dual key triple encryption text based … · abstract — dual key triple encryption text based...

8
DUAL KEY TRIPLE ENCRYPTION TEXT BASED MESSAGE USING CRYPTOGRAPHY AND STEGANOGRAPHY Yohan Suryanto 1 , Nur Hayati 2 , R. Hendra Kusumawardhana 3 , Prof. Dr. Riri Fitri Sari 4 Department Electrical Engineering Faculty of Engineering, University of Indonesia Depok 16424, INDONESIA 1 [email protected] , 2 [email protected] , 3 [email protected] , 4 [email protected] Abstract Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography is a modular encryption and decryption method for any type of file. It combines layer 1 and layer 2 encryption techniques with standard encryption like AES as layer 3 encryption. Dual symmetric key is required to encrypt or decrypt file, so it can be used by two different persons to encrypt or decrypt certain file. Layer 1 and Layer 2 can use independently to achieve higher security level and fast encrypt or decrypt processing time. We propose character mapping and window addition for level 1 encryption. This technique has better processing time more than 21 times faster than fair character mapping. For layer 2 encryption, we propose scrambling transpose position and dummy file insertion as steganography technique. This method has higher efficiency ratio compare to LSB technique. We can achieve 50% efficiency compare to 12.5% in LSB technique. Combining both methods, we can achieve higher security level by maintaining faster processing time and reduce chipper text size. It can also be used together with AES to increase security level, yet still maintaining fast overall processing time and high efficiency ratio. KeywordsDual Key, Encryption, Decryption, Cryptography, Steganography, Character, Window addition, Scrambling, Insertion, fast processing, high efficiency and AES I. I NTRODUCTION Communication is a part of human life since before humans even know the language. Especially in the information, communication is a very crucial thing. There are times where the information is important and confidential. Therefore, the method of communication used to be made in the other way that no one who know about such information. For these reasons, there is a confidential communications method called cryptography. Cryptography is a method for processing information with a certain algorithm that the information becomes vague and difficult to understand the meaning. However, this method often leads to suspicion of third person, which are difficult to understand because the message would have been processed in such a way and it shows that the message is an important information. To avoid the above problems, a new method called steganography has been introduced. Steganography is a method of hiding information in the other media, the media can be an image, sound or video. The method used in the other way that third person will not know that the media contain hidden information. The most important aspect of the level of security in steganography is concealment of information, which refers to how the third person can not to detect the presence of hidden information. Standard cryptography method that applied encryption is AES. The Advanced Encryption Standard (AES) is an encryption algorithm for securing sensitive but unclassified material by U.S. Government agencies and, as a likely consequence, may eventually become the de facto encryption standard for commercial transactions in the private sector. Originally called Rijndael, the cipher was developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, who submitted to the AES selection process. Growing of cloud computing demand, where people can put important file in public server, make either concealing or simply encrypt the file is important. The most important aspect in security is how unauthorized people unable to read the file even they have full access to the file. I t doesn’t matter they suspect to certain file or not, as long as they unable to reveal the content for valid time, it will be enough. Our Group see that the standard encryption like AES method is less secure to use for file encryption since this method is block based method and prone to known file attack. Therefore, this standard is the most secure encryption standard available today. We propose to combine it with our layer 1 and layer 2 encryption method, employing cryptography and steganography technique to achieve higher security level. II. ENCRYPTION & DECRYPTION Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be utilized to keep the enemy from obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII). Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated Yohan Suryanto et al ,Int.J.Computer Technology & Applications,Vol 4 (1), 43-50 IJCTA | Jan-Feb 2013 Available [email protected] 43 ISSN:2229-6093

Upload: dinhhanh

Post on 24-Apr-2018

238 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DUAL KEY TRIPLE ENCRYPTION TEXT BASED … · Abstract — Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography is a ... It combines layer 1 and layer

DUAL KEY TRIPLE ENCRYPTION TEXT BASED MESSAGE

USING CRYPTOGRAPHY AND STEGANOGRAPHY

Yohan Suryanto1, Nur Hayati2, R. Hendra Kusumawardhana3, Prof. Dr. Riri Fitri Sari4

Department Electrical Engineering Faculty of Engineering, University of Indonesia

Depok 16424, INDONESIA [email protected],

[email protected],

[email protected],

[email protected]

