptographic algorithms employ automatic key depends on both the cost of bulk data encryption and
generation that starts with the user's password, whereas decryption as well as the cost of key setup. A
another generating key directly interprets the password. cryptographic algorithm's level of security can be
A symmetric algorithm uses the same key for both traded off for energy savings [19].
encryption and decryption. For key generation,
symmetric algorithms use a second or subsidiary Cryptology is used in the cloud storage
method. The password is protected using this key service industry to provide security, integrity,
generation process from various key attacks. The key reliability, and other benefits. Cryptography and
generation algorithm functions as an interpreter,
cryptanalysis are the two subfields of cryptology.
transforming a password from a human-readable form
to a machine-readable form. An increase in Numerous cryptographic algorithms are being
permutations and combinations helps to protect the developed to safeguard data, and the cryptanalysis
password; additional characteristics are being added to process is used to determine an algorithm's
the algorithm. To get around the restricted key bit size, complexity so that it might be improved. The key is
this paper proposed the KEY SECURE-KEY (KS- crucial to cryptanalysis and cryptography. The
KEY) algorithm. However, increasing the key size is not cryptographic algorithm makes use of the key to
a suitable way to encrypt data because multi-core transform plain text into cipher text and to boost
processors in modern microprocessors are significantly complexity to prevent brute-force attacks. A separate
increasing processing speed.
algorithm almost completely completes the key
Keywords: Cloud Storage Services, Cryptography, creation process [1][6].
Security, Key Generation, Encryption Key, Symmetric Key
II. RELATED WORKS
I. INTRODUCTION
The Advanced Encryption Standard (AES)
Cryptographic methodology is successful, uses the XOR operation, byte substitution operation,
they eventually discovered some threats that were and circular rotation operation to process the key
entirely based on keys. The key generation technique generation's (128,192,256) bits. Whenever encryption
is constantly improved upon or modified to provide a and decryption use a hexadecimal conversion
high level of security until the cryptographic process, the AES character is converted to a
algorithm fails to avoid the situation described in hexadecimal value [3]. By throwing away every
these threats. Therefore, key creation is crucial to eighth bit of the initial key, the Data Encryption
modern encryption and decryption techniques. In Standard (DES) key generation process creates a 64-
general, key generation algorithms received less bit key that is then divided into two 28-bit pieces. Bit
attention in cryptography than the encryption and shifting and byte substitution make up the DES
decryption processes [2][7]. operation [4]. Key generation for the Blowfish
algorithm ranges from 32 to 448 bits. This flexibility
is making cryptanalysis using XOR operations more [13]. The lightweight cryptographic algorithm has
difficult [5]. been designed using Recursive Pared Parity and
Transformation of Bits techniques which are also
The strength of the encryption and applicable for IoT embedded platforms and proved
decryption algorithms depends on how difficult it is that efficient than AES [18].
to acquire the keys. In the research mentioned above,
the majority of the cryptographic algorithms' key III. PROPOSED KS-KEY ALGORITHM
sizes are almost fixed, with the exception of the
Blowfish method, which has a maximum key size of A character password made up of a
448 bits. In the actual world, ransomware breaks the combination of letters, numbers, special characters,
highest security measures as a result of unbiased etc. is used to enter the KS key algorithm. For the
attacks on users and companies. Ransomware infects password to be secure and effective, there's a set of
models in large part via creating keys; the threat can guidelines that must be followed by an algorithm.
easily be mitigated by using a defense-in-depth With the use of these guidelines, key-building is
strategy [8]. made more complex and confusing. The character
password in the flow diagram (figure 1) is initialized
In symmetric key encryption using a genetic and starts at position 0. If the binary character is
algorithm, the key generation process divides the user present in the current position value, block 1 is
input and then simply converted using ASCII executed; otherwise, block 2 is carried out. Repeat
character conversion it results in a matric key [9]. this step until all the characters present in the
Identity-based re-encryption, the key generation password are executed. Character Passwords are all
process gets a user Identity as an input for the master non-binary characters and are passed in blocks one at
secret key combined with public parameter the a time based on their position. Here, the characters
algorithm output’s the user secret key which to are transformed into ASCII binary characters. The
ensure the trust authority [10]. DNA-based random translated characters are added further.
