Multilevel Network Security Combining Cryptography And .

2y ago
78 Views
4 Downloads
291.14 KB
5 Pages
Last View : 4d ago
Last Download : 3m ago
Upload by : Matteo Vollmer
Transcription

Journal of Embedded Systems, 2015, Vol. 3, No. 1, 11-15Available online at http://pubs.sciepub.com/jes/3/1/2 Science and Education PublishingDOI:10.12691/jes-3-1-2Multilevel Network Security Combining Cryptographyand Steganography on ARM PlatformPallavi H. Dixit1,*, Kamalesh B. Waskar1, Uttam L. Bombale21Electronics and Telecommunication, Bharati Vidyapeeth College of Engineering, Kolhapur, India2Electronics, Shivaji University, Kolhapur, India*Corresponding author: dixit.pallavi@rediffmail.com,Received November 18, 2014; Revised February 28, 2015; Accepted March 15, 2015Abstract This paper presents two level data security in Network system. Cryptographic algorithm BLOWFISHand Steganography algorithm List significant Bit (LSB) are used for data security. Confidential information isencrypted by BLOWFISH algorithm, and then encrypted data hide into image by LSB algorithm of Steganography.For more security we used iris image of authorized person to hide encrypted data. The keys required forBLOWFISH algorithm is generated from same iris image. These two algorithms implemented on 32 bit ARM 7. Inthe result of project include memory utilization, processing time for encryption and decryption etc. this project givesbetter security for embedded systems like mobile, smart card, ATM etc.Keywords: network security, blowfish, cryptography, embedded system, list significant bit, steganographyCite This Article: Pallavi H. Dixit, Kamalesh B. Waskar, and Uttam L. Bombale, “Multilevel NetworkSecurity Combining Cryptography and Steganography on ARM Platform.” Journal of Embedded Systems, vol. 3,no. 1 (2015): 11-15. doi: 10.12691/jes-3-1-2.1. IntroductionMany embedded systems depend on obscurity toachieve e-mail from being read by someone other than theintended recipient, keep firmware upgrades out of devicesthey don't belong security, Modern embedded systemsneed data security more than ever before. Our PDAs storepersonal e-mail and contact lists; GPS receivers and, soon,cell phones keep logs of our movements and ourautomobiles record our driving habits. On top of that,users demand products that can be reprogrammed duringnormal use, enabling them to eliminate bugs and add newfeatures as firmware upgrades become available.Data security helps keep private data private. Securedata transmissions prevent contact lists and personal in,and verify that the sender of a piece of information is whohe says he is. Data security techniques have a reputationfor being computationally intensive, mysterious, andfraught with intellectual property concerns. Whereas someof this is true, straightforward public domain techniquesthat are both robust and lightweight do exist. One suchtechnique, an algorithm called Blowfish, is perfect for usein embedded systems.Cryptography and Steganography are widely usedtechniques that manipulate information in order to cipheror hide their existence. These techniques have manyapplications in computer science and other related fields.They are used to protect e-mail messages, credit cardinformation, corporate data etc. Steganography is the artand science of communicating in a way which hides theexistence of the communication [1]. A Steganographysystem thus embeds hidden content in unremarkable covermedia so as not to arouse an eavesdropper’s suspicion [2].For example it is possible to embed a text inside an imageor an audio file. On the other hand, cryptography is thestudy of mathematical techniques related to aspects ofinformation security such as confidentiality, data integrity,entity authentication, and data origin authentication [3]. Inthis paper we will focus only on confidentiality.Cryptography and Steganography are cousins in the spycraft family: the former scrambles a message so it cannotbe understood; the latter hides the message so it cannot beseen.The aim of this paper is to describe a method forintegrating together cryptography and Steganographythrough image processing. In particular, we present asystem able to perform Steganography and cryptographyat the same time.In this paper, both Cryptography and Steganographymethods are used for data security over the network. IRISis considered to be the most trusted and unique feature ofthe person. Hence this project proposes a data encryptiontechnique using IRIS biometric. IRIS images are takingfrom IRIS biometric database. ARM processor is used forprocessing Steganography and cryptography algorithms.2. Related Work“Iris Biometric Cryptography for Identity Document”,this paper present an approach to generate a unique andmore secure cryptographic key from iris template. The irisimages are processed to produce iris template or code tobe utilized for the encryption and decryption tasks. AES

