ة مجلة إبن الھیثم للعلوم الصرفة و التطبیقی 2012 السنة 25 المجلد 1 العدد Ibn A l-Haitham Journal f or Pure and Applied Science No. 1 Vol. 25 Year 2012 Lagrange Interpolation for Mobile Agent Connection Encryption H. K. Homood Departme nt of Computer Science, College of Education, Unive rsity of Al- Mustansirya Received in:6June2011, Accepte d in:13July2011 Abstract A new p rop osed technique for secure agent commun ication is used to transfer data and instructions between agent and server in the local wireless network. The prop osed technique depends on the two stages of encry ption processing (AES algorithm and p rop osed Lagrange encry ption key generation sup p orted by XOR gate) for p ackets encry ption. The AES key was manipulated by using p rop osed Lagrange interp olation key generated in order to avoid the weak encry ption key s. A good multi encry ption op eration with a fast encryp tion time was p rop osed with a high quality connection op eration. Keyword: Agent, Agent security , M obile Agent, Lagrange interpolation app lication. Introduction M obile agents are goal-directed, autonomous p rograms capable of migratin g from host to host during their execution. The combination of autonomy and mobility p rovides mobile agent’s enormous p otential for application in today ’s Internet-based, distributed comp uting environment. Typ ical app lication areas, to name a few, include E-commerce, information retrieval, software dist ribution administ ration, and network management. Trust is little trust in a typ ical Internet application between the originator and the host s, and neither the hosts t rust each other. Secur ity threats are therefore considered against the two main targets: either threats against the hosts, or threats against the agent, which represent the interests of the originator.[1] The current developments of comp uter sy stems are leadin g to a situation where the number of p rocessors and comp uter networks is becoming more and more p ervasive. Nowaday s, there are p rocessors embedded in lots of every day devices. From p ersonal comp uters, laptop s, PDAs, and mobile p hones, to refrigerators, heaters, coffee machines, or toasters. Furthermore, these devices can be interconnected throu gh computer networks. T he increased research on wireless and mobile networks is making p ossible to have cheap networks at home, at the office or even at t he streets.[2] Wireless communications offer organizations and users a lot of benefits. Port ability and flexibility , increased p roductivity , and lower installation costs are just few of wireless communication benefits. Wireless technologies cover a broad r ange of differ ing capabilities oriented toward different uses and needs. Wireless local area network (WLAN) devices, for instance, allow users to move their lap tops from p lace to p lace within their offices without the need for wires and without losing network connectivity . Less wiring means greater flexibility , increased efficien cy, and reduced wir ing costs. Ad hoc networks, such as those enab led by ة مجلة إبن الھیثم للعلوم الصرفة و التطبیقی 2012 السنة 25 المجلد 1 العدد Ibn A l-Haitham Journal f or Pure and Applied Science No. 1 Vol. 25 Year 2012 Bluetooth, allow data sy nchronization with network sy stems and app lication sharing between devices.[1] Knowing what kind of individual might laun ch an att ack against y our wireless network is just as imp ortant as being aware of his or her motivations. From the motivations already outlined, it is p ossible to split attackers of wireless networks into three main cate gories:[3]  Curious individuals who do it for both fun and the technical challen ge. This category of att ackers does not usually p resent a huge threat to y our WLAN and might even do a service to the community by p ublicly exp osing insecure wir eless networks and raisin g p ublic awareness of wireless security issues. M any of them could actually become (or already are) wireless networking p rofessionals and security tools developers for the Op en Source community .[3]  "Bandwidth snatchers." This category of wireless crackers is the "scrip t kiddies" of the wireless world. Sp ammers and "warez" / p ornography traders as well as some "I like my neighbor's wireless" op p ortunistic types belong here. They usually go for the lowest hangin g fruit and are easy to rep el (even WEP and M AC address filtering might do, but don't be so sure).[3]  Real B lack Hats who happ en to like wireless. These are the ser ious att ackers who generally know what they do, why they do it, and what the legal consequences could b e. Anony mity, lateral att acks on otherwise p rotected networks, and out-of-band backdoor access are the reasons p rofessional crackers are att racted to wireless networks. Standard security measures will only delay such att ackers by a couple of hours. Unless t he security of the 802.11 network is given p rop er attention in both time and effort, the attack will inevitably succeed.