Abstract — Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography is a modular encryption and

decryption method for any type of file. It combines layer 1 and layer 2 encryption techniques with standard encryption like AES as

layer 3 encryption. Dual symmetric key is required to encrypt or decrypt file, so it can be used by two different persons to encrypt or

decrypt certain file. Layer 1 and Layer 2 can use independently to achieve higher security level and fast encrypt or decrypt processing

time. We propose character mapping and window addition for level 1 encryption. This technique has better processing time more

than 21 times faster than fair character mapping. For layer 2 encryption, we propose scrambling transpose position and dummy file

insertion as steganography technique. This method has higher efficiency ratio compare to LSB technique. We can achieve 50%

efficiency compare to 12.5% in LSB technique. Combining both methods, we can achieve higher security level by maintaining faster

processing time and reduce chipper text size. It can also be used together with AES to increase security level, yet still maintaining fast

overall processing time and high efficiency ratio.

Keywords— Dual Key, Encryption, Decryption, Cryptography, Steganography, Character, Window addition, Scrambling, Insertion, fast

processing, high efficiency and AES

I. INTRODUCTION

Communication is a part of human life since before

humans even know the language. Especially in the

information, communication is a very crucial thing. There are

times where the information is important and confidential.

Therefore, the method of communication used to be made in

the other way that no one who know about such information.

For these reasons, there is a confidential

communications method called cryptography. Cryptography is

a method for processing information with a certain algorithm

that the information becomes vague and difficult to

understand the meaning. However, this method often leads to

suspicion of third person, which are difficult to understand

because the message would have been processed in such a

way and it shows that the message is an important information. To avoid the above problems, a new method called

steganography has been introduced. Steganography is a

method of hiding information in the other media, the media

can be an image, sound or video. The method used in the other

way that third person will not know that the media contain

hidden information. The most important aspect of the level of

security in steganography is concealment of information,

which refers to how the third person can not to detect the

presence of hidden information.

Standard cryptography method that applied

encryption is AES. The Advanced Encryption Standard (AES)

is an encryption algorithm for securing sensitive but

unclassified material by U.S. Government agencies and, as a

likely consequence, may eventually become the de facto

encryption standard for commercial transactions in the private

sector. Originally called Rijndael, the cipher was developed

by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, who submitted to the AES selection process.

Growing of cloud computing demand, where people can put

important file in public server, make either concealing or

simply encrypt the file is important. The most important

aspect in security is how unauthorized people unable to read

the file even they have full access to the file. It doesn’t matter

they suspect to certain file or not, as long as they unable to

reveal the content for valid time, it will be enough.

Our Group see that the standard encryption like AES method is less secure to use for file encryption since this

method is block based method and prone to known file attack.

Therefore, this standard is the most secure encryption standard

available today. We propose to combine it with our layer 1

and layer 2 encryption method, employing cryptography and

steganography technique to achieve higher security level.

II. ENCRYPTION & DECRYPTION

Encryption is the conversion of data into a form,

called a ciphertext, that cannot be easily understood by

unauthorized people. Decryption is the process of converting

encrypted data back into its original form, so it can be

understood.

The use of encryption/decryption is as old as the art

of communication. In wartime, a cipher, often incorrectly

called a code, can be utilized to keep the enemy from

obtaining the contents of transmissions. (Technically, a code

is a means of representing a signal without the intent of

keeping it secret; examples are Morse code and ASCII).

Simple ciphers include the substitution of letters for numbers,

the rotation of letters in the alphabet, and the "scrambling" of

voice signals by inverting the sideband frequencies. More

complex ciphers work according to sophisticated

Yohan Suryanto et al ,Int.J.Computer Technology & Applications,Vol 4 (1), 43-50

IJCTA | Jan-Feb 2013 Available [email protected]

43

ISSN:2229-6093

Page 2: DUAL KEY TRIPLE ENCRYPTION TEXT BASED … · Abstract — Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography is a ... It combines layer 1 and layer

computer algorithms that rearrange the data bits in digital

signals. In order to easily recover the contents of an

encrypted signal, the correct decryption key is required. The

key is an algorithm that undo the work of the encryption

algorithm. Alternatively, a computer can be used in an attempt

to break the cipher. The more complex the encryption

algorithm, the more difficult it becomes to eavesdrop on the

communications without access to the key.

