A New Method For Encryption Using Fuzzy Set Theory

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

International Journal of Engineering Trends and Technology- Volume3Issue3- 2012

A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY


Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D,

N.Kavinilavu

Associate Professor

Research Scholar

Dept of Computer Science & Engg

Dept of Computer Science& Engg

Alagappa University

Alagappa University

Karaikudi

karaikudi

ABSTRACT
Security of data is important factor in data transmission

Keywords - Fuzzy set theory, Encryption, AES Rijndael

through network. In this paper, we propose a new

Algorithm, Fuzzy logic.

method using fuzzy set theory to enhance the security.


The data in the form of text to be transmitted is

1. INTRODUCTION

encrypted by using the AES Rijndael algorithm. The


encryption algorithm is the mathematical procedure for
performing encryption of data. A key is used to cipher a
message and to decipher it back to the original message.

In

this

paper

we

focus

on

the

implementation of the fuzzification of the given text,


after

the

encryption

using

symmetric

key

Then the scrambled encrypted text is converted into the

cryptography. Fuzzy logic is a problem-solving

form of numerics by applying the fuzzy set theory. The

control system methodology that lends itself to

fuzzy logic will provide the text in the zero to one value.

implementation in systems ranging from simple,

These numerical before decryption the numerical are

small,

again converted into scrambled text. After this, if the

networked, multi-channel pc (or) workstation-based

key provided by the user is the same key that is used for
the encryption then original data will be retrieved. The
paper, integrates the encryption of text and conversion
of the unscrambled text from numerical to original by
using fuzzy logic. In this paper, we involve matrix

embedded

micro-controllers

to

large,

data acquisition and control systems. It can be


implemented

in

hardware,

software

(or)

combination of both. Fuzzy logic provides a simple


way to arrive at a definite conclusion based upon

conversion of text after encryption. Hence, the intruders

vague, ambiguous, imprecise, and noisy (or) missing

are unaware of the text that is encrypted. For this

input information.

matrix conversion fuzzy membership functions are


involved. Before decryption the matrix transformation

Fuzzy sets and fuzzy logic are powerful

is taken place to find text. After that, the decryption

mathematical tools for modeling and controlling

taken place by providing key.

uncertain systems in industry, humanity and nature

ISSN: 2231-5381 http://www.internationaljournalssrg.org

Page 320

International Journal of Engineering Trends and Technology- Volume3Issue3- 2012


they are facilitators for approximate reasoning in

methods in which both the sender and receiver share

decision making in the absence of complete and

the same key.

precise information [10] [4]. The basic concept


underlying fuzzy logic is that of a linguistic variable.
A variable whose values are words (or) sentences in
natural (or) artificial languages are called linguistic
variables. Fuzzy sets are a generalization of classical

2. RELATED WORK

sets and infinite valued logic is a generalization of


This section gives brief overview on the

classical logic. There is also correspondence between

related work done on fuzzification and its result. In

these two areas.

this paper refers to security problem involving


Network Security is becoming more and
more crucial as the volume of data being exchanged
on the internet access [8]. Based on the above, the
security

involves

four

important

aspects:

Confidentiality, message authentication, integrity and

computers based system is getting more frequent for


security attention. The number and variety of attacks
by person and malicious software from outside
organization, particularly and consequences of inside
attacks also remain a major concern.

non repudiation. Popular application of multimedia


technology, and increasingly transmission ability of

Cryptography is the practice and study of

network gradually leads us to acquire, information

hiding information. Modern cryptography intersects

directly and clearly through various methods.

the disciplines of mathematics, computer science and


electrical engineering. Applications of cryptography

In cryptography, public-key cryptosystems


are convenient in that they do not require the sender

include ATM cards, computer passwords and


electrical commerce.

and receiver to share a common secret in order to


communicate securely [7]. However, they often rely

Public-key cryptography is a fundamental

on complicated mathematical computations and are

and widely used technology around the world. It is

thus

the

generally

much

more

inefficient

than

approach

which

is

employed

by

many

cryptographic algorithms and cryptosystems. Public-

comparable symmetric-key cryptosystems.

key algorithms are most often based on the


Cryptography is the process of transforming
plain text into unintelligible form called the cipher

computational complexity of hard problems often


from number theory.

text. The technology of the encryption is called


cryptology[6]. In this paper the text encryption is

Most of the users do not have the required

based on the symmetric key algorithm where both the

resources for the communication. Current algorithms

encryption and the decryption keys are the same.

which are available for the encryption either takes

Symmetric

high processing time and not secure enough to help

cryptography

refers

to

encryption

the limited bandwidth.

ISSN: 2231-5381 http://www.internationaljournalssrg.org

Page 321

International Journal of Engineering Trends and Technology- Volume3Issue3- 2012


In this project, the encryption algorithm is
an integral work of data encryption and decryption

It is an iterated block cipher, with a variable block


length and variable key length.

process. They should preserve high security to the


data transmitted. Basically, encryption algorithms are
divided into three major categories transposition,

AES Rijndael Algorithm Operations


Describe the set of rounds keys from the

substitution and transposition-substitution technique.

cipher key.

