Mathematical Solution of ULTE Based Salt Generation Password Based Key Derivation Function (PBKDF)

Authors

  • Md Alam Hossain Jashore University of Science & Technology, Bangladesh
  • Ahsan- Ul-Ambia Islamic University, Kushtia, Bangladesh
  • Nazmul Hossain Jashore University of Science & Technology, Bangladesh
  • Mustafizur Rahman Akhond Jashore University of Science & Technology, Bangladesh
  • Nasim Adnan Jashore University of Science & Technology, Bangladesh
  • Sayed Md Galib Jashore University of Science & Technology, Bangladesh

DOI:

https://doi.org/10.54536/ajaset.v6i2.368

Keywords:

ULTE, PBKDF, PMMLCG, GSFRG, Super-prime, ULSI

Abstract

In modern life, users use the cloud spaces for storing important data and valuable information. To avoid security problems, every cloud storage provider requires help from several security mechanisms. Every mechanism has its own security scheme. Most of them use the PBKDF (Password-Based Key Derivation Function) and Salt for generating encryption keys. By analyzing, we found that unique and random Salt plays a vital role for generating keys. But to create powerful keys, we must avoid pseudorandom generators for making salt because hackers can easily crack the key by using it. We have to take inputs from beyond expected sources. We proposed an algorithm by which we can generate Salt by using the client’s real-time environmental information known as Location Information of user, User Time Information with Entropy Data at key generation time. In this paper, we focus on simulation result and compare each algorithm with the proposed algorithm ULTE. Simulation result represents the whole statistical distribution as stated in the algorithm. The result shows that ULTE has provided excellent performance than other algorithms.

Downloads

Download data is not yet available.

References

Abdullah Al- Mamun, Shawon S. M. Rahman, Tanvir Ahmed Shaon and Md. Alam Hossain (2017). Security Analysis of AES and Enhancing its Security by Modifying S-Box with an Additional Byte. International Journal of Computer Networks & Communications (IJCNC), 9(2). 69-88, DOI: 10.5121/ijcnc.2017.9206.

Aleem A. and C. R. Sprott (2013). Let Me in the Cloud: Analysis of the Benet and Risk Assessment of Cloud Platform. Journal of Financial Crime, 20(1), 6-24. http://dx.doi.org/10.1108/13590791311287337

Anitha Y. (2013). Security Issues in Cloud Computing- A Review. International Journal of Thesis Projects and Dissertations (IJTPD), 13, 1-6.

Barker, E., J. Kelsey (2015). Recommendation for Random Number Generation Using Deterministic Random Bit Generators- Revision 1. Computer Security Division, Information Technology Laboratory, NIST SP 800-90A. http://dx.doi.org/10.6028/NIST.SP.800-90Ar1

Barker, E., J. Kelsey (2015). Recommendation for Random Number Generation Using Deterministic Random Bit Generators- Revision 1. Computer Security Division, Information Technology Laboratory, NIST SP 800-90A. http://dx.doi.org/10.6028/NIST.SP.800-90Ar1

Chen, S., S. Nepal, and R. Liu (2011). Secure Connectivity for Intra-cloud and Inter-cloud Communication”. 40th International Conference on Parallel Processing Workshops (ICPPW) (pp. 154-159).

Chen L. (2009). Recommendation for Key Derivation Using Pseudorandom Functions. Computer Security Division, Information Technology Laboratory, NIST SP (pp. 800-108). http://csrc.nist.gov/publications/nistpubs/800-108/sp800-108.pdf

Chen D. and H. Zhao (2012). Data Security and Privacy Protection Issues in Cloud Computing. The International Conference on Computer Science and Electronics Engineering, Hangzhou (pp. 647-651).

Das, S. K., M. A. Hossain, M. A. Sardar, R. K. Biswas, and P. D. Nath (2014). Performance Analysis of Client Side Encryption Tools. International Journal of Advanced Computer Research, 4(3), 888-897. http://accentsjournals.org/PaperDirectory/Journal/IJACR/2014/9/20.pdf

Demirkol E., Mehta S., and Uzsoy R. (2009). Benchmarks for shop scheduling problems. European Journal of Operational Research, 13, 137-141. http://dx.doi.org/10.1016/S0377-2217(97)00019-2

Dillon, T., C. Wu and E. Chang (2010). Cloud Computing: Issues and Challenges. Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications (pp. 27-33). Perth, WA.

H. Md. Alam, Ahsan-Ul-Ambia, Al-Amin and K. Rahamatullah (2017). Measuring Interpretation and Evaluation of Client Side Encryption Tools in Cloud Computing. Security, Privacy and Reliability in Computer Communications and Networks (pp. 207-239). RIVER PUBLISHERS SERIES IN COMMUNICATIONS.

