NIYANTRA Documents

cancel
Showing results for 
Search instead for 
Did you mean: 

NIYANTRA 2013 - Random Key MTEA Security

(Make sure you follow all the 3 steps involved in submission. This is only Step 2 of 3. For details, visit http://bit.ly/16iNfUL)

Contact Information

Name of the College : Amrita School of Engineering, Bangalore

Name of the Team Members along with their respective current semester : Anshika Upadhyay (B.Tech, ECE 7th sem), Sompalli Neeharika (B.Tech, ECE 7th sem), Songa Divya (B.Tech, ECE 7th sem)

E-Mail Address & Phone Number of the Team Leader : email id : aulindalive@gmail.com, phone no.: 8904884712, 9945619811

Name of the Faculty Guide : Prof. S. Ravishankar

E-Mail Address & Phone Number of the Faculty Guide : email id: s_ravishankar@blr.amrita.edu, phone no.: 9448046077

Project Information

Project Title: Random Key MTEA Security

Hardware & Software Used: LabVIEW, Matlab


What challenge/problem are you trying to solve through your application:

Design a robust and highly efficient security algorithm that can be used in embedded systems that are security intensive and at the same time critical to operating at very low power and having very less ardware and software overhead.

How does your application solves the above mentioned challenge/problem:

We have used Modified TEA(MTEA) encryption algorithm as the base of this project as it is very efficient, low power consuming and quite strong. We have strengthened the algorithm by introducing randomness in MTEA key, i.e., by avoiding key storage and rather creating pseudo-random function in terms of 'n' (n=no. of systems in communication network) which is known to all systems, so that the key is protected.

Also, we introduce 'Validation'. In this, we verify the systems requesting to join the network. Any system seeking permission to join is required to send a code to the central monitoring system. The code should be unique in terms energy. Default energy Eo is set and each newcoming system must send a code that is integral multiple of Eo*2*pi/n. This is because it's visualised as a circle with constant radius Eo with equally spaced systems as points on the circle. Every two consecutive points are at distance of Eo*2*pi/n and every two random points are at distance of integral multiple of that. This concept looks simple but is derived from Information Coding techniques and ensures uniqueness in identification.

Thus, this scenario strengthens MTEA and makes it ready for security intensive, critical to low power embedded applications like RFID or electronic voting machines to use this. Even other security intensive application like ATMs can use this as it would ensure high level of security.

Description of Project:

Data security has become increasingly inevitable over the past few decades with the overwhelming

need of complex algorithms to encrypt and thus protect the data over communication channels. But the

huge amounts of data also call upon the need to fabricate effective algorithms consuming less power

and having simple implementation not causing unnecessary hardware or software overhead.

This project is aimed at strengthening the existing symmetric key algorithm Modified Tiny Encryption

Algorithm (MTEA) using digital communication techniques. MTEA is a symmetric key algorithm used

in low power systems and is very simple to implement in embedded systems. Thus, it is a preferred

algorithm to use in embedded systems. Although MTEA successfully overcomes the problems

encountered in TEA such as trouble of related keys (that made it an option for use as hash function)

with the help of linear feedback shift register (LFSR) and looks much more attractive than TEA for use

in embedded systems for its increased reliability with the same simplicity of TEA, its use gets limited

because of its symmetric key nature and seemingly relative ease of key cracking. The aim is to

eradicate the problem 'symmetric key' (which is that the same key is used by all systems participating

in the communication setup to encrypt and decrypt the data) by pseudo-randomizing the key and builtin

validation of joining in systems to virtually remove the chances of security break, hence, making this

low-power, extremely simple and incredibly strong algorithm universal for use in multiple system

based security systems such as in networking and electronic voting machines rather than its present two

system use for example in RFID security.

Since this project is based on a simple and effective algorithm such as MTEA that needs just a few

lines of coding and claims to overcome the most nagging problems of symmetric key and proper builtin

validation to ensure the safe, easy and effective implementation of multiple system communication

setup security, it makes a very viable security system that wouldn't be costly and can be used in the

most highly sensitive organizations such as defence to use this for their data security. It is not expected

to get outdated for a very long time since it would be virtually impossible to crack the code for

validation and then to crack the pseudo randomness of the key (if the first task is achieved).

Insert Images Here:


YouTube Link of Video:

15082013183.jpgTEA_InfoBox_Diagram.png


Insert the Video here:

http://www.youtube.com/watch?v=hQSHiipYGn8&feature=youtu.be

Please see this video.





Comments
Bhupinder
NI Employee (retired)
on

Thank You for your submission.

Please ensure you have also filled the form (http://natinstindia.com/national_instruments/NIYantra-2013-Round2.html ) and completed the submission process. Ignore this if you have already filled this form.

For any help, click http://bit.ly/14OMW3x

aasakti
Member
Member
on

Very nice idea!! Security in low power systems is greatly overlooked. This idea stands out throwing light on a very important issue!

June1011
Member
Member
on

A very different idea and very useful in the present scenario. Looks really promising and exciting!

Anuroopa
Member
Member
on

Looks different from the rest as no one has touched upon implementing an effective security algorithm catering to the requirements of low power embedded systems and communication systems. A fresh idea and admirable one. Good work, nice thought.

animaupadhyay
Member
Member
on

good idea!

Alok60
Member
Member
on

It is a very good idea. I suggest that you develop it further and send it to me on email. I would like to forward it to professor Rajat Moona, DG of CDAC who is country's foremost expert in encryption and PKI. It is wonderful see a young person do such wonderful work

avlok
Member
Member
on

Excellent job, done by young Indian Scientist in South India. It seems that this young scientist is going to contribute a lot in Indias future.

avlok
Member
Member
on

Excellent

Sahab
Member
Member
on

Excellent idea...........innovative thinking.........much of practical application.

Contributors