Document Sample
IJETTCS2012-05-17-016 Powered By Docstoc
					      International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
       Web Site: Email:,
Volume 1, Issue 1, May-June 2012                                               ISSN 2278-6856

    Static IP Address based Asymmetric Algorithms
                                             M.Jayakumar1, Dr. T.Christopher2
                                                      Ph. D Scholar (CS)
                                                   Dept. of Computer Science
                                              Government Arts College, Udumalpet
                                                   Assistant Professor & Head
                                                  Dept. of Computer Science
                                              Government Arts College, Udumalpet

Abstract:      Interconnected collection of autonomous              2. CRYPTOGRAPHY
computers called computer network. Most of the computer             Network Security & Cryptography is a concept to protect
users participated in internet or intranet users. Network           our network and data transmission over wireless network.
technologies included the function of exchange the                  Data Security is the main aspect of secure data
information, data, application, and files are stored, modified      transmission over unreliable network. Data Security is a
and deleted .This stage most important factor is to secure the
                                                                    challenging issue of data communications today that
information store by a user. Data’s safety is most important
                                                                    touches many areas including secure communication
factor in the processes. Network security involves all activities
that organizations, enterprises, and institutions undertake to
                                                                    channel, strong data encryption technique and trusted
protect the value and ongoing usability of assets and the           third party to maintain the database. The rapid
integrity and continuity of operations. Unauthorized access is      development in information technology, the secure
main challenge of network security. Asymmetric algorithms           transmission of confidential data herewith gets a great
are used as fundamental techniques for assuring                     deal of attention. The conventional methods of encryption
confidentiality and integrity of data used in financial             can only maintain the data security. The information
transactions and for authenticating entities involved in the        could be accessed by the unauthorized user for malicious
transactions. Asymmetric algorithms to use data security of         purpose. Therefore, it is necessary to apply effective
encrypted and decrypted message network security. The main          encryption/decryption methods to enhance data security.
objective of this procedure is to avoid unnecessary                 Cryptography terms like codes and ciphers. Though many
“unauthorized access” to providing security through
                                                                    used both codes and ciphers interchangeably, but they are
Asymmetric algorithms key generate using Static IP address.
                                                                    not the same. Users write a message with you own
                                                                    language, it is just a plaintext. If users want to make you
Keywords: Network security, Cryptography, Asymmetric
                                                                    plaintext message to make unintelligible to anyone other
algorithms, internet service Provider, Static IP address.
                                                                    than us, then user use a cryptographic algorithm to
                                                                    encrypt the message. Actually, cryptographic algorithms
                                                                    encrypt a plaintext message into a cipher text message.
1. INTRODUCTION                                                     Now, if user send that message to a person he can only
The networks are computer networks, both public and                 read the message if he uses the same algorithm to decrypt
private, that are used every day to conduct transactions            it.
and communications among businesses, government
                                                                        2.1 Asymmetric algorithms
agencies and individuals. Networking technologies useful
for easy way of information exchange and stored process             Asymmetric algorithms two keys-public and private- used for
by users, and also reduced cost, storage unit is low and            encryption and decryption. Public key is shared to all, and
avoid duplicate‘s. User’s stored information and data               each member of a group had his own private key, which is
security is most important. That stage how to secure the            only known to him. Normally, the public key is used to
information and avoid unauthorized access in our data’s             encrypt the message and private key is used to decrypt the
and timing is more important. ``Unauthorized access'' is a          message. The pair combination of public and private key is
very high-level term that can refer to a number of                  unique. If a public key is known to outsider also, he cannot
different sorts of attacks. The goal of these attacks is to         decrypt the message because he does not have the other side
access some resource that user machine.LAN traffic is               of the decryption key-the private key-which never being
spoiled network users useful times. To secure network               transmitted in the network, always remains inside a
and avoid unauthorized access, data security is to be               computer. So, the thing his if you encrypt a message with the
discussed at this stage.

