Open Access   Article Go Back

Dual Secure Cryptographic Measures by Two-Phase Locking Protocol

Shabbir Hassan1

Section:Research Paper, Product Type: Journal Paper
Volume-8 , Issue-6 , Page no. 79-85, Jun-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i6.7985

Online published on Jun 30, 2020

Copyright © Shabbir Hassan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shabbir Hassan, “Dual Secure Cryptographic Measures by Two-Phase Locking Protocol,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.6, pp.79-85, 2020.

MLA Style Citation: Shabbir Hassan "Dual Secure Cryptographic Measures by Two-Phase Locking Protocol." International Journal of Computer Sciences and Engineering 8.6 (2020): 79-85.

APA Style Citation: Shabbir Hassan, (2020). Dual Secure Cryptographic Measures by Two-Phase Locking Protocol. International Journal of Computer Sciences and Engineering, 8(6), 79-85.

BibTex Style Citation:
@article{Hassan_2020,
author = {Shabbir Hassan},
title = {Dual Secure Cryptographic Measures by Two-Phase Locking Protocol},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2020},
volume = {8},
Issue = {6},
month = {6},
year = {2020},
issn = {2347-2693},
pages = {79-85},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5151},
doi = {https://doi.org/10.26438/ijcse/v8i6.7985}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i6.7985}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5151
TI - Dual Secure Cryptographic Measures by Two-Phase Locking Protocol
T2 - International Journal of Computer Sciences and Engineering
AU - Shabbir Hassan
PY - 2020
DA - 2020/06/30
PB - IJCSE, Indore, INDIA
SP - 79-85
IS - 6
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
298 367 downloads 165 downloads
  
  
           

Abstract

Sender sends the lock of an encrypted binary number of a locker crisp value from a fuzzy membership table which is defined on ASCII values of uppercase alphabets and membership function. The receiver then converts the binary number into a fuzzy number and then it is de-fuzzified using a suitable formula. In terms of area costs, computing resources, web services, and full capabilities, Smart Grid are considered to be the enhancements over the existing grid system. The future domain of the missions in the region is described by smart energy, smart grids, intelligent homes, and clever cities as the ambitious flagship programmer of the Indian digital initiative. More than 100 intelligent cities in India are expected for ICT-led solutions with big data analytics. The exponential growth of smart grids has posed several safety dangers, cyber threats, and data protection as a nation`s security. Smart grids, made up of numerous networks, intelligent control, access control, and power grid equipment, are more likely to be exposed to network security and cyber-attacks potentially interrupting delivery in a city. The paper discusses the software-oriented binary grid system and problems associated with the intelligent grid system and discusses the use of smart grid smart hardware using the Advanced Encryption Standard (AES). To ensure that AES can be employed in the intelligent grid and communication infrastructure. The Xilinx ISE 14.2 software has designed the AES encryption and decryption unit and is synthesized in SPARTAN-3E FPGA to test for certain cases.

Key-Words / Index Term

Unintelligible text, Linear Recurrence, Unprotected AES implementation, fuzzy set, membership function, crisp number, smart grid communication, ASCII values, cryptography

