21-08-2012, 02:40 PM
An improved Data Encryption Standard to Secure Data using Smart Cards
smartcard.pdf (Size: 550.01 KB / Downloads: 24)
Abstract
This paper is directed towards the development
of an improved DES to secure the data using smart cards. An
improved Data Encryption Standard has been developed by
incorporating an ODD/EVEN bit conversion to the existing
DES algorithm. The proposed algorithm is expected to provide
greater security to further protect the data in Smart Cards.
The data is secured from any illegal retrieval and intended
modification. The program simulation also provides a good
start to explore for a more robust encryption technique that
will not require so much mathematical computations.
INTRODUCTION
According to Dlaminia et al. [1], new risks came along as
new developments and innovations in information security
have moved from the era of mainframe computers up to the
current state of the complex Internet. Information security
breaches gains a negative impact on businesses’ reputation,
profitability, customer confidence and overall economic
growth. Anyone can interpose a computer in all
communication paths and thus can alter or copy parts of
messages, replay messages, or emit false material [13].
Confidential data can be the subject of manipulation and
misuse.
REVIEW OF RELATED LITERATURE
Several methods have been proposed in modest amount
of literature about authentication. Hwang and Li [4]
developed a scheme using ElGamal’s public key
cryptosystem that authenticates a user without using a
password file or a verification table. The security scheme
relies on the difficulty of computing discrete logarithms.
Awasthi and Lal [5] improved remote user authentication
using smart cards that overcomes the security flaws
discussed by Leung et al [5]. Modification to login and
authentication phase that is secured against forgeries was
proposed. Zhao and Zhang [6] proposed a scheme similar to
AlGamal encryption and uses RSA framework to avoid ID
replacement attack. The scheme relies on tamper resistant
smart card to protect the private key. Diament et al. [7]
implemented a bilinear pairings over certain elliptic curve
groups. A dual receiver cryptosystem was developed that
enable a ciphertext to be decrypted by two independent
receivers. Peyravian and Zunic [8] proposed a scheme that
uses the collision-resistant hash function such as SHA-1.
Although the scheme did not use any cryptosystem, the
proposed system is efficient. Needham and Schroeder [13]
used conventional and public key encryption algorithms to
achieved authenticated communication. Although the
protocols developed provide adequate solution to
authentication problems, immediate detection of tampering
need to be ensured.
PROPOSED ENCRYPTION/DECRYPTION ALGORITHM
The DES algorithm
According to [9], Data Encryption Standard (DES) is one
of the most widely used encryption algorithm and its design
idea is still used in numerous block ciphers. Over the last
three decades, DES has played major role in securing data
[11] since it was adopted as Federal Information Processing
Standard (FIPS) in November 1977 [12]. DES uses sequence
of operations and combination permutations repeatedly
applied to data blocks. DES operates on a 64 bit key blocks
of plain text (input) using a 56 bit key after 16 rounds of
iterative operations. It strips off the 8 parity bit thus ignoring
every 8th bit from the 64 bit key. The same 56 bit key is used
to decrypt and produce the original plaintext.
CONCLUSION AND RECOMMENDATIONS
In this paper, an improved version of DES has been
developed. The inclusion of ODD/EVEN bit conversion to
the existing DES algorithm will provide greater security to
the data. The program simulation also provides a good start
to explore for a more robust encryption technique that will
not require so much mathematical computations.