                                                               - 53 -
     International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
       Web Site: Email:,
Volume 1, Issue 1, May-June 2012                                               ISSN 2278-6856

public key and send it to your friend via Internet, then only
your friend’s private can open this message, no one else in
this world. Asymmetric algorithms making a public key
encryption system an extremely efficient and confidential
crypto system of the world.
Plaintext     (data)>cryptographic       system>       cipher
text…media….cipher text>decryption algorithm>plaintext

       Figure 1 Decryption-Encryption [5]
                                                                                  Figure 2 ISP Architecture
  2.2 Asymmetric algorithm contents
                                                                   3.1 Importance of Static IP address

     Key pair sets                                                  •    Web server's directly on user site that require external

     Public key is available to all, only private key need to       •    E-mail server's directly on user site that require
       be secured.                                                        external access

     Scalable algorithm                                             •    FTP server's directly on user site that require external

     Used for small amount of data encryption, digital              •    DNS server's directly on user site that require external
       signature, digital certificate (CA)
                                                                     •    Application access requires external access
     It provides Integrity, authenticity, non-repudiation
                                                                     •    Incoming Video or Audio services

                                                                 4. KEY GENERATE USING STATIC IP
An ISP is a company that supplies Internet connectivity to
home and business customers. ISPs support one or more             Asymmetric-key existing          encryption,    public-key
forms of Internet access, ranging from traditional modem         encryption uses two different keys at once a combination
dial-up to DSL and cable modem broadband service to              of a private key and a public key. The private key is
dedicated lines. An ISP has the equipment and the                known only to your computer, while the public key is
telecommunication line access required to have a point-          given by your computer to any computer that wants to
of-presence on the Internet for the geographic area              communicate securely with it. To decode an encrypted
served. The larger ISPs have their own high-speed leased         message, a computer must use the public key, provided by
lines so that they are less dependent on the                     the originating computer, and its own private key.
telecommunication providers and can provide better               Although a message sent from one computer to another
service to their . ISP is used as an abbreviation for            won't be secure since the public key used for encryption is
independent service provider to distinguish a service            published and available to anyone, anyone who picks it up
provider that is an independent, separate company from a         can't read it without the private key. The key pair is based
telephone company.                                               on prime numbers (numbers that only have divisors of
                                                                 itself and one, such as 2, 3, 5, 7, 11 and so on) of long
                                                                 length. This makes the system extremely secure, because
                                                                 there is essentially an infinite number of prime numbers
                                                                 available, meaning there are nearly infinite possibilities
                                                                 for keys.

                                                          - 54 -
      International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
       Web Site: Email:,
Volume 1, Issue 1, May-June 2012                                               ISSN 2278-6856

An Example key generation of the RSA Algorithm                           Table 2 Goals of IP using Algorithms
P = 61 <= first prime number(destroy this after computing E
and D)                                                             Privacy            Information must be kept from
Q = 53 <= second prime number(destroy this after computing                            unauthorized parties
E and D)
PQ = 3233 <= modulus (give this to others)
E = 17 <= public exponent (give this to others)                    Integrity          Message must not be altered or
D = 2753 <= private exponent (keep this secret!)                                      tampered with

Your public key is (E, PQ).                                        Authentication     Sender and recipient must
Your private key is D.                                                                prove their identities to each
The encryption function is: encrypt (T) = (T^E) mod PQ
                        = (T^17) mod 3233                          Non-repudiation    Proof is needed that the
                                                                                      message was indeed received
The decryption function is: decrypt(C) = (C^D) mod PQ
                        = (C^2753) mod 3233
In this Stage use to private key senders static IP and
Public key use to receivers Static IP verify process is        Static IP address is a constant, The format of static IP
easily and more secured.                                       address is easy identification receiver, sender’s IP address
                                                               (any doubt) gets and put their IP address ip2location .com
            Table 1 Comparsion of algorithms                   and      get senders identify geographical location, i.e.
                                                               country, region, city, latitude, longitude, ZIP code, time
                                                               zone, connection speed, ISP and domain name, IDD
      Existing algorithm       IP using Algorithm
                                                               country code, area code, weather station code and name.
    Key genration use          Using constant Static           This way of approach to easily server and client prove
    Prime numbers and          IP address is simple            their identities. Non- repudiation gives assurances to the
    some formula                                               receiver of a message that it actually came from the
                                                               sender and no one is faking the identity of the sender.
    It provides Integrity,     It Provides Privacy,            This function of cryptography is provided with static IP
    authenticity,    non-      Integrity, authenticity,        address using Asymmetric algorithm only.
    repudiation                non-repudiation

