SlideShare une entreprise Scribd logo
1  sur  13
siri-bhoovalaya.org
Presentation on 6th January 2020
at
107th Indian Science Congress, 3-7 January, 2020 at Bengaluru
Kumudendu Encryption Scheme
An Efficient & Versatile Indian Cryptographic System
Kumudendu Encryption Scheme:
An Efficient and Versatile Indian
Cryptographic System
by
Er. Anil Kumar Jain
FIETE, FIE(I), SMCSI, LM-ISCA
email: jain.anilk@gmail.com
web-site: siri-bhoovalaya.org
107th Indian Science Congress, 3-7 January, 2020 at
Bengaluru
Siri Bhūvalaya manuscript at National Archives of India
siri-bhoovalaya.org
Siri Bhūvalaya :Historical Backdrop
Period : about 1000 years ago
Setting : Ancient Karnataka, Near Bengaluru
Focal Characters :
Muni Kumudendu - The Outstanding inimitable
Genius who scripted this inimitable epic.
Mahamata Mallikabbe - The Ardent Benefactor who
distributed copies of Siri Bhūvalaya – one of these
copies survived to be discovered in twentieth century.
End of Scene: Wonderful Masterpiece laid into oblivion for
next 1000 years
siri-bhoovalaya.org
“
Siri Bhūvalaya: Resurrection
Period : Early 20th Century
Setting : Modern Karnataka
Focal Characters :
Dharnendra Pandit - The Protector of the
Precious Treasure
Yellappa Shastri - The arduous Redeemer who
strived resurrection efforts till his death
Karlamangalam Srikantaiah & Anantha Subba
Rao - Genuine associates of Yellappa Shastri
siri-bhoovalaya.org
Basic Elements of Siri Bhūvalaya
• Cakra : One Cakra is arrangement of numbers (in range 1 to 64) in a
matrix of 27 rows and 27 columns. This represents one page of
encrypted text, which when decrypted results in verses and shlokas.
• Bandha : A Bandha is manner in which contents from a Cakra is
revealed. Bandha basically describes the method to traverse the
27x27 matrix and substitute respective numbers into letters to
uncover the Shlokas or verses hidden therein the Cakra. There are
many Bandhas which are identified as Cakra-Bandha, Navmaank-
Bandh, Shreni-Bandha, Hans-Bandha, Anu-Bandha, Mayur-Bandha,
Saras-Bandha, Padma-Bandha etc. etc.
• Kumudendu Code Table (KCT): This table is used for substituting
Numerals in all the Chakras into corresponding Phonetic Alphabet
Characters (Mūla Varṇas)
siri-bhoovalaya.org
Basic Building Blocks of KES framework
siri-bhoovalaya.org
Kumudendu Encryption System (KES) framework of Siri
Bhūvalaya” primarily consists of two symmetric encryption
ciphers :
Mono Alphabetic Substitution Cipher : Key here is identified as
‘Kumudendu Code Table’ (KCT). Here each of phonetic alphabet
or Mūla Varṇa of the script is assigned an integer numeric value
in range 1 to 64.
Transposition Cipher : Here key is named as ‘Bandha Traversal
Path Matrix’ (BTPM). It is a matrix of 27x27 integers or a vector
of 729 integers. Here each element is a distinct integer in the
range 1 to 729, which is indicative of place of the transposed
phonetic alphabets in corresponding Cakra matrix (27x27).
Substitution Cipher Key (KCT) for different scripts
कु मुदेन्दु कोड सारणी में देवनागरी, कन्नड़ एवं ब्राह्मी लिपि के ध्वन्याक्षर
siri-bhoovalaya.org
Transposition Key :BTPM for Cakra-Bandha
siri-bhoovalaya.org
l l
2 3 4 5 6
1
2
3
4
5
6
1
2
3
4
5
6
First Chakra of Siri Bhūvalaya
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
1 59 23 1 16 1 28 28 1 1 56 59 4 56 1 1 47 16 34 1 7 16 1 1 7 56 1 60
2 53 54 47 28 1 47 45 28 7 4 59 41 4 45 1 30 47 47 45 42 53 28 51 1 52 1 1
3 1 22 1 30 2 1 2 55 30 1 7 45 47 52 1 4 1 47 1 1 1 1 53 1 52 59 52
