International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075, Volume-8 Issue-12, October 2019
2467
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number: L34231081219/2019©BEIESP
DOI: 10.35940/ijitee.L3423.1081219
Abstract: —In today’s world, secured communication is what
every field wants. But due to the escalation of theft and
unauthorized access to the data, the need for new encryption
algorithms has also gone high. This paper proposed a hybrid
encryption scheme which uses ElGamal key exchange algorithm
and Genetic algorithms. In this scheme, the users share seventeen
16-bit keys, random in nature, using the ElGamal algorithm,
which is used to calculate a shared key. Along with this shared key
and MAC(Medium Access Control) addresses of both sender and
receiver(MAC is used as it is a unique identifier attached to a
network adapter or system), a final key is generated through a
10-round algorithm. Further, this final key is used for data
encryption using Genetic algorithms. A new key is generated for
each communication session between sender and receiver. The
proposed technique shows that it is resistant to most of today’s
known and common attacks.
Keywords: Identity-Based Encryption, Genetic Algorithm,
Mutation, Crossover.
I. INTRODUCTION
The information security has become a crucial, important
and imperative issue in applications of information exchange.
It is becoming more important due to the increase in laptops
and other computing devices, growth and advancement in
technologies, various network technologies and huge quantity
of data in the form of digital information. Therefore, to shield
the valuable information from unauthorized users’ various
varieties of cryptanalytic schemes are developed and applied
in existing systems. Cryptography,’kryptos’ in Greek, means
’Secret Writing’. It is defined as the art (sometimes as science)
of transforming messages into unreadable form to make them
secure and immune to various attacks. The original message,
which is willing to send by sender from its end is plain text
while the coded or encrypted message is cipher text, send to
receiver. The method used to change the plain text to
encoded/cipher message is ciphering or encryption while the
reverse is called as deciphering or decryption method. The
filed of study belons these techniques to ensure the security of
Revised Manuscript Received on October 05, 2019.
* Correspondence Author
Darpan Anand*, Associate Professor, Department of Computer Science
Engineering Chandigarh University, Chandigarh, India. Email:
darpan.anand.agra@gmail.com
Jeetendra Pande, Assistant Professor, Department of Computer
Science, Uttarakhand Open University, Haldwani-263139, India. Email:
jpande@uou.ac.in
Udit Maheshwari, Hindustan Institute of Technology and Management,
India. Email: maheshwariudit29@gmail.com
the message is called as cryptography. The major types of
cryptography techniques are public key cryptography, key
escrow cryptography, translucent cryptography, symmetric
key cryptography, and ID-Based Cryptography. One of the
vulnerabilities of these techniques are due to the key, which is
used for encryption and decryption. [1]-[3] Shamir introduced
the solution to handle the problem of key by the concept of
identity-based(Id-Based) cryptography [4]. In this technique,
the person is able to deduce the public from the public
information of user which are uniquely identified like email,
phone number, SSN(In case of USA, etc.), AADHAR(in case
of India). The major benefit of using Id-based
Encryption(IBE) is that it does not need any certificates to
bind the users’ names with their public keys. The first
practical and provably secure ID-based encryption scheme
was proposed by Boneh and Franklin in 2001 [5]. Since then,
IBE has undergone quite rapid development and a lot of
schemes have been proposed [6]-[9]. The most difficult or
most vulnerable area in information security is identity of the
entity. Generally, string based pass phrases are being used to
ensure the authentication and securing the identity of the user.
These is problem with these pass phrases is the key-logging
because the pass-phrase can be sniffed through a key logger
software. Therefore, in place of pass phrases, the hardware
dependent unique information can be used to ensure the
security of the identity of the entity. As we know, every
network device is equipped with a unique address called as
MAC address which is globally unique. This address can be
considered as the deriving entity to deduce the public key in
ID-Based cryptography as it is unmodifiable and globally
unique hardwired value. This is also called as physical
network address and it is of 12 hexadecimal numbers, 48 bits
in length and the format of this number is as:
MM:MM:MM:SS:SS:SS or MM-MM-MM-SS-SS-SS.
The MAC address consists two identities as half part is
addressing the identity of the manufacturer of the device and
rest half part is addressing the serial number or identity of the
hardware. The best thing to pick the MAC address as the seed
for ID-Based cryptography is that, no active device can
change its MAC address, along with the permission given by
the wireless gateway. Because the authorized and registered
MAC address requests can only be allowed to communicate
[10]. Spoofing a MAC address is basically identity theft and
denotes the altering of the MAC on a NIC. Therefore, many
approaches have been introduced to generate NIC fingerprints
[11].3
Identity-Based Encryption Algorithm using
Hybrid Encryption and MAC Address for Key
Generation
Darpan Anand, Jeetendra Pande, Udit Maheshwari