    Public key is available    Both     keys     using         6. CONCLUSION
    to all, only private key   senders,receivers static
    need to be secured.        IP address                      Today the worldwide activities of various organizations,
                                                               enterprises and institutions, general agencies and
                                                               individuals are through network. The most important
                                                               security to be given during communication is
                                                               “unauthorized access”. It is a very high level term refers
                                                               to a number of difficult sorts of attacks. The goal of these
                                                               attacks is to access important and valuable resources from
                                                               other machines. Hence network security pays an
                                                               important role to product and prevents the unwanted
                                                               access by other users, must be avoided in time. In this
                                                               procedure the main objectives is how to avoid
                                                               • Unauthorized access of data
                                                               • Duplicates
         Figure 3 Static IP using Key generation               • Hacking of password
                                                               • Data loss
5. GOALS OF STATIC IP USING ASYMMETRIC                         and finally to secure the information to using Asymmetric
ALGORITHMS                                                     algorithms(key generate using Static IP) also a new and
Every cryptography has four basic goals integrity,             vital approach in network security. Static IP address using
authentication and non-repudiation. Static IP using            Asymmetric algorithms is a highly secured measure,
Asymmetric algorithm ensures that these four goals are         which ultimately reduces the unauthorized access to the
met.                                                           maximum.

                                                          - 55 -
     International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
       Web Site: Email:,
Volume 1, Issue 1, May-June 2012                                               ISSN 2278-6856

[1] Dr.      Prakash      Ambegaonkar,“Internet/Intranet
    Security.” IEEE/ ACM Networking. December 2003
[2] E.J.McGowAn,“Intranet security 2003”,Software
    Development. April Ferguson, Niels, and Schneier,
    Bruce – “Practical Cryptography”, Wiley, 2003,
    ISBN 0- 471- 22357-3
[3] Blake I, G. Seroussi and N. Smart (eds).”Advances in
    Elliptic Curve Cryptography” , Cambridge University
    Press, 2005
[4] Trappe, W. and Washington, L. 2006. “Introduction
    to Cryptography with Coding Theory”,Second
    Edition. Prentice Hall.
[5] K. DoHyung, L. Jaeyeon, Y. Ho-Sub, “A Non-
    Cooperative User Authentication System in Robot
    Environments”, IEEE Transactions on Consumer
    Electronics,Vol. 53, No. 2, pp. 804-811, 2007

                 M. JAYAKUMAR MCA M.Phil,
                 seven years worked as a programmer in
                 Bannari Amman Spinning mills. Now
                 he is Pursuing PhD in computer science
                 at     Government     Arts    College-
                 Udumalpet-Tirupur (Dist), Tamilnadu-

                 Dr.T.Christopher M.Sc.,M.Ed., MCA
                 M.Phil(Phy), M.Phil(CS), Ph.D is
                 presently working as assistant professor
                 & Head, Dept of Computer Science,
                 Government Arts College ,Udumalpet
                 Tirupur(Dist)-642 126,Tamilnadu,India
(affiliated to Bharathiyar university, Coimbatore).He has
published many papers in international/national Journals;
his area of interest include Software Engineering, Data
mining, Network security. He has to credit 21 Years of
Teaching and research experience

                                                       - 56 -

Shared By: