Welcome to www.programmer2programmer.net Its all about security programming source code

programmer2programmer.net

 Tips
 Microsoft Certification
 Final Year Project Idea
 Connection Strings
 Password Recovery
 SQL Injection
 Encryption & Decryption
  
 LIVE Academic Project
 Project #1 - VB6, Access
  Project #2 - VB.Net, SQL
 Project #3 - ASP, Access
 Project #4 - ASP.NET, C#
 Project #5 - VB6, SQL
 Project #6 - Stegano
 Project #7 - C
 Project #8 - C++
 Project #9 - JAVA, MySQL
 Project #10- PHP, MySQL
 Project #11- JSP, Oracle
 Project #12- C# Face Exp
 Project #13- Mobile Bank
 Download MBA Project
 MBA Project Topic
 Project Viva Question
  2017 New Projects
 Project Synopsis Download
  
 University Question Paper, Assignment and Projects
 SMU - Question Paper
 SMU - Assignment
 SMU - Synopsis Projects
 SCDL - Assignment
 IGNOU - Synopsis Projects
 Welingkar - Projects
 Project Report Formats
  
 Interview Question Answer
 General & HR Round
 Visual Basic 6
 VB.Net & C#
 ASP.Net
 SQL Server
  Oracle and DBA
 My SQL
  

100% Tested
Ready Academic IT Projects

BE, ME, BTech, BCA, MCA, MBA, Bsc-IT, MS, BIT, ADIT, DOEACC, IGNOU, SMU
readymadeproject.com

 Secret Key Encryption, Stream Cipher, Initialize Vector, Symmetric IV Encryption Decryption Source Code

Home Personal Member Forum Source Project Tips Contact
 

 

Encryption and Decryption
 

Symmetric or Secret Key Encryption

1. Encryption / Decryption

 
In this type of encryption both the sender and recipient posses the same key, to encrypt and decrypt the data, for successful operation both parties must agree upon a shared secret key. If there are "n" correspondent one have to keep track of n-different secret keys. if the same key is used by encrypt more than one then key holder can easily decrypt all data. Symmetric encryption schemes are also subject to authenticity problems. because, encrypter and decrypter have same secret key identity of encrypter or decrypter cannot be determine, both can encrypt or decrypt the data.
There is mainly two type of symmetric or secret key encryption, Stream Ciphers and Block Ciphers

2. XOR Encryption

3. Transposition Encryption

4. Symmetric Encryption

5. Asymmetric Encryption
6. Certificate Authority
7. Decryption Logics
8. Sample Coding
 



Stream Ciphers
The simplest stream cipher is called the Vernam Cipher. A bit from a key is added, with the carry discarded, to a bit from the plain text to get one bit of cipher text. XOR encryption is the example of stream cipher, it is turn out to be easy to crack. it is weak when repeating the same keys, but it can be very effective when the key stream varies constantly. The most well known stream cipher is RC4.

Block Ciphers
Block ciphers are designed to take data blocks of particular size, encrypt them with a key in particular size, and get a block of cipher text of a particular size, Block ciphers encrypt data in fixed size blocks. To encrypt a stream of data, the data must be broken into block size pieces and each block encrypted individually. When decrypted in the right order the encrypted blocks get the original plain text.

In geometrical pattern encoding we are using block ciphers, today's practical block ciphers all generate a cipher text block same size as the palin text block. Data Encryption Standard (DES) may be the best block cipher. Block ciphers are analyzed and tested for their ability to encrypt the data blocks of their given block size. A statistical analysis of cipher text generated by the block cipher algorithm should find that individual data bits as well as pattern of bits appear completely random.

Data block size and secret key size in block ciphers

Encryption Algorithm Data Block (Bits) Secret Key (Bits)
Data Encryption Standard (DES) 64 56
International Data encryption Algorithm (IDEA) 64 128
Modular Multiplication Block (MMB) 128 128
SKIPJACK 64 80

Patterns in the cipher text become a problem when we apply same secret keys to stream of data. if we encrypt the same block twice with same key, it returns same cipher text for both occurrence, for a experienced cracker easily identified the visual pattern of cipher text and exploit the cipher text with some reverse calculation. This makes the messages more vulnerable to attack. if we encrypt a stream block by block, patterns in the plaintext will produce statistically significant patterns in the cipher text. these pattern can give a code breaker the entry point for an attack.

Initialize Vector (IV) 
Cipher block chaining in the plain text by systematically combining each plaintext block with a cipher text before actually encrypting it, the two blocks combined bit by bit using XOR operation, instead of directly encrypting plaintext data, the block cipher encrypts the plain text data after it is combined with random looking cipher text, the process started with a block of random bits called the initialization vector (IV). two same plain text will never look same in cipher text as the IV is different for both the case.

In following Example we use symmetric key for both encryption and decryption, however if we encrypt same text repeating time it creates different cipher text every time, we use Initialization vector for selecting the bit pattern for each time, we pass the same bit pattern to cipher text block to decrypt it to plain text.

Function for encryption

    private Function StrEncrypt(ByVal EnStr As String) As String

        Dim Key As String

        Key = "Abt$9>3ZyX 21~)**1_0d%1xOp0#?s!14k-L7`3s9cxPo1ilIj=-0DnmOpas#$%5854/*?>00021atanu???"

 

        Dim p1 As Integer

        Randomize()

        p1 = (Rnd() * 8) + 1

        Dim p2 As Integer

        p2 = Len(EnStr)

        Dim RandSeed As Integer

        RandSeed = p1

        Dim i As Integer

        Dim s1 As String = ""

        Dim ft As String

        ft = ""

        For i = 1 To 50

            s1 = s1 & Chr(Asc(Rnd() * 255))

        Next

 

        ft = Chr(p1) & Chr(p2)

        Dim iXor As Integer

        For i = 1 To Len(EnStr)

            iXor = Asc(Mid(KeyPair, i + p1, 1)) Xor Asc(Mid(EnStr, i, 1))

            ft = ft & Chr(iXor)

        Next

        For i = Len(ft) To 50

            ft = ft & Chr(Rnd() * 255)

        Next

        StrEncrypt = ft

    End Function

Function for decryption

    Private Function StrDecrypt(ByVal EnStr As String) As String

        Dim Key As String

        Key = "Abt$9>3ZyX 21~)**1_0d%1xOp0#?s!14k-L7`3s9cxPo1ilIj=-0DnmOpas#$%5854/*?>00021atanu???"

 

        Dim EText As String

        Dim Rt As String

        Dim p1, i As Integer

        EText = EnStr

        Dim Pbit As Integer

        Pbit = Asc(Mid(EText, 1, 1))

        p1 = Asc(Mid(EText, 1, 1))

        Dim PLen As Integer

        PLen = Asc(Mid(EText, 2, 1))

        Rt = ""

 

        For i = 3 To PLen + 2

            Rt = Rt & Chr(Asc(Mid(EText, i, 1)) Xor Asc(Mid(Key, i - 2 + p1, 1)))

        Next

        StrDecrypt = Rt

    End Function

For example if we use plain text "ATANU MAITY" and encrypt it with StrEncrypt function it will create cipher text different for every time.

  CASE 1.
  StrEncrypt("ATANU MAITY")
  Cipher Text " xjr,xmsx*p_qc€ý÷ßZÊödñ¸H`xü5¯†9³ŒzŪ¢¿ ,ë¾À"

  CASE 2.
  StrEncrypt("ATANU MAITY")
  Cipher Text ":i#ubK\{jizC,,g¾°8;TÑl›¬ÚŠjm1v"ë3a9>|ô+•`P=/"

  CASE 3.
  StrEncrypt("ATANU")
  Cipher Text "366bu9\VŒª…Vßΰ’—ÐJŒ¨‹Ÿ˜ [Js¥P߂嚢8`7Ÿ Ýh¥"

if you carefully analysis with Case 1 and Case 2, you can not find any pattern match between two cipher text although pain text and secret key are same. and if you analysis case no 1 with case no 2 then you can find the length of cipher text dose not vary with the length of plain text.


For completing listing of the code and sample Visual Basic 6 project for Symmetric IV Encryption can be found in Sample Code section.



Next 5.  Asymmetric Encryption
(C) Atanu Maity, 2006-2017