[3] However, risks are inherent in any wireless technology . Some of t hese risks are similar to those of wired networks; some are exacerbated by wireless connectivity ; some are new. Perhaps the most significant source of risks in wireless networks is that the technology underly ing communications medium, the airwave, is op en to intruders, making it the logical equivalent of an Ethernet p ort in the p arking lot.[1] While t he Bluetoot h functionality is also eliminates cables for p rinter and other p erip heral device connections. Handheld devices such as p ersonal digital assist ants (PDA) and cell p hones allow remote users to sy nchronize p ersonal databases and p rovide access to network services such as wireless e-mail, Web browsing, and Internet access. M oreover, these technologies can offer dramatic cost savings and new cap abilities to diverse applications rangin g from retail settings t o manufacturing shop floors to first resp onders.[1] In this p ap er, we p resent a new technique for agent connection make more se cure in wireless network using a prop osed Lagrange interpolation polynomial calcu lations to generate robust keys for AES (128b it) encry p tion algorithm and to encrypt/decrypt the sending/ receiv ing data throu gh the wireless network. These app roaches will incr ease the se curity of transfer data between the agents and center agent server. 1. Mobile Agent M obile Agent is a comp osition of computer software and data which is able to m igrate (move) from one comp uter to another autonomously and continue its execution on the destination computer. [1] As the definition says, a mobile agent moves both code and data to the destination machin e. The agent executes the migr ated code und er the runtime environment p rovided by the target machine. The agent can shar e the migrated d ata with the local machine and acquire new data from it. T his can b e done only under the se curity p rivileges that t he agent p ossesses on the target machine. However, the agent is free to communicate to another locally running agent on the target machine. Illustrated in figure 1 is the use of local st ationary mobile agent as a mediator between the visiting mobile agent and the local r esources. ة مجلة إبن الھیثم للعلوم الصرفة و التطبیقی 2012 السنة 25 المجلد 1 العدد Ibn A l-Haitham Journal f or Pure and Applied Science No. 1 Vol. 25 Year 2012 In recent y ears, sever al p rogr amming languages for mobile agents have been designed. These lan guages make differ ent design choices as to which components of a p rogram st ate can migrate from machin e to machine. [1] 2. Infrastructure for Mobile Agents As comp utational p rocesses, agents do not exist on their own but rather within comp uting soft ware and hardware p roviding them mechanisms to execute. M any agent imp lementations also require substantial libraries and code modules. Furt her, agents frequently p ossess p rop erties not found in traditional software, such as mobility . Develop ment and imp lementation of such software requires significant infrast ructure to p rovide core functionality agents may use in conducting their tasks. [4] An agent-based sy st em comp rises one or more agents designed to ach ieve a given functionality , along with the software and hardware supp orting them. It is comp rised of several lay ers as shown in Figure 1 and described as follows: [4] • Agents imp lement the ap p lication; they achieve the intended functionality of the syst em. • Frameworks p rovide functionality sp ecific to agent soft ware, acting as an interface or abstraction between the agents and the underly ing lay ers. In some cases, the framework may be trivial or merely conceptual. For examp le if it is merely a collection of sy stem calls or is comp iled into the agents themselves. At one extreme, the framework cou ld ev en be considered “null” or emp ty, such as in the case where agents are p rogrammed directly into hardware. • Platforms p rovide more generic infrastructure from which frameworks and agents are constructed and executed. Items such as op erating sy stems, comp ilers, and hardware dr ivers make up the platforms of an agent syst em. • Host s are the comp uting devices on which the infrastructure and agents execute, along with the hardware p roviding access to the world. This may range from common disk drives and disp lays t o more sp ecialized hardware such as GPS receivers or robot ic effectors. • Environment is the world in which the infrast ructure and agents exist. This may include p hy sical elements, such as the network connections between hosts, as well as comp utational elements, such as web pages the agents may access. An agent system is simply a set of frameworks and agents that execute in them. A multi-agent sy stem is an agent-based sy st em that includes more than one agent. Such sy st ems may consist of many agents running within a sin gle framework instantiation, or in d ifferent frameworks, on different hosts, etc. In the agent sy stem, the devices connected at the host lay er via wireless networking, transmitting and receiving si gnals in the environment of the p hy sical world. 