A Spatial Crypto Technique for Secure Data Transmission

Abstract

his paper presents a spatial encryption technique for secured transmission of data in networks. The algorithm is designed to break the ciphered data packets into multiple data which are to be packaged into a spatial template. A secure and efficient mechanism is provided to convey the information that is necessary for obtaining the original data at the receiver-end from its parts in the packets. An authentication code (MAC) is also used to ensure authenticity of every packet. Security of network communications is the most important issue in the world. Information transactions related to banks, credit cards, and government policies are transferred from place to place with the help of network transmission. The high connectivity of the World Wide Web (WWW) has left the world ‘open’. Such openness has resulted in various networks being subjected to multifarious attacks from vastly disparate sources, many of which are anonymous and yet to be discovered. This growth of the WWW coupled with progress in the fields of e-commerce and the like has made the security issue even more important [1-5]. In practice, in a computer network, data is transferred across the nodes in the form of packets of fixed or variable sizes. In usual practice, the implementation is done by some secured algorithms at the application level on the data and the enciphered data is packetized at lower levels (in the OSI architecture) and sent. Any intruder able to obtain all the packets can then obtain the enciphered data by appropriately ordering the data content of each of these packets. Then, efforts can be made to break the secured algorithm used by the sender. In the process of transmission, if it is possible to prevent any information release as to the structure of the data within the packets, an intruder would know neither the nature of the data being transferred nor the ordering of the content from different packets. This is what our algorithm achieves by using a genomical spatial envelope. We have used genomic steganography in enhancing the security in the algorithm. We use the concept of Message Authentication Code (MAC) as suggested in [Rivest, 1998] to authenticate messages. For a packet of data, the MAC is calculated as a function of the data contents, the packet sequence number and a secret key known only to the sender and the receiver, and then it is appended to the packet. On receiving a packet, the receiver first computes the MAC using the appropriate parameters, and then performs a check with the MAC attached to the packet. If there is no match, then the receiver knows that the packet has been tampered with. A detailed explanation is provided in the next section.

Authors and Affiliations

SK Sarif Hassan, Pabitra Pal Choydhury, Soumalya Ghosh

Keywords

Related Articles

FDA Approvals of Medical Devices Under the De Novo Automatic Class 3 Regulations: An Opinion

The new FDA class 3 automatic medical devices regulations were recently introduced to meet criticism of all sides on the past regulations. An evolving Essure scandal accelerated the launching of this ambitious new plan....

Treatment of Fingertip Gangrene in a Patient with Raynaud’s Phenomenon who Simultaneously Underwent Gastrectomy and Chemotherapy for Gastric Carcinoma: A Case Report

Raynaud’s phenomenon, characterized by recurrent vasospasm in the fingers and toes, is a common clinical disorder encountered by dermatologists. Hand-arm vibration syndrome is well known to cause secondary Raynaud’s phen...

Peripheral Hypertension-How to Normalize Pressure and the Pulse with no Medications in Several Days with the Clavitherapy Method?

The molecular method of biocybernetic clavitherapy has been liquidating hypertension remarkably effectively with no medications since the 40s. With child’s ease in minutes by simple procedures you can yourselves with no...

Non-Spanning Syringe Distractor: An Alternative Technique for Fracture Distal End Radius Fixation for Rural Areas of Developing Countries with Limited Resources

Introduction: Operative fixation of distal radius fractures is one of the most commonly performed orthopedic procedures. Though external fixator is a well-established method of treatment for unstable and comminuted fract...

Organophosphate Pesticide Exposure and Glucose Homeostasis

Present review discusses the organophosphate (OP) pesticides toxicity with associated hyperglycemia in animal as well as human studies and effect of OP pesticide on liver enzymes involved in glucose homeostasis pathways....

Download PDF file
  • EP ID EP566609
  • DOI 10.26717/BJSTR.2017.01.000107
  • Views 229
  • Downloads 0

How To Cite

SK Sarif Hassan, Pabitra Pal Choydhury, Soumalya Ghosh (2017). A Spatial Crypto Technique for Secure Data Transmission. Biomedical Journal of Scientific & Technical Research (BJSTR), 1(1), 22-27. https://europub.co.uk/articles/-A-566609