data security using tdmrc code l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Data Security Using TDMRC Code PowerPoint Presentation
Download Presentation
Data Security Using TDMRC Code

Loading in 2 Seconds...

play fullscreen
1 / 58

Data Security Using TDMRC Code - PowerPoint PPT Presentation


  • 877 Views
  • Uploaded on

Data Security Using TDMRC Code. Dr. Varghese Paul Head, Information Technology Department Cochin University of Science and Technology. How data security is achieved ? - Access Control Methods - Encryption Methods.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

Data Security Using TDMRC Code


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. Data Security Using TDMRC Code Dr. Varghese Paul Head, Information Technology Department Cochin University of Science and Technology T0C-H Institute of Technology

    2. How data security is achieved ? - Access Control Methods - Encryption Methods T0C-H Institute of Technology

    3. Access Control can be by - Password Matching - Biological Identification - FirewallMethods T0C-H Institute of Technology

    4. Encryption can be Symmetric Key Type Asymmetric Key Type T0C-H Institute of Technology

    5. Again Encryption may beby SubstitutionbyTransposition T0C-H Institute of Technology

    6. Substitution may be Mono Alphabetic Type Poly Alphabetic Type (Multiple Type) T0C-H Institute of Technology

    7. TDMRC CodeTime Dependant Multiple Random Cipher Code T0C-H Institute of Technology

    8. ASCII consists of 8 BITs and 256 ( 2 8 ) characters are possible in itUNICODE consists of 16 BITs and 65536 ( 2 16 ) characters are possibleTDMRC Code consists of 8.58 x 10 506 codes and each code can have 256 characters, each character is represented by 8 BITs T0C-H Institute of Technology

    9. Factors that helped me in developing TDMRC Code. Field Experience in SCADA Systems Teaching experience in Fault Tolerant Computing Teaching experience in Cryptography and Data Security Library functions for Random Number Generation in computer languages T0C-H Institute of Technology

    10. 256 Characters in ASCII can be arranged in 256 ! ways.Or we can say 256 ! different codes are possible.TDMRC Code consists of all these 256 ! codes, and each code consisting of 256 characters.ASCII is one among these 256 ! codes. T0C-H Institute of Technology

    11. So we can sayTDMRC Code is Mega Extended ASCII Codeand TDMRC Code consists of 256 Real Characters and 256 x 8.58 x 10 506Virtual Characters T0C-H Institute of Technology

    12. Let us find the actual value of 256 ! T0C-H Institute of Technology

    13. 256 ! =8.57817775342842654119082271 x 10 506================================================ T0C-H Institute of Technology

    14. Suppose TDMRC Code is printed in book form such that each code takes one page and 200 pages forms one cm thickness of the book.Now let us assume that this book is stored in TDMRC CODE Reference Library T0C-H Institute of Technology

    15. TDMRC CODE Reference LibraryAssume a very big room which can inscribe the planet earth. Inner dimensions of that room will be 12739 k m T0C-H Institute of Technology

    16. TDMRC CODE Reference LibraryAssume full height racks with a shelf space of 45 cmare arranged with 2 metre space in between T0C-H Institute of Technology

    17. TDMRC CODE Reference LibraryNumber of rooms required 8.58 x 10 506 x 45 x 10 - 5 x 2 x 10 - 3 = --------------------------------------------------------------------------------------- 200 x 100 x 1000 x 12739 x 12739 x 12739 = 4.15 x 10 479 ===================== T0C-H Institute of Technology

    18. TDMRC CODE TDMRC CODE TDMRC CODE Suppose I distribute the whole TDMRC code among the whole 700 crore population in the world to memorise by equal sharing, then the number of codes each individual has to memorise is8.58 x 10 506 / 700 x 10 7 = 1.22 x 10 497 T0C-H Institute of Technology

    19. TDMRC CODE TDMRC CODE TDMRC CODE If average age of an individual is 45 years and everybody try to memorise TDMRC Code from the moment he is delivered to this earth, number of code each individual has to memorise in one second is = 1.22 x 10 497 / ( 45 x 365 x 24 X 60 x 60 ) = 8.65 x 10 487 T0C-H Institute of Technology

    20. TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRCTDMRCTDMRC TDMRC TDMRC TDMRCTDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRC TDMRCT DMRC TDMRCTDMRC TDMR D MRC TDMRC TDMRC TDMRCTDMRC TDMRC T0C-H Institute of Technology

    21. TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT TDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCTDMRCT T0C-H Institute of Technology

    22. Data Security Using TDMRC Code T0C-H Institute of Technology

    23. REAL TIME SYSTEMSAny system where a timely response by the computer to external stimuli is vital is a Real Time System. Real Time Systems must satisfy explicit response time constraints or risk severe consequences including failure. T0C-H Institute of Technology

    24. A system is considered FAULT TOLERANTif the behaviour of the system, despite the failure of some of its components, is consistent with its specifications. Fault Tolerant Systems have the capability to function in the presence of fault. Redundant systems are used for achieving this quality. When redundant systems are used consistency of data among various systems is of prime importance. The available data and the processed output should be compared between various redundant systems at frequent intervals. T0C-H Institute of Technology

    25. When the redundant systems are located at geographically distant places this comparison is to be done by transmitting data and output through communication links between various constituent systems. The rate of data transmission should also be high. These communication channels are to be well protected against intruders especially when the system is used for strategic applications like military, aerospace research, nuclear research etc. T0C-H Institute of Technology