3. Mobile Agent Se curity Secur e communication between agents is considered as a challen ge because of the inherent complexity . In fact, security of agents can be v iewed at different lev els such as agent authentication, message authentication several works have been p rop osed to secure agent communication.[5] Such sy st ems decomp ose into several layers of hardware and software that p rovide an op erating context for agents, situated comp utational process that sense and affect their environment. Not e that the relationships across layers may be n-to-1. With the advent of the extensive use of Intranets and the Internet, the possibilities of widesp read use of distributed applications have come into focus. M obile agent technologies offer developers the advantage of buildin g app lications that may be distributed across the network using high levels of abstraction. Although many advantages of mobile agents have been offered, the overridin g advantage of their deployment is the ability to balance n etwork and p rocessing load amon g nodes in a network. Essentially , the mobile agent may be sent to the node where the resources with which it needs to deal are located. By so doing, local communication rates between the agent and its required resources increase, while ov erall ة مجلة إبن الھیثم للعلوم الصرفة و التطبیقی 2012 السنة 25 المجلد 1 العدد Ibn A l-Haitham Journal f or Pure and Applied Science No. 1 Vol. 25 Year 2012 network traffic decreases. M obile agents may also migrate to nodes that offer more p rocessing resources for p erforming a task.[6] For the wireless security esp ecially the IEEE 802.11, the first five y ears of its life, IEEE 802.11 had only one method defined for security. This was called Wired Equiv alent Privacy or WEP (often misidentified as Wireless Effective Privacy and other variants). In 2000, as Wi-Fi LANs increased in pop ularity , they attracted the att ention of the cryptographic community , who rap idly detected cracks in the WEP app roach. By the end of 2001, tools were available on the Internet designed to crack op en WEP in a fairly short time. The IEEE 802.11 (1999) defined two levels of security: op en and shared key. Op en security really means no se curity . It is used in the same way that one would say , "I went to work and left the front door of my house op en." M ost p eop le have figur ed out t his is not a good se curity p olicy for their homes, and y ou p robably feel the same way about Wi-Fi LANs. Shared key simply means that bot h ends of the wireless link know a key with a matching value. To be useful, this must be a secret shared only between trusted parties. T he new subset is called Wi-Fi Protected Access (WPA). M any leadin g vendors have now p roduced soft ware up grades so existing p roduct can be converted to supp ort WPA and most new p roducts are now shipp ed with WPA cap ability . The Wi-Fi Alliance h as created a test p lan for WPA so vendors can ensure interop erability .[7] In terms of Security requirements, mobile agent environments are p roblematic. The p ush to use agent mobility entails havin g autonomous agents that can roam a network, from comp uter-to-comp uter based up on an itinerary gener ated by the agent, modu lated by what the agent senses and its p rescribed go als. The purp ose of security functionality is to p revent execution of undesirable actions by entities from eit her within or out side the agent syst em while at the same t ime allowing execution of desirable act ions. T he goal is for the syst em to be useful while rem aining dependable in the face of malice, error or accident . Process Model: Securit y funct ionalit y is described by t he fo llowing pro cesses:[4] • Authentication i s a process for identify ing the entity request ing an action. • Authorization is a p rocess for deciding whether the entity should be granted p ermission to p erform the requested action. • Enforcement is a p rocess or mechan ism for p reventing the entity from executing the request ed action if authorization is denied, or for enabling such execution if authorization is granted. Some general technologies for achievin g security include authorization models and mechan isms; auditing and intrusion detection; cryptographic algorithms, p rotocols, services, and infrast ructure; r ecovery and survivable op eration; risk analy sis; assurance including cryptanalysis and formal methods; p enetration technologies includin g v iruses, Trojan horses, sp oofing, sniffing, cracking, and cov ert channels.