International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February, 2013) 648 An NTRU Scheme for Secure Transaction in Grid Implementation Shaik Rabbani 1 , Rakesh Nayak 2 , Dr. J. Pradhan 3 1 Student, Sri Vasavi Engineering College, Tadepalligudem, West Godavari (dt), 2 Assoc. professor, Sri Vasavi Engineering College, Tadepalligudem, West Godavari (dt), 3 Professor, Department of Computer Science, Behrampur University, Odisha, India Abstract-- Grid computing architecture was defined to be a complete physical layer. Shared data systems have grown in numbers and hence they are susceptible to many security challenges. We proposed the encryption algorithm, i.e., N-th degree truncated polynomial ring (NTRU) in every grid node to keep the information in security. Sender requests key code from receiver node. By using this key code, sender encrypt message using N-th degree truncated polynomial ring (NTRU) schema to produce cipher text and sent out. The receiver once received proceeds to decrypt the cipher text and gets back the original message from the received text. To decrypt the message, same key code is used by receiver. The key code is kept in both sides or globally at server. An NTRU 251-bit encryption key, has cryptographic strength equivalent to renowned powerful 1024-bit RSA key. We propose to replace any secure Scheme with a more robust NTRU crypto system. KeywordsGrid Computing, NTRU, cryptography, cryptosystem, OGSA, public key cryptosystems, MPI. I. INTRODUCTION Programmers and researchers need an interoperable, synchronous and reliable working environment to develop high performance applications. It is difficult to run MPI (message passing interface) enabled applications on Grids where availability of different type of resources[3] keeps changing. Moreover, available MPI implementations are least concerned about the security of resources and user processes because it increases communication overheads for clusters. Therefore, it is still a challenge to provide a facility of secure message passing without losing the performance. For Grids, security is an essential component for message passing over Internet. Security components [1] are an important part of the implementation of all Grids and peer-to-peer computing middleware to provide secure communication [4]. In this paper, we use different encryption [5] data table to encrypt the message to produce cipher text. We use key code to insert encryption data table to cipher text. The encryption data table is different key code from receivers, use the agreeable key code of receiver to encrypt the message, and send the encrypted message to the receiver. The receiver also uses this code to decrypt the encrypted message. Because the key code is only known by sender and receiver, it is more secure. By using the proposed scheme, we can process message more secure. For encryption and decryption, NTRU [10] mechanism is implemented which has cryptographic strength equivalent to renowned powerful 1024-bit RSA key. II. RELATED WORK Since the security models for MPI are not many and proposed model is closer to Grid [2] like, therefore, in research review GRID security models are also included. This section covers the literature review of existing MPI and Grid security models [6]. The security of MPI is critical. MPI applications over Internet require an extensive range of security policies because of the open nature of Internet some of the infrastructures [7,8] . A safe message passing of processes is a defined feature of MPI but both MPI and MPI-2 do not address the security policies on the wide spectrum for distributed HPC applications. There is not enough work carried out for secured MPI, though, there are many implementations of MPI and MPI-2 available. The general approach to improve security of MPI applications may allow application programmers themselves to include message confidentiality that reduces portability and flexibility. On the other hand, the MPI interface can be extended for APIs, like MPI Sec I/O. MPI Sec I/O supports message passing with data confidentiality and programmers can manually set the required encryption rules. However, if a programmer does not set up encryption and decryption rules carefully in the code, it is possible that some data is stored without encryption or read without decryption. Furthermore, it is not compatible with non-secure MPI libraries that make preceding programs non-functional unless they are updated according to the extended libraries.