Open Access Open Access  Restricted Access Subscription or Fee Access

A Secure Exchange Technique for Secret Information and Encryption Key Using Hybrid System


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecap.v9i1.16115

Abstract


Due to the growth of transferring and sharing information between entities, an efficient security model is needed to protect secret information while storing or transferring over unsecured network systems. Symmetric cryptography algorithms could be used to secure information; they are immune from many kinds of attack but their main weakness is the exchanging for the secret key. In this paper, a hybrid system that combines steganography, cryptography, and data hiding techniques has been used to secure the secret information while transmitting over the Internet and to maintain a safe exchange for the encryption key between the transmitter and the receiver. In order to hide the secret information into the cover image, a simple technique that represents the steganography algorithm has been used. It does bit-by-bit Xoring between the secret information and the cover image in order to get the steganography image. For cryptography the algorithm MJEA (for Modified Jamal Encryption Algorithm) has been used; it is a symmetric block encryption algorithm with 64-bit block size and 120-bit key size. This algorithm is used to encrypt the steganography image. The performance of the proposed technique has been evaluated by adopting different simulation metrics such as visual testing and histogram analysis. All results ensure the strength of the proposed system in securing the secret information as well as providing a safe distribution for the encryption key between the communicating parties.
Copyright © 2019 Praise Worthy Prize - All rights reserved.

Keywords


Steganography; Encryption; Information Hiding; Information Security; Image Encryption; Key Exchange; Key Distribution

Full Text:

PDF


References


W. Stallings, Cryptography and Network Security: Principles and Practice (Prentice Hall, 2013).

Bafandehkar, M., Yasin, S., Mahmod, R., A Literature Review on Scalar Recoding Algorithms in Elliptic Curve Cryptography, (2015) International Journal on Communications Antenna and Propagation (IRECAP), 5 (4), pp. 183-189.
https://doi.org/10.15866/irecap.v5i4.5673

S. Shojae Chaeikar, S. Abd Razak, S. Honarbakhsh, H. Rouhani Zeidanloo, M. Zamani, and F. Jaryani, Interpretative Key Management (IKM), A Novel Framework, Second International Conference on Computer Research and Development, pp. 265-269, 2010.
https://doi.org/10.1109/iccrd.2010.54

A. McAndrew, Introduction to Cryptography with open-source software (CRC Press, 2016)

Sasikala Devi, S., Danamani, A., Efficient Hybrid Tree Key Distribution for Secure Multicast Communication, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp. 202-207.
https://doi.org/10.15866/irecap.v4i5.3951

Z. Hu, Y. Zhu, L. Ma, An Improved Kerberos Protocol Based on Diffie-Hellman-DSA Key Exchange, 18th IEEE International Conference on Networks (ICON), pp. 400-404, 2012.
https://doi.org/10.1109/icon.2012.6506591

H. Kwon, C. Hahn, D. Koo, J. Hur, Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), pp. 391-398.
https://doi.org/10.1109/cloud.2017.57

P. Varalakshmi, A.R. Shajina, T. Kanimozhi, A framework for secure cryptographic key management systems, 2014 Sixth International Conference on Advanced Computing (ICoAC), pp. 319-323.
https://doi.org/10.1109/icoac.2014.7229733

L. Jing, Q. Huang, B. Yang, and Y. Zhang, Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures, IEEE Transactions on Computers, vol. 62, no. 8, pp.1656-1672, 2013.
https://doi.org/10.1109/tc.2012.245

C. Chang, C. Lin, and C. Chen, A conference Key Distribution Scheme Using Interpolating Polynomials, International Journal of Security and its Applications, Vol. 1, No. 2, pp. 9-20, 2007.

Kulkarni, S. Sandeep and B. Bruhadeshwar. Key-Update Distribution in Secure Group Communication, Computer Communications, vol. 33, no. 6, pp. 689-705, 2010.
https://doi.org/10.1016/j.comcom.2009.11.014

M. R. Wahiddin, N. S. Noor Sham, M. Saeb, M. Hamdan, A Protocol for Secret Key Infusion from Satellite Transmissions, International Journal of Computer and Network Security (IJCNS), Vol. 2, No.7, pp. 99-102, July 2010.

S. Rajavelu, V. Vaidehi, R. Rajaraman, S. Kanagaraj, R. Kalimuthu, and R. Dharmaraj, Secure Group Key Management Scheme for Multicast Networks, IJ Network Security, vol 10, no. 3, pp. 205-209, 2010.

H. Sun, H. Yeh, Password-Based Authentication and Key Distribution Protocols with Perfect Forward Secrecy, Journal of Computer and System Sciences, Vol. 7, No. 2, pp. 1002–1011, 2006.
https://doi.org/10.1016/j.jcss.2006.03.005

M. E. Whitman, H. J. Mattord, Principles of Information Security (Fourth Edition, Course Technology, 2012).

W. Stallings, L. Brown, M. D. Bauer, & A. K. Bhattacharjee, Computer security: principles and practice, (Pearson Education, 2012).

J. N. Salameh, A New Symmetric-Key Block Ciphering Algorithm, Middle-East Journal of Scientific Research, Vol. 12, No. 5, 2012, pp. 662-673.

J. N. Bani Salameh, An Investigation of the Use of MJEA in Image Encryption, WSEAS Transactions on Computers, Volume 15, pp. 12-23, January 2016.

Kim, Y., Lee, S., Park, T., High-Speed Video Data Encryption on LTE-Based Swarm UAS, (2018) International Review of Aerospace Engineering (IREASE), 11 (5), pp. 186-193.
https://doi.org/10.15866/irease.v11i5.15180

Saraireh, S., Saraireh, M., Filter Bank Block Cipher and LSB Based Steganography for Secure Data Exchange, (2017) International Journal on Communications Antenna and Propagation (IRECAP), 7 (1), pp. 1-7.
https://doi.org/10.15866/irecap.v7i1.11118

Sahu, A., Swain, G., Information Hiding Using Group of Bits Substitution, (2017) International Journal on Communications Antenna and Propagation (IRECAP), 7 (2), pp. 162-167.
https://doi.org/10.15866/irecap.v7i2.11675


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize