Kumudendu Encryption Scheme: An Efficient and Versatile Indian Cryptographic System, devised about 1000 years ago. It has Modern Cryptography constituents for a very robust encryption.
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at Bengaluru
1. siri-bhoovalaya.org
Presentation on 6th January 2020
at
107th Indian Science Congress, 3-7 January, 2020 at Bengaluru
Kumudendu Encryption Scheme
An Efficient & Versatile Indian Cryptographic System
2. Kumudendu Encryption Scheme:
An Efficient and Versatile Indian
Cryptographic System
by
Er. Anil Kumar Jain
FIETE, FIE(I), SMCSI, LM-ISCA
email: jain.anilk@gmail.com
web-site: siri-bhoovalaya.org
107th Indian Science Congress, 3-7 January, 2020 at
Bengaluru
4. Siri Bhūvalaya :Historical Backdrop
Period : about 1000 years ago
Setting : Ancient Karnataka, Near Bengaluru
Focal Characters :
Muni Kumudendu - The Outstanding inimitable
Genius who scripted this inimitable epic.
Mahamata Mallikabbe - The Ardent Benefactor who
distributed copies of Siri Bhūvalaya – one of these
copies survived to be discovered in twentieth century.
End of Scene: Wonderful Masterpiece laid into oblivion for
next 1000 years
siri-bhoovalaya.org
5. “
Siri Bhūvalaya: Resurrection
Period : Early 20th Century
Setting : Modern Karnataka
Focal Characters :
Dharnendra Pandit - The Protector of the
Precious Treasure
Yellappa Shastri - The arduous Redeemer who
strived resurrection efforts till his death
Karlamangalam Srikantaiah & Anantha Subba
Rao - Genuine associates of Yellappa Shastri
siri-bhoovalaya.org
6. Basic Elements of Siri Bhūvalaya
• Cakra : One Cakra is arrangement of numbers (in range 1 to 64) in a
matrix of 27 rows and 27 columns. This represents one page of
encrypted text, which when decrypted results in verses and shlokas.
• Bandha : A Bandha is manner in which contents from a Cakra is
revealed. Bandha basically describes the method to traverse the
27x27 matrix and substitute respective numbers into letters to
uncover the Shlokas or verses hidden therein the Cakra. There are
many Bandhas which are identified as Cakra-Bandha, Navmaank-
Bandh, Shreni-Bandha, Hans-Bandha, Anu-Bandha, Mayur-Bandha,
Saras-Bandha, Padma-Bandha etc. etc.
• Kumudendu Code Table (KCT): This table is used for substituting
Numerals in all the Chakras into corresponding Phonetic Alphabet
Characters (Mūla Varṇas)
siri-bhoovalaya.org
7. Basic Building Blocks of KES framework
siri-bhoovalaya.org
Kumudendu Encryption System (KES) framework of Siri
Bhūvalaya” primarily consists of two symmetric encryption
ciphers :
Mono Alphabetic Substitution Cipher : Key here is identified as
‘Kumudendu Code Table’ (KCT). Here each of phonetic alphabet
or Mūla Varṇa of the script is assigned an integer numeric value
in range 1 to 64.
Transposition Cipher : Here key is named as ‘Bandha Traversal
Path Matrix’ (BTPM). It is a matrix of 27x27 integers or a vector
of 729 integers. Here each element is a distinct integer in the
range 1 to 729, which is indicative of place of the transposed
phonetic alphabets in corresponding Cakra matrix (27x27).
8. Substitution Cipher Key (KCT) for different scripts
कु मुदेन्दु कोड सारणी में देवनागरी, कन्नड़ एवं ब्राह्मी लिपि के ध्वन्याक्षर
siri-bhoovalaya.org
9. Transposition Key :BTPM for Cakra-Bandha
siri-bhoovalaya.org
l l
2 3 4 5 6
1
2
3
4
5
6
1
2
3
4
5
6
11. Estimated Robustness of KES against Brute Force
Attacks
siri-bhoovalaya.org
In proposed KES, depending on the security requirements, this substitution
table can be altered in size and assignment of integers. Thus even with 64
element KCT, there are possible Factorial (64) permutations resulting in a
number with 89 digits.
Size of Transposition key can be adjusted to thwart anticipated brute-force
attacks. Preliminary estimations reveal that possible Transposition schemes
of 729 elements, of 27x27 matrix as deployed in “Siri Bhūvalaya”, amount to
Factorial (729) permutations and that results in massive number of
approximately 1772 digits. That means a brute-force attacker will have to
find correct Transposition Key out of so many possible ones. This will require
massive computational resources which is highly impractical.
Current cryptographic standards of symmetric key encryption recommend
key length of 256 bits, wherein possible key combinations are of the order
78 digits only for a brute-force attack.
12. Applications of KES
siri-bhoovalaya.org
KES is inherently suitable for Information Security applications on
variety of platforms using Indian Languages and Scripts.
With its variable length dual key symmetric encryption scheme, KES
can be customised for Information Security requirements of wide-
range of systems and applications.
Since it requires relatively smaller computational overhead, KES can
be efficiently deployed on systems with nominal computing
resources or even in circumstances with no machine assistance i.e.
in Manual-Mode.
A formal Comprehensive study of KES is yet to be done and all
concerned persons / organisation are invited to contribute.