A. Cryptography

Cryptography is a process of converting initial data

by transforming it into unreadable format. It is known as

encryption. The initial data is called a plaintext and

unreadable format data is called a cipher text.

Cryptography is a kind of encryption by making sure

that the secret data can be understood only by the right person.

The information is converted from its normal comprehensible

form into an incomprehensible format. This mechanism

employs mathematical schemes and algorithms to scramble

data into unreadable text.

B. Steganography

Steganography is a method of data encryption by

hiding information in a cover. Source information will be

cover with other media without leaving a remarkable trace. The main objective of Steganography is to hide the

information under a cover media so that the outsiders may not

discover the information contained in the cover media. The

example of media for cover source data information are text

or image. In this case we use text based message as source

information then we conceal source information with other

text as a cover media.

C. Dual Key

Keyword is a piece of information that used to

authenticate and verify the secured information so only the

intended user can read the document. Without key the

information can’t be access by other users. In this system we

use double authentication user for more secured information

which each admin insert different password. It could be used

by 2 different users that work together to open their shared

important message for both.

D. Tripple Encryption

Data security is very important nowadays. Exchange

of information can grow rapidly inline with the growth of

internet. In this condition we must aware about data security

which spread in the internet. Some information is critical such

as information related to our national defence. Therefore, the

confidentiality and data integrity are required to protect the information against unauthorized access. This has resulted in

an explosive growth of the field of information security. Using

triple encryption, it will increase our data safety.

In this topic we use cryptography as first level

encryption, then we combine and recompose the chipper text

with other text using steganography. The Shuffled text then

encrypted using AES standard encryption.

E. Symetric Key Cryptography

Symmetric key cryptography is a type of key

cryptography which use the same key to encrypt and decrypt data. User can get back the original data by using the key. The

symmetric key cryptography usage as primitives to construct

various cryptographic mechanisms and can be combined to

produce stronger ciphers. The main fact is that the security of

data depends on the security of the key. So, we should be

more cautious on exchanging keys between the sender and the

receiver.

III. FAIR CHARACTER MAPPING AND LSB METHOD

A. Fair Character Mapping Cryptography

Fair character mapping is one of the most popular

methods to encrypt file. In fair character mapping, every

character of the plain text will be compared with every

reference character. If the character matched with certain

reference character than the character will be replaced with

the map character.

Figure 1: Fair Character Mapping

Let say, we use character mapping as depicted in Figure 1

above. In case character [i] is Z than this character will be

replaced with u. In case character [i] is q than this character

will be replaced with F and so on.

Due comparing process of each plain text character with

every reference character, fair character mapping method need

a lot of recursion time, and become relatively slow.

B. LSB Method

LSB (Least Significant Bit) method is one of the most

popular methods to encrypt file using steganography

technique. Commonly it is used to hiding message in picture.

Single bit of message will replace the least significant bit

of image pixel, to make least alteration effect to the original

image. Every byte of message must be converted to bit, let say

it as bit B1 – B7 as depicted in Figure 2 below. Doing this, we

need additional processing time, making overall process take

longer.

B1 B2 B3 B4 B5 B6 B7 B8

Figure 2: Bit code of single Byte of message

This bit marking as B[i] than replace least significant bit

of image. Let say we have 8 pixels image with bit market as 0-

7 as depicted in Figure 3 below:

0 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7

Yohan Suryanto et al ,Int.J.Computer Technology & Applications,Vol 4 (1), 43-50

IJCTA | Jan-Feb 2013 Available [email protected]

44

ISSN:2229-6093

Page 3: DUAL KEY TRIPLE ENCRYPTION TEXT BASED … · Abstract — Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography is a ... It combines layer 1 and layer

0 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7

Figure 3: Bit code of 8 pixels of image

Assume bit 7 is least significant bit in each pixel, than using

LSB method, single byte will replace 8 pixel in every 7th

bit as

depicted in Figure 4 below.