12Journal of Embedded Systemscryptography algorithm is employed to encrypt anddecrypt the identity data [5].Secondly” Two New Approaches for Secured ImageSteganography Using Cryptographic Techniques and TypeConversions” This paper give information aboutCryptography & Steganography, This paper introducestwo new methods wherein cryptography and Steganographyare combined to encrypt the data as well as to hide theencrypted data in another medium so the fact that amessage being sent is concealed [6].Next paper is “A New Image Steganography Technique”it includes various image Steganography techniques likeText-Based Steganography, Audio Steganography,Steganography in OSI Network Model, ImageSteganography etc. [7]“Multilevel Network Security Based on Iris Biometric”,In this paper A novel security Mechanism is developedhere for high security networks by combining IRIS biometrictechniques with cryptographic and Steganographymechanisms [9].3. MethodologyThere have been many different encryption algorithmsand public key cryptographic methods are being proposedto provide security to such data. All of these algorithmsdepend upon a user’s key which he uses as the key forencryption. But these keys may be hacked by hacker,hence the only feature or data of a person that hackerscannot hack is their biometric features, hence thisproposed project consider IRIS image of a user to generatesecrete key for encryption.For security, only encryption may not be enough, henceproposed project include combination of both cryptographyand Steganography. The encrypted data hide into theimage and then image is transmitted in the network.There is some weakness in hiding information inimages; that is adversary could easily detect theconfidential message, by noticing the noise and clarity ofthe image's pixels, also by observing the differencebetween the embedded image and the original one if it isknown to him. In the proposed project, here use Irisimages instead of images that contain faces or naturalscenes, because the only feature or data of a person thathackers cannot hack is their biometric features.Block diagram:Generated key from iris image, we have taken only irispart of eye of person for more security. Key length is 128bits.Using Blowfish algorithm for encryption, theconfidential information is encrypted.Cryptography Text keyThis encrypted text then hides into every pixel of irisimage.Steganography Text image4. Iris image is transmitted to receiver, at the receiverside, hidden data removed from image and using sameencrypted key, original data recovered from encrypted text.4. Overview of algorithm4.1. Image DefinitionTo a computer, an image is a collection of numbers thatconstitute different light intensities in different areas of theimage [9]. This numeric representation forms a grid andthe individual points are referred to as pixels. Most imageson the internet consists of a rectangular map of theimage’s pixels (represented as bits) where each pixel islocated and its color [10]. These pixels are displayedhorizontally row by row. The number of bits in a colorscheme, called the bit depth, refers to the number of bitsused for each pixel [11]. The smallest bit depth in currentcolor schemes is 8, meaning that there are 8 bits used todescribe the color of each pixel [11].4.2. Least Significant Bit AlgorithmLeast significant bit (LSB) insertion is a common,simple approach to embedding information in a coverimage [3]. The least significant bit in other words, the 8thbit of some or all of the bytes inside an image is changedto a bit of the secret message. When using a 24-bit image,a bit of each of the red, green and blue color componentscan be used, since they are each represented by a byte. Inother words, one can store 3 bits in each pixel. An 800 600 pixel image, can thus store a total amount of1,440,000 bits or 180,000 bytes of embedded data [7]. Forexample a grid for 3 pixels of a 24-bit image can be asfollows:( 001011010001110011011100 )(101001101100010000001100 )(110100101010110101100011)When the number 200, which binary representation is11001000, is embedded into the least significant bits ofthis part of the image, the resulting grid is as follows:( 0010110100011101 11011100 )(1010011011000101 00001100 )(1101001010101100 01100011)Figure 1. functional block diagramSteps areAlthough the number was embedded into the first 8bytes of the grid, only the 3 underlined bits needed to bechanged according to the embedded message. On average,only half of the bits in an image will need to be modified

