600 likes | 1.54k Views
Data Security Using TDMRC Code. Dr. Varghese Paul Head, Information Technology Department Cochin University of Science and Technology. How data security is achieved ? - Access Control Methods - Encryption Methods.
E N D
Data Security Using TDMRC Code Dr. Varghese Paul Head, Information Technology Department Cochin University of Science and Technology T0C-H Institute of Technology
How data security is achieved ? - Access Control Methods - Encryption Methods T0C-H Institute of Technology
Access Control can be by - Password Matching - Biological Identification - FirewallMethods T0C-H Institute of Technology
Encryption can be Symmetric Key Type Asymmetric Key Type T0C-H Institute of Technology
Again Encryption may beby SubstitutionbyTransposition T0C-H Institute of Technology
Substitution may be Mono Alphabetic Type Poly Alphabetic Type (Multiple Type) T0C-H Institute of Technology
TDMRC CodeTime Dependant Multiple Random Cipher Code T0C-H Institute of Technology
ASCII consists of 8 BITs and 256 ( 2 8 ) characters are possible in itUNICODE consists of 16 BITs and 65536 ( 2 16 ) characters are possibleTDMRC Code consists of 8.58 x 10 506 codes and each code can have 256 characters, each character is represented by 8 BITs T0C-H Institute of Technology
Factors that helped me in developing TDMRC Code. Field Experience in SCADA Systems Teaching experience in Fault Tolerant Computing Teaching experience in Cryptography and Data Security Library functions for Random Number Generation in computer languages T0C-H Institute of Technology
256 Characters in ASCII can be arranged in 256 ! ways.Or we can say 256 ! different codes are possible.TDMRC Code consists of all these 256 ! codes, and each code consisting of 256 characters.ASCII is one among these 256 ! codes. T0C-H Institute of Technology
So we can sayTDMRC Code is Mega Extended ASCII Codeand TDMRC Code consists of 256 Real Characters and 256 x 8.58 x 10 506Virtual Characters T0C-H Institute of Technology
Let us find the actual value of 256 ! T0C-H Institute of Technology
256 ! =8.57817775342842654119082271 x 10 506================================================ T0C-H Institute of Technology
Suppose TDMRC Code is printed in book form such that each code takes one page and 200 pages forms one cm thickness of the book.Now let us assume that this book is stored in TDMRC CODE Reference Library T0C-H Institute of Technology
TDMRC CODE Reference LibraryAssume a very big room which can inscribe the planet earth. Inner dimensions of that room will be 12739 k m T0C-H Institute of Technology
TDMRC CODE Reference LibraryAssume full height racks with a shelf space of 45 cmare arranged with 2 metre space in between T0C-H Institute of Technology
TDMRC CODE Reference LibraryNumber of rooms required 8.58 x 10 506 x 45 x 10 - 5 x 2 x 10 - 3 = --------------------------------------------------------------------------------------- 200 x 100 x 1000 x 12739 x 12739 x 12739 = 4.15 x 10 479 ===================== T0C-H Institute of Technology
TDMRC CODE TDMRC CODE TDMRC CODE Suppose I distribute the whole TDMRC code among the whole 700 crore population in the world to memorise by equal sharing, then the number of codes each individual has to memorise is8.58 x 10 506 / 700 x 10 7 = 1.22 x 10 497 T0C-H Institute of Technology
TDMRC CODE TDMRC CODE TDMRC CODE If average age of an individual is 45 years and everybody try to memorise TDMRC Code from the moment he is delivered to this earth, number of code each individual has to memorise in one second is = 1.22 x 10 497 / ( 45 x 365 x 24 X 60 x 60 ) = 8.65 x 10 487 T0C-H Institute of Technology
TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRCTDMRCTDMRC TDMRC TDMRC TDMRCTDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRCT DMRC TDMRCTDMRC TDMR D MRC TDMRC TDMRC TDMRCTDMRC TDMRC T0C-H Institute of Technology
TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT T0C-H Institute of Technology
Data Security Using TDMRC Code T0C-H Institute of Technology
REAL TIME SYSTEMSAny system where a timely response by the computer to external stimuli is vital is a Real Time System. Real Time Systems must satisfy explicit response time constraints or risk severe consequences including failure. T0C-H Institute of Technology
A system is considered FAULT TOLERANTif the behaviour of the system, despite the failure of some of its components, is consistent with its specifications. Fault Tolerant Systems have the capability to function in the presence of fault. Redundant systems are used for achieving this quality. When redundant systems are used consistency of data among various systems is of prime importance. The available data and the processed output should be compared between various redundant systems at frequent intervals. T0C-H Institute of Technology
When the redundant systems are located at geographically distant places this comparison is to be done by transmitting data and output through communication links between various constituent systems. The rate of data transmission should also be high. These communication channels are to be well protected against intruders especially when the system is used for strategic applications like military, aerospace research, nuclear research etc. T0C-H Institute of Technology