H. Md. Alam, Ahsan-Ul-Ambia, Md. Al-Amin, and H. Nazmul (2017). User Location Time and Entropy (ULTE) based Salt generation for Password Based Key Derivation Function (PBKDF) in Cloud Computing. International Journal of Scientific & Engineering Research, 8(2), 1399-1408.

H. Md. Alam, Md. Kamrul Islam, Subrata Kumar Das and Md. Asif Nashiry (2012). CRYPTANALYZING OF MESSAGE DIGEST ALGORITHMS MD4 AND MD5. International Journal on Cryptography and Information Security(IJCIS), 2(1), 1-13.

Hasan, R., Prapti, D. R., G M, M. ., & Chakraborty, T. R. (2021). System Requirement Specification of Mobile Apps for shrimp farming in Shyamnagar of Bangladesh. American Journal of Agricultural Science, Engineering, and Technology, 5(2), 1–10. https://doi.org/10.54536/ajaset.v5i2.66

Islam, M. K., M. A. Hossain and M. A. Nashiry (2012). Security of cryptographicalgorithm sha and md5, Institutional Engineering and Technology (IET), 2(2), 28-33.

K. D. Subrata, H. Md. Alam, S. Md. Arifuzzaman, B. Ramen Kumar, and N. Prolath Dev (2014). Performance Analysis of Client Side Encryption Tools. International Journal of Advanced Computer Research (IJACR), 4(3), 888- 897. DOI: 10.19101/IJACR

Lewis T. G., and Payne W. H. (1973). Generalized Feedback Shift Register Pseudorandom Number Algorithm.” Journal of the ACM (JACM), 20(3), 456-468. http://dx.doi.org/10.1145/321765.321777

Lin, H. C., S. Babu, J. S. Chase, and S. S. Parekh (2009). Automated Control in Cloud Computing: Opportunities and Challenges. 1st Workshop on Automated control for data centres and clouds (pp. 13-18). New York, NY, USA.

Nepal, S., C. Friedrich, C. Wise, R. O. Sinnott, J. J. Jaccard, and S. Chen (2016). Key Management Service: Enabling Secure Sharing And Deleting Of Documents On Public Clouds. Services Transactions on Cloud Computing (STCC), 4(2), 15-31.

Nurmi, D., R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff and D. Zagorodnov (2008). The eucalyptus open-source cloud computing system. 12th International Conference on Cloud Computing and Its Applications (pp. 1-8). Washington, DC, USA.

Pring, B., R. H. Brown, A. Frank, S. Hayward and L. Leong (2009). Forecast: Sizing the cloud; understanding the opportunities in cloud services, Gartner Inc., Tech. Rep.G00166525. 27(3).

Pearson, S. (2009). Taking account of privacy when designing cloud computing services. The CLOUD '09 Proceedings of ICSE Workshop on Software Engineering Challenges of Cloud Computing (pp. 44-52). IEEE Computer Society, Washington, DC, USA.

Sinha, N., and L. Khreisat (2014). Cloud computing security, data, and performance issues. 23rd Wireless and Optical Communication Conference (WOCC) (pp 1-6), Newark, NJ.

Somani, U., K. Lakhani, and M. Mundra (2014). Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing. 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010), Delhi, India.

Turan, M. S., E. Barker, J. Kelsey, K. A. McKay, M. L. Baish, and M. Boyle (Jan. 2016). Recommendation for the Entropy Sources Used for Random Bit Generation. Computer Security Division, Information Technology Laboratory, NIST DRAFT Special Publication 800-90B. http://dx.doi.org/10.6028/NIST.SP.XXX

Wang, C., Q. Wang, K. Ren and W. Lou (2010). Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. The IEEE 29th Conference on Computer Communications in INFOCOM, San Diego (pp. 1-9).

Zissis D. and D. Lekkas (2012). Addressing Cloud Computing Security Issues. Future Generation Computer Systems, 28(3), 583-592. https://doi.org/10.1016/j.future.2010.12.006

Downloads

Published

2022-07-07

How to Cite

Hossain, M. A., Ul-Ambia, A.-., Hossain, N. ., Akhond, M. R., Adnan, N. ., & Galib, S. M. (2022). Mathematical Solution of ULTE Based Salt Generation Password Based Key Derivation Function (PBKDF). American Journal of Agricultural Science, Engineering, and Technology, 6(2), 8–17. https://doi.org/10.54536/ajaset.v6i2.368