Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at Bengaluru

AnilJain6 291 views 13 slides Jan 28, 2020
Slide 1
Slide 1 of 13
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13

About This Presentation

Kumudendu Encryption Scheme: An Efficient and Versatile Indian Cryptographic System, devised about 1000 years ago. It has Modern Cryptography constituents for a very robust encryption.


Slide Content

siri-bhoovalaya.org Presentation on 6 th January 2020 at 107 th Indian Science Congress, 3-7 January, 2020 at Bengaluru Kumudendu Encryption Scheme An Efficient & Versatile Indian Cryptographic System

Kumudendu Encryption Scheme : An Efficient and Versatile Indian Cryptographic System by Er . Anil Kumar Jain FIETE, FIE(I), SMCSI, LM-ISCA email: [email protected] web-site: siri-bhoovalaya.org 107 th Indian Science Congress, 3-7 January, 2020 at Bengaluru

Siri Bhūvalaya manuscript at National Archives of India siri-bhoovalaya.org

Siri Bhūvalaya : Historical Backdrop Period : about 1000 years ago Setting : Ancient Karnataka, Near Bengaluru Focal Characters : Muni Kumudendu - The Outstanding inimitable Genius who scripted this inimitable epic. Mahamata Mallikabbe - The Ardent Benefactor who distributed copies of Siri Bhūvalaya – one of these copies survived to be discovered in twentieth century. End of Scene: Wonderful Masterpiece laid into oblivion for next 1000 years   siri-bhoovalaya.org

“ Siri Bhūvalaya : Resurrection Period : Early 20 th C entury Setting : Modern Karnataka   Focal Characters :   Dharnendra Pandit - The Protector of the Precious Treasure   Yellappa Shastri - The arduous Redeemer who strived resurrection efforts till his death Karlamangalam Srikantaiah & Anantha Subba Rao - Genuine associates of Yellappa Shastri siri-bhoovalaya.org

Basic Elements of Siri Bhūvalaya Cakra : One Cakra is arrangement of numbers (in range 1 to 64) in a matrix of 27 rows and 27 columns. This represents one page of encrypted text, which when decrypted results in verses and shlokas . Bandha : A Bandha is manner in which contents from a Cakra is revealed. Bandha basically describes the method to traverse the 27x27 matrix and substitute respective numbers into letters to uncover the Shlokas or verses hidden therein the Cakra . There are many Bandhas which are identified as Cakra-Bandha , Navmaank- Bandh , Shreni-Bandha, Hans-Bandha, Anu -Bandha, Mayur -Bandha, Saras -Bandha, Padma-Bandha etc. etc . Kumudendu Code Table (KCT) : This table is used for substituting Numerals in all the Chakras into corresponding Phonetic Alphabet Characters (Mūla Varṇas) siri-bhoovalaya.org

Basic Building Blocks of KES framework siri-bhoovalaya.org Kumudendu Encryption System (KES) framework of Siri Bhūvalaya” primarily consists of two symmetric encryption ciphers : Mono Alphabetic Substitution Cipher : Key here is identified as ‘Kumudendu Code Table’ (KCT). Here each of phonetic alphabet or Mūla Varṇa of the script is assigned an integer numeric value in range 1 to 64. Transposition Cipher : Here key is named as ‘Bandha Traversal Path Matrix’ (BTPM). It is a matrix of 27x27 integers or a vector of 729 integers. Here each element is a distinct integer in the range 1 to 729, which is indicative of place of the transposed phonetic alphabets in corresponding Cakra matrix (27x27).

Substitution Cipher Key (KCT) for different scripts कुमुदेन्दु कोड सारणी में देवनागरी, कन्नड़ एवं ब्राह्मी लिपि के ध्वन्याक्षर siri-bhoovalaya.org

Transposition Key :BTPM for Cakra-Bandha siri-bhoovalaya.org l l 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6

First Chakra of Siri Bhūvalaya siri-bhoovalaya.org

Estimated Robustness of KES against Brute Force Attacks siri-bhoovalaya.org In proposed KES, depending on the security requirements, this substitution table can be altered in size and assignment of integers. Thus even with 64 element KCT, there are possible Factorial (64) permutations resulting in a number with 89 digits. Size of Transposition key can be adjusted to thwart anticipated brute-force attacks. Preliminary estimations reveal that possible Transposition schemes of 729 elements, of 27x27 matrix as deployed in “Siri Bhūvalaya”, amount to Factorial (729) permutations and that results in massive number of approximately 1772 digits. That means a brute-force attacker will have to find correct Transposition Key out of so many possible ones. This will require massive computational resources which is highly impractical. Current cryptographic standards of symmetric key encryption recommend key length of 256 bits, wherein possible key combinations are of the order 78 digits only for a brute-force attack.

Applications of KES siri-bhoovalaya.org KES is inherently suitable for Information Security applications on variety of platforms using Indian Languages and Scripts. With its variable length dual key symmetric encryption scheme, KES can be customised for Information Security requirements of wide-range of systems and applications. Since it requires relatively smaller computational overhead, KES can be efficiently deployed on systems with nominal computing resources or even in circumstances with no machine assistance i.e. in Manual-Mode. A formal Comprehensive study of KES is yet to be done and all concerned persons / organisation are invited to contribute.

siri-bhoovalaya.org ತುಂಬ ಧನ್ಯವಾದಗಳು धन्यवाद Thank You