key generation and management for OTP Encryption
the secure keys are directly generated from organisms Block B begins execution at position 0 and
that are highly random. The DNA is processed is the receives the translated binary characters produced by
key to improving the security and credibility of the block A. In this case, the translated binary characters
data owner [11]. and the current position value of the Character
password are bit-wise XORed. The XOR process is
The only use of cryptography does not repeated until the final value in the translated binary
provide a way to improve cloud computing security. characters are executed. After the XOR binary
In a practical setting, cloud security is improved by characters, the current position value of the Character
incorporating both cryptographic algorithms and password will be appended.The KS-KEY method
security policies [12]. Cloud computing services completes the execution of all the characters in the
encrypt all data using keys of identical size without password and results in the binary value as the key.
taking into account any priority that would increase Further cryptographic algorithm may be utilize the
the cost or lengthen the execution time. The amount key for both encryption and decryption.
of data that is prioritized for encryption at various
levels saves money and time [17]. Services for A. Pseudo code for KS-KEY Algorithm:
creating and maintaining keys, often known as key
generation and key management, the user is KS-KEY ( Character_password )
responsible for carrying out the entire execution {
process [14]. Word key, temp
For ( i=0; i< length ( Character_password );
In real-time applications, the encryption i++)
approaches are improved by combining binary tree {
traversals and XOR operations. DoS assaults, bypass If ( Character_password [i] == ‘0’ or ’1’)
attacks, and intruder attacks can all be protected {
against with the use of the XOR operation [15][16]. temp = null
AES is the best performing algorithm when For ( j=0; j< length ( key ); j++)
compared to symmetric and asymmetric algorithms {
like DES, RSA, BLOWFISH, and others in a variety temp = temp + ( key [ j ]
of contexts and with a variety of file formats, XORCharacter_password [ i ] )
including picture files, binary files, text files, etc. }
B. Rules:
B. Step by step execution of KS-KEY: The key size will differ based on character password
count and the combination of binary characters in
Step 1: Get the user input as the character password Eq.(4).
and analyze the count of the character, the count set
as no of the looping.
Step 3: The current position of the character Algorithm Key Size Key possibilities
password value is checked, whether it has the binary
value the block 1 will be executed else the block 2 is DES 56 bits 256
executed.
uma1@ = 100010101001001010011110101000000
uma1@3 = 10001010100100101001111010100000
00110011
(1)
uma1@31 = 0111010101101101011000010101111
“Kx” starts execution, then check the length of “Ky”. 11110011001
If there is any value in “Ky”, the values XOR with
Input :character_password = uma1@31
the p[i] and finally added with P[i] in Eq.(2).
The hacker cannot interpret the password character, [3] Rahul Saha, G. Geetha, Gulshan Kumar, Tai-hoon Kim, "RK-
AES: An Improved Version of AES Using a New Key Generation
and the exact execution of the XOR operation Process with Random Keys", Security and Communication
performed is impossible to find, while backtracking Networks, vol. 2018, Article
in binary values. So the same password character ID 9802475, 11 pages, 2018. https://doi.org/10.1155/2018/980247
used in different websites or domains is secured by 5.
the Non-backtracking technique. Even the hacker, [4] D. Coppersmith, "The Data Encryption Standard (DES) and its
intruded binary key cannot obtain the character strength against attacks," in IBM Journal of Research and
password because the same binary key can be Development, vol. 38, no. 3, pp. 243-250, May 1994, doi:
interpreted from different character passwords by 10.1147/rd.383.0243.
using the proposed algorithm due to an XOR [5] B. Schneier, “Description of a new variable-length key, 64-bit
operation. block cipher (Blow- fish), ”1994, doi: 10.1007/3-540-58108-1_24.
The following example uses the research findings [6] Johannes A, Buchanan, “Introduction to cryptography”,
shown experimental results: Binary key SpringerVerlag.
‘011101010110110101100001010111111110011001
’ for character password ‘uma1@31’. Let backtrack
[11] Zhang, Yunpeng, Xin Liu, and Manhui Sun. "DNA based
random key generation and management for OTP
encryption." Biosystems 159 (2017): 51-63.