    26. Since Fault Tolerant Hard Real Time Systems are widely used in high tech warfare also, the chance of intrusion and risk of forced leakage of confidential information is very high in this field. To ensure correct data reception there exist many error checking and error correcting codes. But for security from eves droppers it is better to use encryption techniques in this kind of networksso that the actual information can be kept away from the intruders even if they manage to gain access to the communication channel. T0C-H Institute of Technology

    27. Detailed study conducted on data encryption techniques lead to the development of a new data encryption method named Time Dependant Multiple Random Cipher Code ( TDMRC Code ).This particular method has many complexities compared to other methods and cryptanalysis is practically impossible.This method is a product code which uses variable block length where as the conventional methods are of fixed block length. T0C-H Institute of Technology

    28. The code used for any particular character differs depending upon time – that is, coding is TIME DEPENDANT. Even for centi second difference, the codes will change. The code used for the same character at different locations of the plain text are different – that is, code is POLY ALPHABETIC (MULTIPLE) . Also, Pseudo Random Number generation technique is used for code generation. T0C-H Institute of Technology

    29. Vulnerability check of the proposed system was carried out during the course of the work.Students, researchers and professionals were involved in the checking. A global contest with a reward of 1,00,000 rupees was arranged to check the computational security and vulnerability of the proposed scheme. T0C-H Institute of Technology

    30. Real Time Systems can be classified into two categories – Soft Real Time Systems and Hard Real Time Systems. In Soft Real Time Systems performance is degraded but not destroyed by failure to meet response time constraints Whereas in Hard Real Time systems failure to meet response time constraints will lead to failure of the system itself. T0C-H Institute of Technology

    31. Using TDMRC Code for Encryption T0C-H Institute of Technology

    32. Any Multimedia Data can be treated as a chain of binary BITs.It can be further treated as chain of 8 BIT blocks and each 8 BIT block as an ASCII character. T0C-H Institute of Technology

    33. These chain of ASCII characters can be transliterated to corresponding characters of another TDMRC Code such that the ASCII value of the original character and that of the TDMRC Code character are the same.Now the Cipher Text is ready T0C-H Institute of Technology

    34. ENCRYPTION USING TDMRC CODE PLAIN TEXT TRANSLITERATION To TDMRC Code CIPHER TEXT THE QUICK BROWN FOX JUMPED OVER 7b3{j2msk;4o!*x/~/?A+Kn8q>5g5h@_0f+# T0C-H Institute of Technology

    35. DECRYPTION USING TDMRC CODE CIPHER TEXT REVERSE TRANSLITERATION To ASCII Code PLAIN TEXT 7b3{j2msk;4o!*x/~/?A+Kn8q>5g5h@_0f+# THE QUICK BROWN FOX JUMPED OVER T0C-H Institute of Technology

    36. 10101101100001010111 11101011011000010101 Chain of 8 BIT ASCII TRANSLITERATION To TDMRC Code Chain of 8 BIT TDMRC ENCRYPTION USING TDMRC CODE T0C-H Institute of Technology

    37. Decryption can be done by Reverse Transliteration from TDMRC Cipher Text to ASCII So we will get back the Plain Text T0C-H Institute of Technology

    38. 11101011011000010101 10101101100001010111 Chain of 8 BIT TDMRC REVERSE TRANSLITERATION To ASCII Chain of 8 BIT ASCII DECRYPTION USING TDMRC CODE T0C-H Institute of Technology

    39. Now the Problem ishow we can specify which TDMRC code out of 8.58 x 10 506 codes was used for transliteration and what was the arrangement of 256 characters in that particular TDMRC code. T0C-H Institute of Technology

    40. Key of TDMRC Code T0C-H Institute of Technology

    41. Mandatory Requirement of Practical Encryption Systems - high level of security - comprehensive and transparent specification - security may not rely on secrecy of algorithm - available and accessible to all users - suitable for a variety of applications - low cost implementation - able to be exported - accessible for validation. T0C-H Institute of Technology

    42. Key of Gregorian Calendar of 2008 T0C-H Institute of Technology

    43. 256, 240, 251, 361 T0C-H Institute of Technology

    44. 2 5 6 , 2 4 0 , 2 5 1 , 3 6 1 Add date value to the digit corresponding to month. Divide this sum by 7 and find the remainder If remainder is 1 – Sunday 2 - Monday 3 – Tuesday 4 – Wednesday 5 – Thursday 6 – Friday 0 - Saturday T0C-H Institute of Technology

    45. TDMRC Coding System can be treated as a lock which needs more than one key to lock and open.Keys are to be used one after the other T0C-H Institute of Technology

    46. 2 1 T0C-H Institute of Technology

    47. Complexities in TDMRC CodeTime Dependant CodeMultiple Code ( Poly Alphabetic Code ) Random Code T0C-H Institute of Technology

    48. TDMRC follows symmetric key method and uses less complex mathematical operations compared to any other schemes. It is a substitution coding system.This method uses variable block length depending upon PAC where as the conventional methods are of fixed block length. And since many complexities are simultaneously incorporated TDMRC is a Product Code and cryptanalysis is practically impossible. Though it is designed for use in communication channels of FTHRT system, it can be used for any other applications which requires data security T0C-H Institute of Technology

    49. Key of TDMRC CodeConsists of 3 elementsMaster Key derived from the Real Time Clock.It is an 8 digit number obtained by combining the values of hour, minute, second and centi second.Poly Alphabetic Coefficient ( PAC ), PIt is the number of codes simultaneously used for any character in an encrypting session.P number of 4 digit Sub Keys T0C-H Institute of Technology

    50. Algorithm of TDMRC Code T0C-H Institute of Technology