References

[1] P. Amudha, A.C. Charles Sagayaraj A, C.ShanthaSheela,?An application of Graph theory in Cryptography?, International Journal of Pure and Applied Mathematics, 119(13), 375-383, 2018.
[2] Anita Pal, National Institute of Technology Durgapur West Bengal-713209, India.
[3] K.Ganeshkumar, D.arivazhagan, et.al,`New Cryptography Algorithm with Fuzzy logic for Effective Data Communication`. International journal of Science and tech. vol 9(48), DOI: 10.17485 /ijst/2016/v9i48/108970, Dec 2016.
[4] Kamilahabdullah. Sumarni Abu Baskar, Nor Hanimakamis, and Harialimais, `RSA cryptosystem with Fuzzy set Theory for encryption and decryption`, AIP conference Proceeding 190, 030001(2017), volume 950, Issue 10.063/1.5012147.
[5] M. Muthumeenakshi, T. Archana, P. Muralikrishna,?Fuzzy Application in Secured Data Transmission?, International Journal of Pure and Applied Mathematics, 116(3), 711-715, 2017.
[6] Ravindumadanayake, et.al, `Advanced Encryption Algorithm Using Fuzzy Logic?, International Journal of Computer networks ((ICICN 2012) IPCSIT vol 27(2012) IACSIT Press), Singapore.
[7] S.Shara et. al. on "RSA algorithm using modified subset sum Cryptosystem,? in computer and commTech. (India, 2011) pp. 457-461.
[8] L.A.Zadehand R.RYager et al. (John Wiley, New York, 1987). ?Fuzzy Sets and Applications :?
[9] L.A Zadeh, information And control, vol. 8, 338- 353(1965)
[10] Bari A, Jiang J, Saad W, Jaekel A (2014) Challenges in the smart grid applications: an overview. Ataul Hindawi Publishing Cor- poration. Int J Distrib Sensor Netw 974682:11. https://doi.org/10. 1155/2014/974682.
[11] Fadel E, Gungor VC, Nassef L, Nadine A, Abbas Malik MG (2015) ?A survey on wireless sensor networks for smart grid.? Comput Netw Elsevier 71:22?33
[12] Wang W, Lu Z (2013) ?Cyber security in the smart grid: survey and challenges.? Comput Netw 57:1344?1371.
[13] Guo X, Liu Z, Xing J, Fan W, Zou X (2006) ?Optimized AES crypto design for wireless sensor networks with balanced S-box architecture:? In Proceedings of International Conference on Informatics and Control Technology (ICT 2006). pp 203?208.
[14] Deshpande AM, Deshpande MS, Kayatanavar DN (2009) ?FPGA implementation of AES encryption and decryption.? In: Interna- tional conference on control, automation, communication and energy conservation (INCACEC 2009). IEEE, pp 1?6.
[15] Hodjat A, Verbauwhede I (2006) ?Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors.? IEEE Trans Comput 55:366?372.
[16] Daemen J, Rijmen V (2013), ?The design of Rijndael: AES-the advanced encryption standard.? Springer, Berlin.
[17] Daemen J, Rijmen V (2005) Rijndael/aes. In: van Tilborg HCA (ed) ?Encyclopedia of Cryptography and Security.? Springer, US, pp 520?524.
[18] Hammad I, Sankary KE, Masry EE (2010) ?High-speed AES encryptor with efficient merging techniques.? IEEE Embed Syst Lett 2(3):67?71.
[19] Dyken JV, Delgado-Frias JG (2010) ?FPGA schemes for mini- mizing the power-throughput trade-off in executing the advanced encryption standard algorithm.? J Syst Architect 56(2?3):116?123.
[20] Sklavos N, Papakonstinou A, Koufopavlou STO (2002) Low- power implementation of an encryption/decryption system with asynchronous techniques. VLSI Design 15(1):455?468.
[21] Priya SS, Karthigaikumar P, Siva Mangai NM. et al. (2017) ?Wireless personal communication.? 94: 2259. doi: https://doi.org/ 10.1007/s11277-016-3385-7.
[22] Good T, Benaissa M (2006) ?Very small FPGA application-specific instruction processor for AES.? IEEE Trans Circ Syst I Regul Pap 53(7):1477?1486.
[23] Zhang X, Parhi KK (2004) ?High-Speed VLSI architectures for the AES algorithm.? IEEE Trans Very Large Scale Integr VLSI Syst 12(9):957?967.
[24] Li, Chaoyun, and Bart Preneel. "Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree." International Conference on Selected Areas in Cryptography. Springer, Cham, 2019.
[25] Shabbir Hassan, Prof. M. U. Bokhari, presented a paper entitled "Lightweight Cryptography: A Review", Recent Trends in Mathematical and Computational Science (NCRTMCS), January 2015, pp-78.
[26] Shabbir Hassan and Mohammad Ubaidullah Bokhari. "Computing in Cryptography." 2016 3rd International Conference on Computing for SustainableGlobal Development (INDIACom). IEEE, 2016. ISSN 0973-7529; ISBN 978-93-80544-20-5.
[27] Shabbir Hassan, M.U. Bokhari and Md. Zeyauddin. "Radio Frequency Identification Tag: A Review.? 2017 4th International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2017. ISSN 0973-7529; ISBN 978-93-80544-24-3
[28] Bokhari, M. U., and Shabbir Hassan. "A comparative study on lightweight cryptography." Cyber Security. Springer, Singapore, Cyber Security, Advancesin Intelligent Systems and Computing 729. 2018. 69-79. https://doi.org/10.1007/978-981-10-8536-9_8
[29] Hassan, Shabbir and Mohammad Ubaidullah Bokhari, (2019), "Analysis and Design of LFSR Based Cryptographic Algorithm." Journal of Advances and Scholarly Researches in Allied Education (JASRAE), ISSN 2230-7540, Vol. 16, Issue No. 9, June-2019.
[30] Hassan, Shabbir and Mohammad Ubaidullah Bokhari, ?Design of Pseudo Random Number Generator using Linear Feedback Shift Register.? International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 ? 8958, Volume-9 Issue-2, December, 2019.
[31] Prof. M. U. Bokhari, Shabbir Hassan, 2020, ?Design of a Lightweight Stream Cipher: BOKHARI? 256, International Journal of Engineering Research & Technology (IJERT) Volume 09, Issue 03 (March 2020).
[32] Shabbir Hassan. ?The Implication of Deep Neural Networks in Solving Optimization Problems for Network Security.? International Journal of Computer Applications 176(20):6-13, May 2020.