0 1 2 3 4 5 6 B1

0 1 2 3 4 5 6 B2

0 1 2 3 4 5 6 B3

0 1 2 3 4 5 6 B4

0 1 2 3 4 5 6 B5

0 1 2 3 4 5 6 B6

0 1 2 3 4 5 6 B7

0 1 2 3 4 5 6 B8

Figure 4: Single Byte message inserted to 8 pixel of image using LSB

Due to that, efficiency of LSB method, theoretically can

achieve as high as: 1/8 or 12.5%. In real situation, where

number of massage not always optimum to the available slot

of image, than efficiency could be less than that number.

IV. PROPOSED ENCRYPTION METHOD

For the encryption process, Dual password will be used to

encrypt data, so two different person in different institution

can encrypt share importance message. Triple encryption by

mean:

- First Encryption by character substitution and employ

window addition.

- Second level using steganography by shuffle composition

and character of the original chipper text inserted into

shuffled encrypted dummy file.

- Third encryption using standard AES encryption.

A. Level 1 Encryption Algorithm

Proposed of first level encryption is developed to aim

faster processing time but still maintaining high security level.

The technique use character substitution for every 32

character and employ window substitution to another 31

character of the plain text and the dummy text. Both methods

are correlated with our dual key properties

Algorithm that we use for level 1 encryption can be

depicted in Figure 5 below.

Character Map For Original File Character Map For Dummy FileDiff

Key A

Diff

Key B

If CMO [j] == DKA [i] then

interchange position

If CMD [j] == DKB [i] then

interchange position

Map A Map B

Ref Character Map

For h = 0; h < Baris Asli

i = 32 x h

For j = 0; j < 62; j++

If PT [i] == RCM [j] then replace PT[i]

with MA[j]

replace DT[i] with MB[j]

Plain Text Dummy Text

For k = 1; k < 32; k++

If (j+k-62) < 0 :

PT(i+k) = PT (j+k) + MA(j+k)

DT(i+k) = DT (j+k) + MB(j+k)

Else :

PT(i+k) = PT (j+k) + MA(j+k-62)

DT(i+k) = DT (j+k) + MB(j+k-62)

Chipper Original Text 2 Chipper Dummy Text 2

Length Dummy = LD

Baris Dummy = LD/32

Sisa Dummy = LD % 32

Length Asli = LA

Baris Asli = LA/32

Sisa Asli = LA % 32

Rest Plain text :

For j = 0; j < 62; j++

If PT [i] == RCM [j] then replace PT[i]

with MA[j]

For h = Baris Asli; h < Baris Dummy

i = 32 x h

For j = 0; j < 62; j++

If DT [i] == RCM [j] then

replace DT[j] with MB[j]

For k = 1; k < 32; k++

If (j+k-62) < 0 :

DT(i+k) = DT (i+k) + MB(j+k)

Else :

PD(i+k) = DT (i+k) + MB(j+k-62)

Rest Dummy text :

For j = 0; j < 62; j++

If DT [i] == RCM [j] then replace DT[j]

with MB[i]

Figure 5: Algorithm first level encryption

Differentiated Key A is used to rearrange character map

for the original file. In this project, we use original CMO Map

which arranged as depicted in Figure 3 below :

Figure 6: Character map for original file

The Character Map for Original File (CMO Map) than be

rearranged using Diff Key A. If we found that characters Key A[i] match with character CMO Map[j] than CMO Map[j]

will be interchanged with CMO Map [i]. Let say, by employ

Diff Key A with a value = 5IWE, we can rearranged CMO

Map become MAP A as depicted in Figure 6 above.

A correlated MAP A with Diff Key A than is used to

character substitution and window addition method. Plain text

will be arranged in 32 columns. The plain text of the first

column [i] in the substitution method, will be compared with

RCM, if the PT [i] match with RCM [j] than PT [i] replaced

with MAP A [j]. The character in column 2 until 32 than add

with window MAP A. The whole process will produce

chipper original text 1 (COT 1).

Differentiated Key B is used to rearrange character map

for dummy file. In this project, we arrange character map for

Yohan Suryanto et al ,Int.J.Computer Technology & Applications,Vol 4 (1), 43-50

IJCTA | Jan-Feb 2013 Available [email protected]

45

ISSN:2229-6093

Page 4: DUAL KEY TRIPLE ENCRYPTION TEXT BASED … · Abstract — Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography is a ... It combines layer 1 and layer

dummy file which called CMO Map as depicted in Figure 7

below:

Figure 7: Character Map for Dummy File

The Character Map for Dummy File (CMD Map) than

will be rearranged using Diff Key B. If we find character of

Key B[i] match with character CMD Map[j] than CMD Map[j]

will be interchanged with CMD Map[i]. Let say, by employ

Diff Key B with a value IWF6, we will rearranged CMD Map

become MAP B as depicted in Figure 7 above.