The symmetric key transmission is proposed in this


paper. Symmetric means, the key used for encryption

Initialize the state array with the block data


(plaintext).

and decryption will remain.

Add the initial round key to the starting state

2.1 Background

array.
Security is the main problem in the modern
data communication. There are a lot of cyber-crimes
have arises with the development of technology.

Perform nine rounds of state manipulation.

Perform the tenth final round of state

Cryptography consists of cryptology and crypto

manipulation.

analysis. Encryption comes under cryptology. In this


paper the text encryption is based on the symmetric
key algorithm where both the encryption and the
decryption keys are the same.

Copy the final state array and as the


encrypted data (cipher text).

2.2 Fuzzy set theory

2.1.1 AES Rijndael Algorithm

Fuzzy set theory is an extension of classical

The encryption algorithm is an

set theory where elements have varying degrees of

integral work of image encryption and decryption

membership. A logic based on the two truth values

process. They should preserve high security to the

True and false is sometimes inadequate when

image transmitted. Basically, encryption algorithms

describing human reasoning [5]. Fuzzy logic uses the

are

categories

whole interval between 0 (false) and 1 (True) to

transposition

describe human reasoning. A fuzzy set is any set that

substitution technique [3]. The symmetric key

allows its members to have different degree of

transmission is proposed in this paper. Symmetric

membership function in the interval [0,1].The degree

key used for encryption and decryption will remains

of membership (or) truth is not same as probability

same. Rijndael algorithm is one of the AES

[9].Fuzzy truth is not likelihood of some event (or)

(Advanced Encryption Standard) algorithms, used for

conditions. The fuzzy truth represents membership in

text encryption technique. It is a block cipher

vaguely defined sets.

divided

transposition,

into

three

substitution,

major
and

algorithm, in which the block means the information


to be encrypted is divided into blocks of equal length.

3. PROPOSED WORK

ISSN: 2231-5381 http://www.internationaljournalssrg.org

Page 322

International Journal of Engineering Trends and Technology- Volume3Issue3- 2012


Symmetric key cryptography refers to

In

the

shift

rows

()

encryption methods in which both the sender and

Transformation, the bytes in the last three rows

receiver share the same key (and, less commonly, in

of the state are cyclically shifted over different

which their keys are different, but related in an easily

number of bytes. The first row will not get

computable way) [1]. The modern study of

shifted.

symmetric ciphers relates mainly to the study of


block ciphers and stream ciphers and to their

c) Mix Column Transformation

applications. A block cipher take as input a block of

In

mix

column

()

plaintext and a key, and output a block of cipher text

Transformation. The columns of the state are

of the same size. Since messages are almost always

considered as polynomial and then multiplied by

longer than a single block, some method of knitting

modulo with fixed polynomial individually.

together successive blocks is required. Several have


been developed, some better security in one aspect or

d) Add Round Key Transformations

another than others. They are the mode of operations


which must be carefully considered when using a
block cipher in a crypto system.

In the Add Round Key ()


Transformation, a round key is added to a state
by a simple bitwise XOR operation. Each round

Rijndael algorithm is one of the AES (Advanced

key consists of Nb words from the key schedule

Encryption Standard) algorithm used for data

those Nb words are each added into the columns

encryption technique. It is a block cipher algorithm in

of the state.

which the block means the information to be

3.1 Encryption and Fuzzification

encrypted is divided into blocks of equal length. It is


an integrated block cipher, with a variable block

3.1.1 The feasibility of the application of fuzzy

length and variables key lengths [2]. Internally, the

set theory in encryption

AES algorithms operations are performed on a two


dimensional array of bytes called the state. The state
consists of four rows of bytes, where Nb is the block
length divided by 32. The function of AES Rijndael
is as follows

To the secrecy evaluation on


communication between various networks, it is
concerned with the secrecy, the working effect of
secret regulatory authorities and with the
economic interests of the evaluated objects. The
quality of the secrecy evaluation not only affects

A) Sub Bytes Transformation

the message that is transmitted between the


The

subBytes

()

Transformation is a non-linear byte substitution


that operates independently on each byte of the
state using a substitution table.
B) Shift Rows Transformation

nodes. In the traditional process of encryption


evaluation mainly the experts studied the
security system of evaluated enterprises by the
findings. Finally, they evaluate enterprises on the
basis of the total points.

ISSN: 2231-5381 http://www.internationaljournalssrg.org

There are a lot of

Page 323

International Journal of Engineering Trends and Technology- Volume3Issue3- 2012


uncertainty and fuzziness in the course of this

put into matrix formation, get the fuzzy

evaluation. For example, the fuzziness and

membership matrix.

difficult to quantify the indexes. Therefore, the


For the decryption of the text again

fuzzy set theory and method were introduced in


the secrecy evaluation. It is the organic
combination of quantitative and qualitative
evaluation, so the secrecy censorship evaluation

the matrix transpose formation is created. The


following steps are taken place in the decryption
process retrieve the encrypted data from the
remote

becomes more scientific and realistic.

system. Convert

the matrix

with

encrypted text into matrix transpose formation.