4 59 30 2 55 55 13 16 2 53 60 1 4 16 47 48 45 16 56 56 43 45 1 56 1 4 1 13
5 47 45 1 1 22 30 51 1 2 56 38 30 4 1 1 56 1 1 16 1 57 7 56 56 1 22 1
6 54 52 52 45 1 7 55 48 1 58 52 35 28 55 1 38 45 30 55 4 47 7 45 38 45 38 1
7 1 1 1 28 13 56 55 51 54 1 1 1 1 42 2 4 4 1 43 16 47 7 1 13 4 51 4
8 28 53 47 22 8 1 53 59 38 7 43 40 1 52 59 54 30 1 45 16 1 28 23 50 7 43 43
9 1 2 45 51 30 1 52 58 48 59 47 54 4 4 1 47 45 47 56 28 1 45 1 13 7 7 7
10 55 1 53 47 56 1 1 7 1 1 2 60 48 56 1 1 16 1 1 54 1 52 17 30 54 45 45
11 59 56 52 1 45 1 55 28 52 28 1 2 1 52 54 4 43 60 48 28 1 16 23 8 53 7 1
12 2 1 53 52 43 23 2 4 16 52 44 54 1 2 42 7 1 7 47 30 28 48 47 1 54 52 16
13 45 54 23 4 28 45 45 30 1 59 1 56 28 2 54 53 38 2 2 1 28 55 40 60 4 50 28
14 2 13 47 1 1 4 17 45 1 56 1 52 56 51 1 47 55 55 45 7 2 54 1 56 7 1 1
15 23 4 53 54 59 48 13 56 1 47 23 1 2 55 16 1 1 47 40 54 16 52 1 47 60 43 60
16 45 16 43 1 7 47 1 7 1 4 54 54 1 43 28 28 7 1 2 7 52 30 1 4 47 4 13
17 42 1 54 13 1 28 1 45 42 5 48 56 1 1 1 52 54 7 1 1 2 56 56 2 43 1 1
18 56 43 22 45 56 43 2 2 56 1 8 48 59 59 7 16 53 55 53 48 1 1 46 2 30 53 1
19 47 45 1 2 54 56 56 2 55 51 4 16 7 13 30 16 1 1 4 52 52 4 54 47 2 38 1
20 1 54 60 56 54 1 60 1 1 16 40 38 17 1 47 56 33 55 1 1 59 48 1 53 7 1 1
21 1 52 16 1 60 1 30 53 30 7 47 13 13 22 8 13 45 59 54 1 2 42 54 47 53 52 53
22 16 30 1 4 52 47 56 1 28 16 1 22 59 51 1 1 7 28 53 60 7 1 16 16 1 1 58
23 4 53 56 1 52 2 13 52 38 30 45 7 1 30 56 16 1 1 1 30 48 56 54 54 55 28 45
24 1 47 47 1 28 22 1 47 1 1 45 46 1 1 47 53 55 52 1 1 7 43 2 1 1 1 43
25 1 4 53 1 45 43 16 55 52 4 47 55 45 22 51 56 1 38 13 30 2 28 56 13 56 28 55
26 4 16 46 1 1 16 1 1 1 1 1 47 59 4 8 38 58 1 1 48 1 7 22 1 1 1 60
27 52 4 30 56 53 52 54 1 30 52 1 16 54 7 58 1 30 54 1 56 51 53 56 57 56 4 60siri-bhoovalaya.org
Estimated Robustness of KES against Brute Force
Attacks
siri-bhoovalaya.org
In proposed KES, depending on the security requirements, this substitution
table can be altered in size and assignment of integers. Thus even with 64
element KCT, there are possible Factorial (64) permutations resulting in a
number with 89 digits.
Size of Transposition key can be adjusted to thwart anticipated brute-force
attacks. Preliminary estimations reveal that possible Transposition schemes
of 729 elements, of 27x27 matrix as deployed in “Siri Bhūvalaya”, amount to
Factorial (729) permutations and that results in massive number of
approximately 1772 digits. That means a brute-force attacker will have to
find correct Transposition Key out of so many possible ones. This will require
massive computational resources which is highly impractical.
Current cryptographic standards of symmetric key encryption recommend
key length of 256 bits, wherein possible key combinations are of the order
78 digits only for a brute-force attack.
Applications of KES
siri-bhoovalaya.org
KES is inherently suitable for Information Security applications on
variety of platforms using Indian Languages and Scripts.
With its variable length dual key symmetric encryption scheme, KES
can be customised for Information Security requirements of wide-
range of systems and applications.
Since it requires relatively smaller computational overhead, KES can
be efficiently deployed on systems with nominal computing
resources or even in circumstances with no machine assistance i.e.
in Manual-Mode.
A formal Comprehensive study of KES is yet to be done and all
concerned persons / organisation are invited to contribute.
siri-bhoovalaya.org
ತ ುಂಬ ಧನ್ಯವಾದಗಳು
धन्यवाद

