Message Security Using Armstrong Number and Authentication Using Color PDF
Message Security Using Armstrong Number and Authentication Using Color PDF
Page | 575
Gayatri et al., International Journal of Advanced Research in Computer Science and Software Engineering 4(1),
January - 2014, pp. 575-579
Page | 576
Gayatri et al., International Journal of Advanced Research in Computer Science and Software Engineering 4(1),
January - 2014, pp. 575-579
Further a combination, substitution and permutation methods are used with Armstrong number to ensure data security. S
For encryption it converts each letter to its ASCII equivalent by substitution method and permutation is done with the
help of Armstrong number. Later it convert that data into matrix form.It performs permutation process by using matrices
[9]. Receiver will perform in reverse manner.
74 111 432 85 72 74 73
A=
86 94
76 131
68
74
111 72
492 74
85 73
B=
3
7
9 49
27 343
1
1
1
Page | 577
Gayatri et al., International Journal of Advanced Research in Computer Science and Software Engineering 4(1),
January - 2014, pp. 575-579
C=B X A
C=
858 1273
4566 7339
28458 47545
3442
22252
151258
807
4347
27399
-7/24 1/3
1/56 -1/42
7/4 -5/6
-1/24
1/168
1/12
Step3: Multiplication of the decoding matrix with the encrypted data is as follows
D X C=
-7/24 1/3
1/56 -1/42
7/4 -5/6
86 94
76 131
68
74
-1/24
1/168
1/12
858 1273
3442
4566 7339 22252
28458 47545 151258
807
4347
27399
111 72
492 74
85 73
74 111 432 85 72 74 73
82
74 111 432 85 72 74 73
1 27 343 1 3 7 1
73 84
89 84 69 67 72
67 85 82 73 84 89 84 69 67 72
C U R I T Y T E C H
B. Special case
There may occur a situation in which Armstrong number contains zero as one of the digit of number. In such
case inverse of matrix cannot be found. In such case we can use Unimodular matrix. [3], [10]
2014, IJARCSSE All Rights Reserved
Page | 578
Gayatri et al., International Journal of Advanced Research in Computer Science and Software Engineering 4(1),
January - 2014, pp. 575-579
VI. CONCLUSION
Thus we addressed the problem of security of secret message. Hence a technique is proposed in which Armstrong
numbers are used instead of prime numbers to provide more security. The confidential areas like military, governments
are targeted by the system where data security is given more importance. Colors, key values and Armstrong numbers
which are three set of keys in this technique makes sure that there is secured message or data transmission and is
available to authorized person.
ACKNOWLEDGEMENT
It is our pleasure to express our sincere gratitude to Trinity College of Engineering and Research, Pune for providing us
an opportunity to do our work on Paper. We sincerely thank to our project guide Prof.Ranjeetsingh Suryawanshi for
guidance and encouragement in carrying out this paper work. We will forever remain grateful for constant support by
guide, in making this paper.
REFERENCES
[1]
S. Pavithra Deepa,S. Kannimuthu, V. Keerthika., Security Using Colors and Armstrong Numbers, Proceedings
of the National Conference on Innovations in Emerging Technology-2011. India.17 & 18 February, 2011.pp.157160.
[2]
Gordon L. Miller and Mary T. Whalen, Armstrong Numbers, University of Wisconsin, Stevens Point, WI 54481
(Submitted October 1990).
[3]
S.Belose, M.Malekar , G.Dharmawat, Data Security Using Armstrong Numbers, International Journal of
Emerging Technology and Advanced Engineering. Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue
4, April 2012).
[4]
M.F.Armstrong A brief introduction to Armstrong Numbers .
[5]
Chavan Satish, Lokhande Yogesh, Shinde Pravin, Yewale Sandeep, Sardeshpande S. A, Secure Email using
Colors and Armstrong Numbers over web services, International Journal Of Research In Computer Engineering
And Information Technology VOLUME 1 No. 2.
[6]
M.Renuga Devi, S.Christobel Diana, Enhancing Security in Message Passing Between Sender and Receiver
Using Colors and Armstrong Numbers, International Conference on Computing and Control Engineering(ICCCE
2012), 12 & 13 April, 2012
[7]
G.Ananthlakshmi, S.Ramamoorthy A Multilevel Encryption Scheme for Secure Network Data Transfer.
International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012.
[8]
Atul Kahate, Cryptography and Network Security, Tata McGraw Hill Publications
[9]
http://aix1.uottawa.ca/~jkhoury/cryptography.htm
[10] http://mathworld.wolfram.com/UnimodularMatrix.html
Page | 579