Next step is the dummy plain text will be rearranged in

32 column. For every match first column of plain text, dummy

text will be replaced with the associated MAPB and the 2nd

until 32nd

column will be add with window MAP B.

B. Level 2 Encryption Algorithm

Second Level Encryption using shuffle and text insertion

(steganography). The method employs matrix transpose

reposition and insertion original chipper text to dummy

chipper text technique. Both methods are correlated with our

dual key properties also.

Define colum (m) = (da+db)/2 Chipper Dummy Text 2Chipper Original Text 2

Raw (n) = COT2 / columnRevert back CDT2

arrangementCOT2 modulo

Transpose COT2 matrix n x

m to TCOT2 mxn

Append to TCOT2

Matrix insertion ATCOT2 to

RCDT2

Column (m) = CDT2/COT2

Raw (n) = COT2

RCDT2

ATCOT2

Combined Chipper Text 3

(CCT3)

Figure 8: Algorithm Second Level Encryption

Define matrix COT2, n x m, where m is a factor of

function f(da,db) and n is size of COT2 divided by factor.

Figure 9: Matrix nxm of COT2

Transpose Position : Anm => Bmn

Figure 10: Transpose Matrix mxn of TCOT2

Remaining COT2 directly substitute and appended to

TCOT2:

Figure 11: Remaining COT2 appended to TCOT2

Next step is insert COT2 chipper text to chipper dummy

text CDT2, the insertion uses reverse arragment method. The

last COT2 chipper text will be inserted first. Let’s define

matrix n x m, where n is COT2 and m is TCOT2/COT2. We

have dummy chipper text as follow :

Figure 12: Matrix dummy chipper text CDT2

We also have a matrix column of COT2.

Figure 13: Matrix COT2

COT2 then inserted to CDT2 using reverse arrangement

become combined chipper text 3 (CCT3).

Figure 14: Insertion and reverse arrangement chipper text

C. Level 3 Encryption Algorithm (AES)

All chipper text will be encrypted using AES standard.

With Key1+key2.

Yohan Suryanto et al ,Int.J.Computer Technology & Applications,Vol 4 (1), 43-50

IJCTA | Jan-Feb 2013 Available [email protected]

46

ISSN:2229-6093

Page 5: DUAL KEY TRIPLE ENCRYPTION TEXT BASED … · Abstract — Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography is a ... It combines layer 1 and layer

Combined Chipper Text 3

(CCT3)Key A + Key B

AES Encryption Algorithm

Dual Key Triple Encryption

Chipper Text

Figure 15: AES Encryption

V. PROPOSED DECRYPTION METHOD

For the decryption process, dual password will be used to

decrypt the encrypted data, so two different persons from

different institution could read their share importance

message. Triple decryption will be done through inverse of the

encryption process:

- First decryption using standard AES encryption.

- Second decryption to recompose original file that stored in

dummy file.

- Third level encryption by character substitution and

employ window subtraction.

A. Level 1 Decryption (AES)

The chipper text look like standard AES chipper text, but

actually need further decryption process to be able reveal the

original text. T be able to decrypt the chipper text, first we

should use AES standard algorithm using match key, a

combining dual key.

Dual Key Triple Encryption

Chipper Text

AES Decryption Algorithm

Key A + Key B

Dual Key Triple Decryption

Chipper Text

Figure 16: AES decryption

B. Level 2 Decryption

Second Level using reshuffle and text reveal

(steganography). Algorithm that we use in second level

decryption can be depicted as Figure 17 below:

Chipper Original Text 2

Reveal ATCOT2 from

Chipper Text 3 (CCT3)

Find matrix reveal ATCOT2

to RCDT2

Column (m) = CDT2/COT2

Raw (n) = COT2

ATCOT2

Define raw (m) = (da+db)/2

Transpose COT2 matrix n x

m to TCOT2 mxn

Append Remaider ATCOT2

to TCOT2

Figure 17: Remaining COT2

We should find original ATCOT2 size to define column

of matrix combine dummy chipper text and original chipper

text, as depicted in Figure 18 below:

Figure 18: combined dummy chipper text and original chipper text.