Contenu connexe

Similaire à Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at Bengaluru (6)

"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
 
Naskah soal uas statistik 2014
Naskah soal uas statistik 2014Naskah soal uas statistik 2014
Naskah soal uas statistik 2014
 
Ujian tengah semester 2014
Ujian tengah semester 2014Ujian tengah semester 2014
Ujian tengah semester 2014
 
CTET 20th September 2015 Paper-2 Answer Key by Success Mantra
CTET 20th September 2015 Paper-2 Answer Key by Success MantraCTET 20th September 2015 Paper-2 Answer Key by Success Mantra
CTET 20th September 2015 Paper-2 Answer Key by Success Mantra
 
Time optimization & improvement quality product
Time optimization & improvement quality productTime optimization & improvement quality product
Time optimization & improvement quality product
 
Oracle cloudworld な〜んでだ?#3
Oracle cloudworld な〜んでだ?#3Oracle cloudworld な〜んでだ?#3
Oracle cloudworld な〜んでだ?#3
 

Plus de Anil Jain

Siribhoovalaya pustak shakti
Siribhoovalaya pustak shaktiSiribhoovalaya pustak shakti
Siribhoovalaya pustak shakti
Anil Jain
 

Plus de Anil Jain (6)

Symposium on Jainism and Mathematics - presentation : 2020
Symposium on  Jainism and Mathematics  - presentation : 2020 Symposium on  Jainism and Mathematics  - presentation : 2020
Symposium on Jainism and Mathematics - presentation : 2020
 
Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3
 
Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2
 
Some Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-BhoovalayaSome Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-Bhoovalaya
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Siribhoovalaya pustak shakti
Siribhoovalaya pustak shaktiSiribhoovalaya pustak shakti
Siribhoovalaya pustak shakti
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at Bengaluru