The fuzzy evaluation score is now received.
After the retrieval of the data the decryption
process is taken place by use the symmetric key
algorithm. This file is compared with the original
data for processing. A t the end of the process the
original data can be retrieving and the data can
be transferred between the users without any
modifications.
4. EXPERIMENTAL RESULTS
The proposed system will ends in the

3.1.2 Fuzzification of data by using

encryption and the fuzzification of the user

Matrix Transformation

defined text. In the following figure-1 show that


the files to be encrypted have to be loaded. In the

In this paper, we propose a new

second figure-2 the symmetric key for the text to

method to transmit the data over the network.

be encrypted is given and saved. As the third

The communication involves the encryption of

step the figure-3 shows that the saved key file

data before pass it to the receiver. For the data

and the original file for decryption. In the figure-

encryption the key is generated using the AES

4 the conversion as matrix is taken place after the

standard algorithm, which is symmetric. Then,

encryption

store the encrypt file in the memory for

transformation will provide the security and the

comparing

authentication so that the intruders cannot able to

for

later

process.

The

matrix

transformation is the next step in this process.

of

the

text.

This

matrix

know the transformation of the text.

For the matrix conversion the ASCII value of the


encrypted text is considered. The conversion
ends in the binary coded value which is in ones
and zeros. After this step, get the encrypted data

ISSN: 2231-5381 http://www.internationaljournalssrg.org

Page 324

International Journal of Engineering Trends and Technology- Volume3Issue3- 2012

Fig-1

Fig-4

5. CONCLUSION
In this paper, a symmetric cryptosystem is

Fig-2

introduced, enhancing a new method to encrypt


the user defined text that eliminates the random
and man-made factors of secrecy evaluation to
the maximum. It plays an important role in
enrichment and development of multi-object
evaluation technique, which raises the secrecy
level. Each block of the data is encrypted using
symmetric key rounds which then will also get
the matrix conversion. This work is done using
Rijndael cryptography symmetric algorithm for
encryption/decryption. Hence the matrix form of
data consists of only the binary values of the
original

Fig-3

data.

This

will

eliminate

the

modification of the data by the intruders.

ISSN: 2231-5381 http://www.internationaljournalssrg.org

Page 325

International Journal of Engineering Trends and Technology- Volume3Issue3- 2012


6. REFERENCES
[1] Dr. Brian Gladman, Rijndeal (by Joan Daeman & Vincent
Rijmen), A Specification for the AES Algorithm, 15 April
2003.
[2]J.Daeman
and
V.Rijndael,
http://www.esat.kuleven.ac.be/rijmen/rijndael/rijndaelv2.zip,1999.
[3]B.Gladman, A Specification for Rijndael, the AES
Algorithm,
May
2003http://fp.gladman.plus.com/cryptography_technology/Ri
jndael.aes.spec.311.pdf
[4] Hexiong Yang, Chongwen Li, Fuzzy Mathematics and Its
Application, Tianjin: Tianjin Science & Technology
Publishing House, 1990.37-101.
[5]Le Luo, A method of quality evaluation of hydropower
project based on fuzzy mathematics. Journal of Huazhong

BIOGRAPHY:
Ms.N.Kavinilavu

University of Science and Technology (Natural Science


Edition), 2004, 32(08); 82-84.
[6]V.Potdar and E.chang,Disguising text cryptography,
International Network Conference in Plumouth, Uk, 6-9 July,
2004.
[7] Shafi Golgwasser Mihir Bellare, Lecture Notes on
Cryptography, July 2008.
[8] William Stallings, Cryptography and Network Security,
Fourth Edition, June 3, 2010.
[9]U.S.Loses Focus on Fuzzy Logic (Machine Design,
June 221, 1990)..
[10]Fuzzy Sets and Applications: Selected Paprsby L.A
Zadeh, ed. R.R Yager et al. (John Wiley, New York, 1987).

Ms.N.KAVINILAVU is a Research scholar in the


Department of Computer Science and Engineering,
Alagappa University, Karaikudi, Tamilnadu, India.
She has received her M.Sc in Information
Technology from Alagappa University, Karaikudi,
Tamilnadu in the year of 2011. She has presented her
work in International and National level conferences.
Her areas of research interests include Network
Security.

Dr.S.S.Dhenakaran
Prof.Dr.SS.DHENAKARAN is working as an
associate professor in the department of Computer
Science and Engineering Alagappa university,
karaikudi,Tamilnadu. He has received his Ph.d in
Computer Science and Engineering from Alagappa
University, karaikudi, Tamilnadu. He has published
many papers in international journals and presented
in the national and international conferences.

ISSN: 2231-5381 http://www.internationaljournalssrg.org

Page 326

You might also like