Column matrix of B then arranged to new matrix m x n,

where m is a factor of function f(da,db) and n is size of COT2

divided by factor.

Figure 19: ATCOT2 Matrix

Transpose Position : Bmn => Anm

Figure 20: COT2 Matrix

And remaining ATCOT2 will be substituted directly to COT2 :

Figure 21: Remaining COT2 will be append to COT2

Yohan Suryanto et al ,Int.J.Computer Technology & Applications,Vol 4 (1), 43-50

IJCTA | Jan-Feb 2013 Available [email protected]

47

ISSN:2229-6093

Page 6: DUAL KEY TRIPLE ENCRYPTION TEXT BASED … · Abstract — Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography is a ... It combines layer 1 and layer

C. Level 3 Decryption

Third Level decryption using reshifting and resubstitution

Character Map For Original FileDiff

Key A

If CMO [j] == DKA [i] then

interchange position

Map A

Ref Character Map

For h = 0; h < Baris Asli

i = 32 x h

For j = 0; j < 62; j++

If COT [i] == MA [j] then

replace COT[i] with RCM[j]

Chipper Original Text

For k = 1; k < 32; k++

If (j+k-62) < 0 :

COT(i+k) = COT (j+k) - MA(j+k)

Else :

COT(i+k) = COT (j+k) - MA(j+k-62)

Plain Text

Length Asli = LA

Baris Asli = LA/32

Sisa Asli = LA % 32

Rest Plain text :

For j = 0; j < 62; j++

If PT [i] == MA [j] then

replace PT[i] with RCM[j]

Figure 22: Level 3 Decryption process

Differentiated Key A is used to rearrange character map

for the chipper text. In this project, we use original CMO

Map which arranged same as encryption method as depicted in Figure 6.

A correlated MAP A with Diff Key A than is used to

character substitution and window subtraction method.

Chipper original text (COT) will be arranged in 32 columns.

The every first column COT[i] will be compared with MAP A,

if the COT[i] matched with MAP A[j] than COT[i] will be

replaced with RCM[j]. The COT in column 2 until 32 than

will be subtracted with window MAP A. The whole process

will produce original text.

VI. ANALYZE

Proposed layer 1 encryption, using character substitution

for every 32 character and employ window substitution is

developed to aim faster processing time but still maintaining

high security level. We will compare the processing time

using this method again fair character mapping method.

Program v5.2 use proposed layer 1 encryption, meanwhile

program v5.0 use fair character mapping as layer 1 encryption.

We measure processing time of layer 1 encryption and layer 3

decryption using different file size as depicted Table 1.

As we can see from Figure 23, processing time of proposed

encryption method is much faster than fair character mapping.

The time ratio is varies depend on the original file size and

dummy file size. From Table 1, the proposed method can achieve faster processing time, for more than 21 times faster

than using fair character mapping.

Figure 23: Comparison layer 1 encryption method

Table 1: Completion Time Ratio between proposed encryption method

and fair character mapping

Size (kB) v5.2 v5.0 Time Ratio

1,000 0.189 4.140 21.9

2,004 0.200 5.027 25.2

3,151 0.209 5.597 26.8

4,070 0.214 5.628 26.3

5,063 0.220 6.370 29.0

Comparison of decryption completion time between

proposed method and fair character mapping could be

depicted in Figure 24 below.

Figure 24: Comparison layer 3 decryption method

Table 2: Completion Time Ratio between proposed decryption method

and fair character mapping

Size (kB) v5.2 v5.0 Time Ratio

1,000 0.029 0.546 19.1

2,004 0.060 1.125 18.7

3,151 0.082 1.860 22.8

4,070 0.107 2.330 21.7

5,063 0.132 2.684 20.3

0.000

1.000

2.000

3.000

4.000

5.000

6.000

7.000

- 2,000 4,000 6,000

Tim

e (S

eco

nd

)

File Size (kB)

Comparison of Time Performance Encryption in

Layer 1 between v5.0 dan v5.2

v5.2

v5.0

0.000

0.500

1.000

1.500

2.000

2.500

3.000

- 2,000 4,000 6,000

Tim

e (S

eco

nd

)