  • 1. siri-bhoovalaya.org Presentation on 6th January 2020 at 107th Indian Science Congress, 3-7 January, 2020 at Bengaluru Kumudendu Encryption Scheme An Efficient & Versatile Indian Cryptographic System
  • 2. Kumudendu Encryption Scheme: An Efficient and Versatile Indian Cryptographic System by Er. Anil Kumar Jain FIETE, FIE(I), SMCSI, LM-ISCA email: jain.anilk@gmail.com web-site: siri-bhoovalaya.org 107th Indian Science Congress, 3-7 January, 2020 at Bengaluru
  • 3. Siri Bhūvalaya manuscript at National Archives of India siri-bhoovalaya.org
  • 4. Siri Bhūvalaya :Historical Backdrop Period : about 1000 years ago Setting : Ancient Karnataka, Near Bengaluru Focal Characters : Muni Kumudendu - The Outstanding inimitable Genius who scripted this inimitable epic. Mahamata Mallikabbe - The Ardent Benefactor who distributed copies of Siri Bhūvalaya – one of these copies survived to be discovered in twentieth century. End of Scene: Wonderful Masterpiece laid into oblivion for next 1000 years siri-bhoovalaya.org
  • 5. “ Siri Bhūvalaya: Resurrection Period : Early 20th Century Setting : Modern Karnataka Focal Characters : Dharnendra Pandit - The Protector of the Precious Treasure Yellappa Shastri - The arduous Redeemer who strived resurrection efforts till his death Karlamangalam Srikantaiah & Anantha Subba Rao - Genuine associates of Yellappa Shastri siri-bhoovalaya.org
  • 6. Basic Elements of Siri Bhūvalaya • Cakra : One Cakra is arrangement of numbers (in range 1 to 64) in a matrix of 27 rows and 27 columns. This represents one page of encrypted text, which when decrypted results in verses and shlokas. • Bandha : A Bandha is manner in which contents from a Cakra is revealed. Bandha basically describes the method to traverse the 27x27 matrix and substitute respective numbers into letters to uncover the Shlokas or verses hidden therein the Cakra. There are many Bandhas which are identified as Cakra-Bandha, Navmaank- Bandh, Shreni-Bandha, Hans-Bandha, Anu-Bandha, Mayur-Bandha, Saras-Bandha, Padma-Bandha etc. etc. • Kumudendu Code Table (KCT): This table is used for substituting Numerals in all the Chakras into corresponding Phonetic Alphabet Characters (Mūla Varṇas) siri-bhoovalaya.org
  • 7. Basic Building Blocks of KES framework siri-bhoovalaya.org Kumudendu Encryption System (KES) framework of Siri Bhūvalaya” primarily consists of two symmetric encryption ciphers : Mono Alphabetic Substitution Cipher : Key here is identified as ‘Kumudendu Code Table’ (KCT). Here each of phonetic alphabet or Mūla Varṇa of the script is assigned an integer numeric value in range 1 to 64. Transposition Cipher : Here key is named as ‘Bandha Traversal Path Matrix’ (BTPM). It is a matrix of 27x27 integers or a vector of 729 integers. Here each element is a distinct integer in the range 1 to 729, which is indicative of place of the transposed phonetic alphabets in corresponding Cakra matrix (27x27).
  • 8. Substitution Cipher Key (KCT) for different scripts कु मुदेन्दु कोड सारणी में देवनागरी, कन्नड़ एवं ब्राह्मी लिपि के ध्वन्याक्षर siri-bhoovalaya.org
  • 9. Transposition Key :BTPM for Cakra-Bandha siri-bhoovalaya.org l l 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6