Since Fault Tolerant Hard Real Time Systems are widely used in high tech warfare also, the chance of intrusion and risk of forced leakage of confidential information is very high in this field. To ensure correct data reception there exist many error checking and error correcting codes. But for security from eves droppers it is better to use encryption techniques in this kind of networksso that the actual information can be kept away from the intruders even if they manage to gain access to the communication channel. T0C-H Institute of Technology
Detailed study conducted on data encryption techniques lead to the development of a new data encryption method named Time Dependant Multiple Random Cipher Code ( TDMRC Code ).This particular method has many complexities compared to other methods and cryptanalysis is practically impossible.This method is a product code which uses variable block length where as the conventional methods are of fixed block length. T0C-H Institute of Technology
The code used for any particular character differs depending upon time – that is, coding is TIME DEPENDANT. Even for centi second difference, the codes will change. The code used for the same character at different locations of the plain text are different – that is, code is POLY ALPHABETIC (MULTIPLE) . Also, Pseudo Random Number generation technique is used for code generation. T0C-H Institute of Technology
Vulnerability check of the proposed system was carried out during the course of the work.Students, researchers and professionals were involved in the checking. A global contest with a reward of 1,00,000 rupees was arranged to check the computational security and vulnerability of the proposed scheme. T0C-H Institute of Technology
Real Time Systems can be classified into two categories – Soft Real Time Systems and Hard Real Time Systems. In Soft Real Time Systems performance is degraded but not destroyed by failure to meet response time constraints Whereas in Hard Real Time systems failure to meet response time constraints will lead to failure of the system itself. T0C-H Institute of Technology
Using TDMRC Code for Encryption T0C-H Institute of Technology
Any Multimedia Data can be treated as a chain of binary BITs.It can be further treated as chain of 8 BIT blocks and each 8 BIT block as an ASCII character. T0C-H Institute of Technology
These chain of ASCII characters can be transliterated to corresponding characters of another TDMRC Code such that the ASCII value of the original character and that of the TDMRC Code character are the same.Now the Cipher Text is ready T0C-H Institute of Technology
ENCRYPTION USING TDMRC CODE PLAIN TEXT TRANSLITERATION To TDMRC Code CIPHER TEXT THE QUICK BROWN FOX JUMPED OVER 7b3{j2msk;4o!*x/~/?A+Kn8q>5g5h@_0f+# T0C-H Institute of Technology
DECRYPTION USING TDMRC CODE CIPHER TEXT REVERSE TRANSLITERATION To ASCII Code PLAIN TEXT 7b3{j2msk;4o!*x/~/?A+Kn8q>5g5h@_0f+# THE QUICK BROWN FOX JUMPED OVER T0C-H Institute of Technology
10101101100001010111 11101011011000010101 Chain of 8 BIT ASCII TRANSLITERATION To TDMRC Code Chain of 8 BIT TDMRC ENCRYPTION USING TDMRC CODE T0C-H Institute of Technology
Decryption can be done by Reverse Transliteration from TDMRC Cipher Text to ASCII So we will get back the Plain Text T0C-H Institute of Technology
11101011011000010101 10101101100001010111 Chain of 8 BIT TDMRC REVERSE TRANSLITERATION To ASCII Chain of 8 BIT ASCII DECRYPTION USING TDMRC CODE T0C-H Institute of Technology
Now the Problem ishow we can specify which TDMRC code out of 8.58 x 10 506 codes was used for transliteration and what was the arrangement of 256 characters in that particular TDMRC code. T0C-H Institute of Technology
Key of TDMRC Code T0C-H Institute of Technology
Mandatory Requirement of Practical Encryption Systems - high level of security - comprehensive and transparent specification - security may not rely on secrecy of algorithm - available and accessible to all users - suitable for a variety of applications - low cost implementation - able to be exported - accessible for validation. T0C-H Institute of Technology
Key of Gregorian Calendar of 2008 T0C-H Institute of Technology
256, 240, 251, 361 T0C-H Institute of Technology
2 5 6 , 2 4 0 , 2 5 1 , 3 6 1 Add date value to the digit corresponding to month. Divide this sum by 7 and find the remainder If remainder is 1 – Sunday 2 - Monday 3 – Tuesday 4 – Wednesday 5 – Thursday 6 – Friday 0 - Saturday T0C-H Institute of Technology
TDMRC Coding System can be treated as a lock which needs more than one key to lock and open.Keys are to be used one after the other T0C-H Institute of Technology
2 1 T0C-H Institute of Technology
Complexities in TDMRC CodeTime Dependant CodeMultiple Code ( Poly Alphabetic Code ) Random Code T0C-H Institute of Technology
TDMRC follows symmetric key method and uses less complex mathematical operations compared to any other schemes. It is a substitution coding system.This method uses variable block length depending upon PAC where as the conventional methods are of fixed block length. And since many complexities are simultaneously incorporated TDMRC is a Product Code and cryptanalysis is practically impossible. Though it is designed for use in communication channels of FTHRT system, it can be used for any other applications which requires data security T0C-H Institute of Technology
Key of TDMRC CodeConsists of 3 elementsMaster Key derived from the Real Time Clock.It is an 8 digit number obtained by combining the values of hour, minute, second and centi second.Poly Alphabetic Coefficient ( PAC ), PIt is the number of codes simultaneously used for any character in an encrypting session.P number of 4 digit Sub Keys T0C-H Institute of Technology
Algorithm of TDMRC Code T0C-H Institute of Technology