File Size (kB)

Comparison of Time Performance Decryption in

Layer 3 between v5.0 dan v5.2

v5.2

v5.0

Yohan Suryanto et al ,Int.J.Computer Technology & Applications,Vol 4 (1), 43-50

IJCTA | Jan-Feb 2013 Available [email protected]

48

ISSN:2229-6093

Page 7: DUAL KEY TRIPLE ENCRYPTION TEXT BASED … · Abstract — Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography is a ... It combines layer 1 and layer

From Table 2, we can see that the proposed method can

achieve faster decryption processing time, for about 20 times faster than using fair character mapping.

For Second Level Encryption we will compare efficiency

between proposed method using shuffle and text insertion

(steganography) and the LSB method. Assuming we use the

same dummy text for proposed method with size 6,203 kB

and use image 40,504 kB for 5 original text. We use bigger

image size, compare to text dummy size, due to LSB

technique require at least 8 pixel for every byte of message.

Comparison of chipper text size using both method could be

depicted in Table 3 below.

Table 3: Chipper text size comparison between proposed layer 2 method

and LSM method No

File

Name

Proposed Method LSB Method

PTS CTS PTS CTS

1 File1 1,000

7,204

1,000

40,504

2 File2 2,004

8,208

2,004

40,504

3 File3

3,151

9,354

3,151

40,504

4 File4

4,070

10,274

4,070

40,504

5 File5

5,063

11,266

5,063

40,504

6 dummy 6,203 - 40,504

Notes: PTS : Plain Text Size (kB)

CTS : Chipper Text Size (kB)

As we can see in Figure 25 below, using the proposed

steganography method or LSB method, efficiency is varies

depend on the size of dummy file or dummy image and the

original message. Clearly that, efficiency using the proposed

method, we can achieve higher efficiency than LSM method.

Using proposed method we can achieve as high as 50% efficiency, meanwhile using LSB method can only achieve as

high as 12.5% efficiency.

Figure 25: Efficiency of proposed layer 2 steganography and LSB method.

Combining our proposed layer 1 and layer 2 encryption

method with standard encryption like AES, only add small fraction of total processing time as depicted in Table 4 below.

Table 4: Percentage of L1 and L2 encryption processing time to overall

process

File Size

(kB)

Layer

1

Layer

2

Layer

3

Total L1+L2/

Total

1,000 0.189 0.132 0.984 1.246 25.8%

2,004 0.200 0.170 1.074 1.505 24.6%

3,151 0.209 0.205 1.183 1.655 25.0%

4,070 0.214 0.229 1.308 1.816 24.4%

5,063 0.220 0.261 1.415 1.960 24.5%

Comparing to overall process, the proposed layer 1 and

layer 2 take about 25% of overall process. As we can see in

Figure 26 below, encryption process of layer 1 and layer 2 is

much faster than standard AES encryption.

Figure 26: Comparison of processing time for each encryption level

Similar with the encryption process, in decryption side,

our L2 and L3 proposed decryption method only take about

20 % of overall decryption process as can be seen in Table 5

below.

Table 5: Percentage of L2 and L3 decryption processing time to overall

process

File Size

(kB)

Layer

1

Layer

2

Layer

3

Total L2+L3/

Total

1,000 0.862 0.122 0.029 1.002 15.0%

2,004 1.015 0.157 0.060 1.299 16.7%

3,151 1.149 0.172 0.082 1.311 19.3%

4,070 1.254 0.224 0.107 1.652 20.0%

5,063 1.346 0.245 0.132 1.782 21.2%

As we can see in Figure 27 below, decryption process of layer 2 and layer 3 is much faster than standard AES

decryption.

0.0%

5.0%

10.0%

15.0%

20.0%

25.0%

30.0%

35.0%

40.0%

45.0%

50.0%

File1 File2 File3 File4 File5

Layer 2 Efficiency of Steganography

doc

pdf

htm

LSB Method

0.000

0.500

1.000

1.500

2.000

2.500

- 2,000 4,000 6,000

Tim

e (S

eco

nd

)

FIle Size (kB)

Comparison of each layer encryption process

Layer 1:

Window

Substitution

Layer 2: Steganography

Layer 3: AES

Yohan Suryanto et al ,Int.J.Computer Technology & Applications,Vol 4 (1), 43-50

IJCTA | Jan-Feb 2013 Available [email protected]

49

ISSN:2229-6093

Page 8: DUAL KEY TRIPLE ENCRYPTION TEXT BASED … · Abstract — Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography is a ... It combines layer 1 and layer

Figure 27: Comparison of processing time for each decryption level

From further invesFile3tion, we found that processing time,

either encryption or decryption using dual key triple encryption is correlated with the total size of chipper text file.

