International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 2 | Year 2013 | Article Id. IJCTT-V4I2P123 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I2P123

Dual Encryption Schema With Cheating Text and NTRU


Jagadeeshbabu.G, Rakesh Nayak

Citation :

Jagadeeshbabu.G, Rakesh Nayak, "Dual Encryption Schema With Cheating Text and NTRU," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 2, pp. 169-171, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I2P123

Abstract

Shared data systems have grown in numbers and hence they are susceptible to many security challenges. The sender embeds a plain message in another plain text called Cheating Text. The positions of the characters of the plain text in the cheating text are stored in a Real Message Index File (RIF).This file is encrypted using Nth degree truncated polynomial ring (NTRU) scheme and sent along with the cheating text. The receiver once received, proceeds to decrypt the RIF table and gets back the original message from the received cheating text. Authentication to decrypt is achieved by NTRU key exchanges prior to session initiation at both senders and receivers side along with the MD5 hash of the RIF. An NTRU 263-bit encryption key, has cryptographic strength equivalent to renowned powerful 1024-bit RSA key. We propose to replace any secure Scheme with a more robust NTRU crypto system.

Keywords

NTRU,MD5,RIF,CPT.

References

[1] H. J. Highland, ?Data encryption: a non-mathematical approach-Part 5, Journal of computer and Security, pp.93-97, 1995.
[2] Ch. Rupa and P. S. Avadhani, An Improved Method to Reduce the Occurrence of Collision Attack on Hash Function, Int. J. computing mathematical applications, vol2, No1-2, pp.121-131, 2008.
[3] H. Dobbertin, ?Cryptanalysis of MD5 Compress, proc. of Eurocrypt 96, 1996.
[4] Aamer Nadeem et al, "A Performance Comparison of Data Encryption Algorithms", IEEE information and communication, pp .84-89, 2005.
[5] Priya Dhawan.,"Performance Comparison: Security Design Choices, Microsoft Developer NetworkOctober2002.http://msdn2.microsoft.com/en us/ library/ms978415 .aspx
[6]http://features.techworld.com/security/3275990/ntruencrypt-the-fastestpublic-key-algorithm-youve-never-heard-of/
[7] R Weis and S Lucks, ―Cryptographic Hash Functions-Recent Results on Cryptanalysis and their Implications on System Security, 5th System Administration and Network Engineering Conference, pp 15-19, 2006.
[8] Carlos Cid,“Recent developments in Cryptographic hash Functions: Security implications and future directions”, Information Security Technical Report ,vol.26, pp.100-107, 2006.