Journal of Embedded Systemsto hide a secret message using the maximum cover size [7].Since there are 256 possible intensities of each primarycolor, changing the LSB of a pixel results in smallchanges in the intensity of the colors. These changescannot be perceived by the human eye - thus the messageis successfully hidden. With a well-chosen image, one caneven hide the message in the least as well as second toleast significant bit and still not see the difference [3].13Finally, recombine xL and xR to get the ciphertext.A graphical representation of F appears in Figure 2. Thefunction divides a 32-bit input into four bytes and usesthose as indices into an S-array. The lookup results arethen added and XORed together to produce the output.The P-array and S-array values used by Blowfish areprecompiled based on the user's key. In effect, the user'skey is transformed into the P-array and S-array; the keyitself may be discarded after the transformation.4.3. BlowfishBlowfish is a symmetric encryption algorithm, meaningthat it uses the same secret key to both encrypt anddecrypt messages.A graphical representation of the Blowfish algorithmappears in Figure 2. In this description, a 64-bit plaintextmessage is first divided into 32 bits. The "left" 32 bits areXORed with the first element of a P-array to create avalue I'll call P', run through a transformation functioncalled F, then XORed with the "right" 32 bits of themessage to produce a new value I'll call F'. F' thenreplaces the "left" half of the message and P' replaces the"right" half, and the process is repeated 15 more timeswith successive members of the P-array. The resulting P'and F' are then XORed with the last two entries in the Parray (entries 17 and 18), and recombined to produce the64-bit ciphertext.Figure 3. Graphical representation of F4.4. Experimental SetupFigure 4. Experimental setup block diagramFigure 2. Blowfish algorithmAlgorithm:The input is a 64-bit data element x.Divide x into two 32-bit halves: xL, xR.Then,for i 1 to 16:xL xL XOR PixR F(xL) XOR xRSwap xL and xRAfter the sixteenth round,swap xL and xR again to undo the last swap.Then,xR xR XOR P17 andxL xL XOR P18.PC must have Visual basic 6 software to run GUI. PCcom port connected to ARM kit com Port. We used twoUART port of ARM kit, one is connected to PC com portand second connected to Zigbee. So transmitter can acts asa receiver or receiver can acts as transmitter if requireed.As shown in Figure 4, for practical demonstration werequired two PC or Laptops, two ARM kit, two zigbeemodule and two serial com cables.5. ResultsAt transmitter side we are created GUI in Visual Basic6, which can be used to transmit text and iris image toARM kit. This GUI shown in Figure 7. After sending textand Image to microcontroller, LCD shows messageDevice is ready to receiver data from pc. Then Send textand image button pressed, then downloading of image andtext done in RAM memory of ARM controller. When PCsends text and Image to Controller then controller is readyto receive data from computer.LCD display shows themessage “receiving ready”.

14Journal of Embedded SystemsReverse process takes place at the receiver side. Zigbeereceive stego image and transit to the IC, decoding ofimage and encoding text take place then encoded text isconverted into original text. Stego image display onreceived image block of GUI and original text is at bottomblock.Whole programming done in c code and compile inKeil 4, so timing analysis is possible. Timing analysis andmemory utilization as shown in table below,Encryption cycleDecryption cycle11201119Leastsignificant bitalgorithm32273224Memory utilization5KB18 KBBlowfishalgorithmTotal4347434323KBFigure 5. Experimental setup connection diagram transmitter side.6. ConclusionFigure 6. receiving statusAfter completion of successful reception of image andtext to the controller. Then controller stat encoding andstore encoded text in image. And stego image send to theUART1, where zigbee module is connected to controller.Whereas doing this process controller display message onLCD as below.This paper is devoted to the problem and solution onsecurity of small embedded system. Total ARM memoryis utilized for processing of both algorithms. So thissystem can be used in small memory application like insmart cards, ATM machine etc. As the point of security,maximum security for text is possible so this system canbe used in military application. Most confidential irisimage of person consider for Steganography, so when irisimage with hidden text is on network, and if hackers hackthis image, then it is too difficult to catch the hidden databecause iris image is unique identity for person, there isno another same image can be generated or captured. Sothis is the advantage.Blowfish is a very secure algorithm. When wecompared it with another algorithm AES then it is foundthat for embedded system security, blowfish is easier thanAES. Blowfish required less processing time and memoryutilization than AES. So it is a faster security algorithmfor embedded system.This project introduces two algorithms at a time formultiple securities, so maximum security can possible.ReferencesFigure 7. Encoding status[1][2][3][4][5][6][7][8][9]Figure 8. Received image and text at receiver sideJohnson, Neil F. And Sushil Jajodia. “Exploring steganography:seeing the unseen.” IEEE computer, 32:2. 26-34. 1998.Proves, N. And Honeyman, P. “Hide and Seek: An Introduction tosteganography.”,IEEE security &privacy, (2003).Menezes, A., Van Oorschot, P., and Vanstone, S. “Handbook ofapplied cryptography.” CRC Press, (1996).Hassan Mathkour, Batool AL-sadoon, ameur touir ” a new imagesteganography technique”.Sim hiew moi, nazeema binti abdul rahim,puteh saad, pang li sim,zalmiyah zakaria, subariah ibrahim, “iris biometric cryptographyfor identity document”, 2009 international conference of softcomputing and pattern recognition.Sujay narayana1and gaurav prasad” two new approaches forsecured image steganography using cryptographic techniques andtype conversions” signal & image processing: an internationaljournal (sipij) vol.1, no.2, december 2010.Mamta juneja 1, parvinder singh sandhu2 “designing of robustimage steganography technique based on lsb insertion andencryption” 2009 international conference on advances in recenttechnologies in communication and computing.V.v.satyanrayanarayana tallapragada, dr. E.g.rajan, “multilevelnetwork security based on iris biometric” 2010 internationalconference on advances in computer engineering.B. Schneier, applied cryptography, john wiley & sons, new york,1994.