The chipper text is combination between original file and

dummy file. The bigger of the chipper text file, processing

time take longer. But as depicted and Table 6 below,

processing speed in term of kB/second for encryption and

decryption is tend to stable. For Encryption, average

processing speed is 5,550 kB/second and for decryption

average processing speed is 6,359 kB/second.

Table 5: Average processing speed of Dual Key Triple Encryption

File Name File1 File2 File3 File4 File5

Original File

Size (kB)

1,000 2,004 3,151 4,070 5,063

Dummy file

size (kB)

6,203 6,203 6,203 6,203 6,203

Chipper text (kB)

7,204 8,208 9,354 10,274 11,266

Encryption

avg time 1.375 1.505 1.655 1.816 1.960

kB/s 5,239 5,455 5,651 5,658 5,748

Decryption:

avg time 1.108 1.299 1.453 1.652 1.782

kB/s 6,500 6,318 6,436 6,219 6,322

VII. CONCLUSION

Using Dual Key Triple Encryption program, we can show

that the proposed layer 1 encryption can achieve much faster

time than fair character mapping. This technique has better

processing time more than 21 times faster than fair character

mapping. In decryption process the same method can achieve

about 20 times faster than fair character mapping.

Proposed steganography technique in layer 2 encryption has higher efficiency compare to LSB method.. We can

achieve 50% efficiency compare to 12.5% in LSB technique.

Combining both proposed methods, we can achieve higher

security level by maintaining faster processing time and

reduce chipper text size.

It can also be used together with AES to increase security

level, yet still maintaining fast overall processing time and

high efficiency ratio. Employ layer 1 and layer 2 encryption to

AES encryption process, only take 25 % of total overall

process. Mean while in decryption process only take less than

22% of the overall process.

REFERENCE

[1] Behrouz A. Forouzan, ―Cryptography and Network Security‖,

McGraw-Hill International edition, 2008.

[2] S. Usha, G.A.S.Kumar, K. Boopathybagan, ―A Secure Triple Level

Encryption Method Using Cryptography and Steganography ‖,

ICCSNT, vol. 2, 2426 December 2011, Chennai, India, Page(s): 1017–

1020.

[3] D. Bhattacharyya, P. Das, ; D. Ganguly, S. Mukherjee, S.K.

Bandyopadhyay, and Tai-hoon Kim, " A Multi Layer Security Model

for Text Messages‖, IACC, 67 March 2009, Kolkata, India, Page(s):

603–608.

[4] N.V. Rao, and J.T.L. Philjon, ―Metamorphic cryptography — A

paradox between cryptography and steganography using dynamic

encryption‖, ICRTIT, 35 June 2011, Chennai, India, Page(s): 217 – 222.

[5] Joseph Raphael, and Dr.V. Sundaram, ―Cryptography and

Steganography – A Survey‖, IJCTA, vol.2, 03 February

2011,Coimbatore, India, Page(s) : 626-630.

[6] Dipti Kapoor Sarmah, and Neha Bajpai, ―Proposed System for data

hiding using Cryptography and Steganography‖, IJCA, vol. 2, No. 9,

710 October 2010, India

[7] AESCrypt company, ―Program AESCrypt 3.08‖, 2011,

www.aescrypt.com

0.000

0.200

0.400

0.600

0.800

1.000

1.200

1.400

1.600

1.800

2.000

- 2,000 4,000 6,000

Tim

e (S

eco

nd

)

File Size (kB)

Comparison of each layer decryption process

layer 1: AES

Layer 2:

Steganography

Layer 3: Window Substitution

Total

Yohan Suryanto et al ,Int.J.Computer Technology & Applications,Vol 4 (1), 43-50

IJCTA | Jan-Feb 2013 Available [email protected]

50

ISSN:2229-6093