- Based on the grid computing architecture, we divided grid nodes into supervisor grid node and execute grid nod.. - In this study, we propose the encryption and decryption algorithm in each grid node to keep information processing in security. - We create user information database both in supervisor and execute grid nodes. - In this paper, we propose the method to send information to other execute grid nodes through supervisor grid node. - We also propose encryption algorithm to encrypt information to produce cipher text and send it to supervisor. - Supervisor uses sender format code to decrypts the cipher text to produce information. - Once supervisor has checked, it uses received format code to encrypt information to produce cipher text and sends to the received execute grid node. - The received execute grid node uses decryption algorithm to produce original information. - The information is sent from one execute grid node to other execute grid node. - We send information to supervisor grid node to check and verify. - When it is correct, we send information to received executed grid node. - The information is encrypted to produce cipher text and to be sent. - When cipher text has received, we decrypt to produce original information. - Execute grid node. - In the execute grid nodes, they have the following operations to do:. - When the execute grid node signs on first time, it uses default format code to encrypt user-id and password and sends to supervisor grid node. - It receives format code from supervisor and saves to create EUIDB (Execute User Information Data Base). - User-id Password Format code When user wants to send information, it uses format code in EUIDB to encryption user- id and password. - 2) Request permission from supervisor When he wants to send information to other users, he inputs user-id and password to get permission from supervisor. - We use format code in EUIDB to encrypt password and send to supervisor to process.. - When user wants to delete entry in supervisor, he inputs user-id and password. - We use format code in EUIDB to encrypt password and send to supervisor to process and delete the entry in EUIDB.. - 5) Send information to user in other execute grid node. - When he wants to send information to other user, he types user-id, received-user-id and information. - We use format code in EUIDB to encrypt received-user-id and information to produce cipher text and send to supervisor to process.. - 6) Receive information from supervisor grid node. - When it receives cipher text from supervisor, it uses format code to decrypt cipher text to get information.. - 7) Exit from supervisor grid node. - When user wants to log out, it sends user-id to supervisor.. - Supervisor grid node. - When the new user signs on, it receives cipher text. - It uses default format code to decrypt cipher text to get user-id and password.. - It uses user-id as key to access supervisor user information data base. - If user exists and returns error code, otherwise he assigns a format code to user and creates an entry in the SUIDB (supervisor user information data base) as Table 2 and return format code. - User-id Password Format code Table 3. - User-id Password Format Code. - It receives the cipher text and uses use-id as key to find the format code in the SUIDB. - It uses this format code to decrypt cipher text to get password. - When it receives the cipher text of information, it uses user-id as key to find the format code in the RUIDB. - If the user-id does not exist, it will return error code and exist. - It uses the format code to decrypt cipher text to find received-user-id and information. - It uses receive-user-id as key to find the format code of this received-user-id. - It uses format code of received-user-id to encrypt user-id and information to produce cipher text. - It sends the cipher text to received- user-id. - When it receives return message from received-user-id, it uses the user-id as key to find the format code and decrypt to find original user-id and message. - It uses the format code of original user-id to encrypt message to produce cipher text and return to original user. - Based on the grid computing architecture, we divide grid nodes into supervisor grid node (S0) and execute grid node (Xi). - We also present the supervisor information process module (SIPM) on the supervisor grid node, execute information process module (EIPM) on the execute grid node, as shown in Fig. - We present the supervisor information process module (SIPM) on the supervisor grid node. - SRIC receives information from the execute grid node. - It calls information decryption component (IDC) to decrypt cipher text to get information. - SPIC processes the request of execute grid nodes. - Use user-id as key to check SUIDB (Supervisor User Information Data Base). - If user-id exists, it will return error code and exit. - If user-id does not exist, it creates an entry with user-id, password and new format code in SUIDB and returns format code. - We check user-id and password in SUIDB. - We change password in SUIDB and store new format code and return format code. - We delete user-id in SUIDB and return message.. - We use received-user-id as key to check in SUIDB. - It uses format code of received-ser-id to call IEC to encrypt information to produce cipher text and send to received-user-id.. - Supervisor Information Process Module (SIPM) Supervisor Grid Node. - Execute Grid Node (X i ) Execute Information. - Execute Grid Node (X j ) Execute Information. - SSIC sends information to grid node.. - We present the execute information process module (EIPM) on the execute grid node in this section. - EPUIC processes to send user information to supervisor. - Set code as N and type user-id and password.. - Set code as P and type user-id and password.. - (4) Send information. - Set code as S and type user-id, received-user-id and information.. - Set code E and type user-id to exit from supervisor.. - In (1), we use default format code. - We call IEC (Information Encryption Component) to encryption information to produce cipher text.. - IDC uses format code to decrypt cipher text to get information. - Receive format code and store to EUIDB (Execute User Information Data Base).. - Execute Grid Node (X i. - Execute Grid Node (X k. - Code User-id Information Information has different fields separated by comma. - Information send out Code User-id Cipher Text We use the basic computer operations to design this algorithm. - The length of symbol table is N+M.. - Get symbol table after rotation (STAR).. - Supervisor Grid Node (S 0. - Set S to format code. - (3) Build cipher text. - From format code, we store SC, STAC and CBT to BST and BST is cipher text.. - Format code. - We may define some value of format code as showing Table 6.. - The format of sending message has fields as Code, User-id and cipher text.. - (7) Format code 240. - Before decryption, we should know the values S of format code in execute user information data base and U (length of user-id +1 (Code. - Contents of format code and cipher text.. - Format Code Cipher text Content. - The length of symbol table N=1/2*(L-S-U).. - From different format code and above values, we can get SC, STAC and CBT.. - Step 1: Get from cipher text (CT). - a) To do the encryption, we must know format code to produce cipher text.. - b) Each cipher text may have different length and format because it has different format code and the length of dummy symbol table.. - c) To do decryption, we must know format code, shift count and different format to decrypt cipher text to plaintext.. - d) The proposed algorithm in this study is more difficult to cryptanalysis, because the following fields of each transaction have different value in the cipher text.. - Miyaguchi, “The FEAL-8 Cryptosystem and Call for Attack,” Advances in Cryptology-CRYPTO’89 proceedings, Springer-Verlag