Journal of Embedded Systems[10] B. Schneier, description of a new variable-length key, 64-bit blockcipher (blowfish) fast software encryption, Cambridge securityworkshop proceedings (December 1993), springer-verlag, 1994,pp. 191-204.[11] Zainul Abidin, Adharul Muttaqin, “A Simple CryptographyAlgorithm for Microcontroller” in international journal of15emerging technology and advanced engineering 2250-2459, iso9001:2008 certified journal, volume 2, issue 12, December 2012[12] [13] [14] http://www.8051projects.net/lcd-interfacing/.

integrating together cryptography and Steganography through image processing. In particular, we present a system able to perform Steganography and cryptography at the same time. In this paper, both Cryptography and Steganography methods are used for data security over the network. IRIS i

Related Documents:

Fourth Edition Chapter 11 Basic Cryptography . Objectives Define cryptography Describe hash, symmetric, and asymmetric cryptographic algorithms List the various ways in which cryptography is used Security Guide to Network Security Fundamentals, Fourth Edition 2 . Introduction Multilevel approach to information security

2. Multilevel data and multilevel analysis 11{12 Multilevel analysis is a suitable approach to take into account the social contexts as well as the individual respondents or subjects. The hierarchical linear model is a type of regression analysis for multilevel data where the dependent variable is at the lowest level.

Cryptography and Java Java provides cryptographic functionality using two APIs: JCA - Java Cryptography Architecture - security framework integrated with the core Java API JCE - Java Cryptography Extension - Extensions for strong encryption (exported after 2000 US export policy)

of public-key cryptography; providing hands-on experience with some of the most common encryption algorithms that are used on the internet today. Modern Cryptography Introduction Outline 1 Introduction 2 Historical Cryptography Caesar Cipher 3 Public{Key Cryptography

Cryptography with DNA binary strands and so on. In terms of DNA algorithms, there are such results as A DNA-based, bimolecular cryptography design, Public-key system using DNA as a one-way function for key distribution, DNASC cryptography system and so on. However, DNA cryptography is an

network security. This paper covers the various cipher generation algorithms of cryptography which are helpful in network security. Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security

basic cryptography concerns secure communication between two parties, while in this course we are interested in cryptographic protocols in multiuser/network context prerequisites: a previous course in cryptography (e.g. C&O 487, Applied Cryptography) is helpful but not required mat

hydrate (C–S–H), ettringite, and Ca(OH) 2 through a hydration reaction in which hydration heat is produced within the concrete because of an exothermic reaction. Since the thermal cracking of concrete reduces its internal force, watertightness, and durability, an appropriate measure is required to control the heat of hydration. The factors that influence the hydration heat of concrete .