You are on page 1of 17

Key Generation using Image DB

for Inter-organization
Communication
Pilla Dinesh
Under the guidance of
K. Vamsee Krishna
Sreenidhi Institute of Science and Technology

Abstract
This research was completely a novel approach involving
image processing as well as basic cryptography.
With the advent of technology and complex processing end
systems, the attackers are decrypting the encrypted messages
in a stipulated time.
To avoid that situation, we use image as a key to encrypt the
message and also a time server to limit the data exposure for a
certain amount of time.

Now our idea is to use image as a key to encrypt the message.


The properties of the image such as pixel value, Hue,
Saturation, Intensity, etc., serves as keys to encrypt the
message.
Each key is used to encrypt each character present in the text
which makes the system complex and difficult to decrypt.
The time stamping technique is used to select a group of
images and the properties of the images from the database
which serves as a key to encrypt a character assuming that the
image database is exchanged in person or through a secure
channel.

Problem
We are estimating that 2048-RSA algorithm will survive up to
2020.
-RSA Security LLC
If this is the case one or the other time the legal information will
fall in the false hands.

Existing system
The system use an asset like an RSA token for
authentication in banking and to connect to VPNs.
The system uses external certificates for additional
security.

Proposed System

The proposed system requires image Data Base (File System in our case).

There are mainly two algorithms

Image Property Algorithm.


Time extraction algorithm

Image Property Extraction is used to extract the image properties.

Time Extraction is used to extract a number that provides the relaxation for the
decryption.

Both these properties are used to select an image and the properties of the images

System Architecture
(Key Generation using Image DB for Inter-organization Communication)

Time Extraction Algorithm


The UNG algorithm collects the time from one of the
following servers:
NIST, Boulder, Colorado
ATOMICTIME_SERVER="132.163.4.101";
NIST, Gaithersburg, Maryland
ATOMICTIME_SERVER="129.6.15.28";
NIST, Gaithersburg, Maryland
ATOMICTIME_SERVER="129.6.15.30";

The unique number is generated using the following time


format which is obtained from the server
Server Time: 57159 15-05-17 17:40:11 50 0 0 193.4 UTC (NIST)

From the Server time the numbers were collected in the same
order leaving the others from half part of the minutes as
follows 57159150517174, which helps in providing the
relaxation time for decrypting the text.
Now manipulate the data in such a way that it will produce a
7-digit decimal number.
The example of the unique number that is generated from the
UNG algorithm
The Unique number generated with the Time server with the IP
129.6.15.30 is as follows:
6233089

Image Property Extraction


The image property services used are as follows:
1. HMMD Service
2. HSL Service
3. HSV Service
4. LAB Service
5. LUV Service
6. RGB Service
7. XYZ Service
8. YCbCr Service
9. YUV Service

Key Generation
The image serves as the source for the key generation and the
and all the nine properties are calculated for each and every
pixel in the image and the order of the services is generated by
the time extraction algorithm.
The size of the property extracted using the image is 8 bit and
hence the size of the key is 8 bits and number of keys is as
follows
size of the image number of properties extracted using the image

In our example number of keys used are


size of the image 72 bits

Complexity Analysis
The complexity of the algorithm lies in two areas first one is
the complexity in calculating the keys from the image and the
other is the encryption algorithm used in this algorithm the
complexity is as follows:
9*O(P)+O(C)
Where P is the number of pixels in the image and C is the
number of characters present on the image.

Space analysis based on the algorithms


used for the encryption

Time analysis based on the algorithms used


for the encryption

Conditions
The image database must be exchanged in person.
The max and min time to decrypt is
Max time : 20min execution time to encrypt.
Min time : 10min

Hardware Requirements
Operating systems: Windows XP
RAM: 1 GB
Processor : Intel Atom processor 1.6GHZ
Programming language: JDK 1.8
Other requirements: Image database

Conclusion and Future Scope


Since each character is encrypted with a separate key it is very
difficult to decrypt the message.
Since the data exposure is limited the information is more
secure.
Hence it is very reliable and secure form of encryption.
With the advent of technology the encryption techniques must
move from a finite set of keys to encrypt the text to large
number of keys which make the system complex but secure

Any
Queries?

You might also like