A NEW ORTHOGONAL CRYPTOGRAPHIC SYSTEM FOR DATABASE SECURITY BASED ON CELLULAR AUTOMATA AND HASH ALGORITHM

In this paper, we have developed a new orthogonal cryptographic system for database security that has used both Cellular automata and Hash Algorithm. Our Algorithm consists of two different parts; Encryption/Decryption of database tables as well as the generation of the Authentication Tag for the activation of the attack alarm for the database tables while it is unlocked and in protected mode but it has been accessed by the illegal users. Our proposed orthogonal cryptosystem is considered to be symmetric algorithm and uses a common key for both encryption and decryption processes as oppose to the asymmetric one that requires two keys, private and public keys. Since our transformation matrix is orthogonal, we have used the property of orthogonal matrix to calculate its inverse based on its matrix transpose rather than direct matrix inversion to save the calculation time during the decryption process. We also have generated secret keys by applying the internal rules of cellular automata on the Malakooti Transform (M-T) to obtain the secret key matrix that can be used to be multiplied with the matrix of ASCII code obtained from the records of the database. To apply another level of security on the resulting encrypted code, the Hash values obtained from each record are multiplied by the elements of the secret key matrix and the XOR operation is performed on the resulting values and the elements of the encrypted codes. In addition, we also proposed a robust and fast algorithm for the database security and authentication that automatically and accurately will generate the Hash values for the entire rows of the database tables to obtain a unique Hash value for each table. This unique hash value can be used to check the validity of the data inside the database and guarantee the authentication of all information in each database. Our proposed method is capable of detecting any slight change that might be occurs on the database while it is in the protected mode. The generated Hash value will be calculated from the records elements of the database periodically to be compared with the value of the Hash value stored outside database for the authentication. Should the generated Hash value be different from the stored Hash value, the alarm flag would be activated to inform the administrator about unauthorized change of database while in protected mode via SMS or Email.

[1]  Luc Bouganim,et al.  Database Encryption , 2011, Encyclopedia of Cryptography and Security.

[2]  Mohammad V. Malakooti,et al.  A lossless digital encryption system for multimedia using orthogonal transforms , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).

[3]  Ehud Gudes,et al.  The application of cryptography for data base security , 1976, AFIPS '76.

[4]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[5]  Osama S. Faragallah,et al.  Security Analysis of Reverse Encryption Algorithm for Databases , 2013 .

[6]  Franco Bagnoli,et al.  Cellular Automata , 2002, Lecture Notes in Computer Science.

[7]  E. F. Codd,et al.  Cellular automata , 1968 .