  • 10. First Chakra of Siri Bhūvalaya 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 1 59 23 1 16 1 28 28 1 1 56 59 4 56 1 1 47 16 34 1 7 16 1 1 7 56 1 60 2 53 54 47 28 1 47 45 28 7 4 59 41 4 45 1 30 47 47 45 42 53 28 51 1 52 1 1 3 1 22 1 30 2 1 2 55 30 1 7 45 47 52 1 4 1 47 1 1 1 1 53 1 52 59 52 4 59 30 2 55 55 13 16 2 53 60 1 4 16 47 48 45 16 56 56 43 45 1 56 1 4 1 13 5 47 45 1 1 22 30 51 1 2 56 38 30 4 1 1 56 1 1 16 1 57 7 56 56 1 22 1 6 54 52 52 45 1 7 55 48 1 58 52 35 28 55 1 38 45 30 55 4 47 7 45 38 45 38 1 7 1 1 1 28 13 56 55 51 54 1 1 1 1 42 2 4 4 1 43 16 47 7 1 13 4 51 4 8 28 53 47 22 8 1 53 59 38 7 43 40 1 52 59 54 30 1 45 16 1 28 23 50 7 43 43 9 1 2 45 51 30 1 52 58 48 59 47 54 4 4 1 47 45 47 56 28 1 45 1 13 7 7 7 10 55 1 53 47 56 1 1 7 1 1 2 60 48 56 1 1 16 1 1 54 1 52 17 30 54 45 45 11 59 56 52 1 45 1 55 28 52 28 1 2 1 52 54 4 43 60 48 28 1 16 23 8 53 7 1 12 2 1 53 52 43 23 2 4 16 52 44 54 1 2 42 7 1 7 47 30 28 48 47 1 54 52 16 13 45 54 23 4 28 45 45 30 1 59 1 56 28 2 54 53 38 2 2 1 28 55 40 60 4 50 28 14 2 13 47 1 1 4 17 45 1 56 1 52 56 51 1 47 55 55 45 7 2 54 1 56 7 1 1 15 23 4 53 54 59 48 13 56 1 47 23 1 2 55 16 1 1 47 40 54 16 52 1 47 60 43 60 16 45 16 43 1 7 47 1 7 1 4 54 54 1 43 28 28 7 1 2 7 52 30 1 4 47 4 13 17 42 1 54 13 1 28 1 45 42 5 48 56 1 1 1 52 54 7 1 1 2 56 56 2 43 1 1 18 56 43 22 45 56 43 2 2 56 1 8 48 59 59 7 16 53 55 53 48 1 1 46 2 30 53 1 19 47 45 1 2 54 56 56 2 55 51 4 16 7 13 30 16 1 1 4 52 52 4 54 47 2 38 1 20 1 54 60 56 54 1 60 1 1 16 40 38 17 1 47 56 33 55 1 1 59 48 1 53 7 1 1 21 1 52 16 1 60 1 30 53 30 7 47 13 13 22 8 13 45 59 54 1 2 42 54 47 53 52 53 22 16 30 1 4 52 47 56 1 28 16 1 22 59 51 1 1 7 28 53 60 7 1 16 16 1 1 58 23 4 53 56 1 52 2 13 52 38 30 45 7 1 30 56 16 1 1 1 30 48 56 54 54 55 28 45 24 1 47 47 1 28 22 1 47 1 1 45 46 1 1 47 53 55 52 1 1 7 43 2 1 1 1 43 25 1 4 53 1 45 43 16 55 52 4 47 55 45 22 51 56 1 38 13 30 2 28 56 13 56 28 55 26 4 16 46 1 1 16 1 1 1 1 1 47 59 4 8 38 58 1 1 48 1 7 22 1 1 1 60 27 52 4 30 56 53 52 54 1 30 52 1 16 54 7 58 1 30 54 1 56 51 53 56 57 56 4 60siri-bhoovalaya.org
  • 11. Estimated Robustness of KES against Brute Force Attacks siri-bhoovalaya.org In proposed KES, depending on the security requirements, this substitution table can be altered in size and assignment of integers. Thus even with 64 element KCT, there are possible Factorial (64) permutations resulting in a number with 89 digits. Size of Transposition key can be adjusted to thwart anticipated brute-force attacks. Preliminary estimations reveal that possible Transposition schemes of 729 elements, of 27x27 matrix as deployed in “Siri Bhūvalaya”, amount to Factorial (729) permutations and that results in massive number of approximately 1772 digits. That means a brute-force attacker will have to find correct Transposition Key out of so many possible ones. This will require massive computational resources which is highly impractical. Current cryptographic standards of symmetric key encryption recommend key length of 256 bits, wherein possible key combinations are of the order 78 digits only for a brute-force attack.
  • 12. Applications of KES siri-bhoovalaya.org KES is inherently suitable for Information Security applications on variety of platforms using Indian Languages and Scripts. With its variable length dual key symmetric encryption scheme, KES can be customised for Information Security requirements of wide- range of systems and applications. Since it requires relatively smaller computational overhead, KES can be efficiently deployed on systems with nominal computing resources or even in circumstances with no machine assistance i.e. in Manual-Mode. A formal Comprehensive study of KES is yet to be done and all concerned persons / organisation are invited to contribute.