[4] 4. Advanced Encryption S tandard (AES ) Algorithm In January 1997, the National Inst itut e of Standards and Techno logy (NIST) invited p rop osals for new algorithms for t he Advanced Encry ption Standard (AE S) to replace the o ld Data Encryption Standard (DES). Aft er two rounds of evaluation on the 15 candidate algorithms, NIST selected the Rijndael as t he AES algorithm in October 2000. [8] The AES algorithm has bro ad ap p lications, includin g smart cards and cellu lar p hones, WWW servers and automated teller machines (ATM s), and digital video recorders. Compared to soft ware imp lementations, hardware imp lementations of the AE S algor ithm p rovide more p hy sical security as well as higher sp eed. Figure 2 shows the block diagram of AES algorithm. The AES algorithm is a sy mmetric-key cip her, in which both t he sender and the receiver use a single key for encryp tion and decryption. The data block length is fixed to be 128 bits, while the key length can be 128, 192, or 256 bits, resp ectively. In addition, the AE S algorithm is an ة مجلة إبن الھیثم للعلوم الصرفة و التطبیقی 2012 السنة 25 المجلد 1 العدد Ibn A l-Haitham Journal f or Pure and Applied Science No. 1 Vol. 25 Year 2012 iterative algorithm. Each iteration can be called a round, and the total number of rounds, Nr, is 10, 12, or 14, when the key length is 128, 192, or 256 bits, resp ectively. [8] The 128-bit data block is divided into 16 by tes. These bytes are mapp ed to a 4x 4 array called the State, and all the internal operations of the AES algor ithm are p erformed on the State. 5. The Lagrange Inte rpolation Polynomi al The p roblem of constructing a continuously defined function from given discrete data is unavoidable whenever one wishes to manipulate the data in a way that requires information not included exp licitly in the data. The relatively easiest and in many app lications often most desired app roach to solve the p roblem is interpolation, where an app roximating function is constructed in such a way as to agree p erfectly with the usually unknown original function at the given measurement p oints. In the practical app lication of the finite calculus of t he problem of interp olation is the following: given the values of the function for a finite set of arguments, to determine the value of the function for some intermediate argument. [9] 5.1 The Problem of Inte rpolation The p roblem of interp olation consists in the following: Given the values y i corresp onding to xi, i = 0, 1, 2, . . . , n, a function f(x) of the continuous variable x is to be determined which satisfies t he equation: y i = f(xi) for i = 0, 1, 2 . . . , n …..(1) and finally f(x) corresp onding to x = x0 is required. (i.e. x0 different from xi, i = 1, n.) In the absence of further knowledge as to the nature of the function this p roblem is, in the general case, indeterminate, since the values of the arguments other than those given can obviously assigned arbitrarily . If, however, certain analytic p rop erties of the function is given, it is often p ossible to assign limits to the error committed in calculating the function from values given for a limited set of arguments. For examp le, when the function is known to be representable by a polynomial of degree n, the value for any argument is comp letely determinate when the values for n + 1 distinct arguments are given. [9] 5.2 Lagrange Inte rpolation Consider the function f : [x0, xn]  R given by the following table of values : xk are called interpolation nodes, and they are not necessary equally distanced from each other. We seek to find a p olynomial P(x) of degree n that ap p roximates t he function f(x) in the interp olation nodes, i.e.: f(xk) = P(xk); k = 0, 1, 2, . . . , n. The Lagrange interpolation method finds such a polynomial without solving the sy st em. [9] The orem :Lagrange Interp olating Poly nomial The Lagrange interp olating p olynomial is the polynomial of degree n that passes through (n + 1) points y 0 = f(x0), y 1 = f(x1), . . . y n = f(xn) . let: …(2) Where ….(3) 6. The Propose d S yste m The p rop osed sy st em was designed to give solution for securing mobile Agent communication in wireless network. The p rop osed technique is depending on the encryp tion ة مجلة إبن الھیثم للعلوم الصرفة و التطبیقی 2012 السنة 25 المجلد 1 العدد Ibn A l-Haitham Journal f or Pure and Applied Science No. 1 Vol. 25 Year 2012 techniques like AES 256bit algorithm. The p rop osed sy st em will be used the Lagrange interp olation p olynomial as encry p tion function used to encry p t the sending /receiving p ackets between Agent –server. The p rop osed sy st em (as shown in Figure 3) is built from two st ages: first st age encry p ts the data transp ort by using the Key generation (Lagrange interp olation p olynomial key generation) and AES 128 bit algorithm. In this st age, the Lagrange interp olation p olynomial was used to generate the encry p tion key by using a pseudo key numbers. T he encryp tion operation for this stage is by depending on the AES algorithm. The Lagrange key generation will he used in order to increase the st rength of the key and to avoid the weak keys from using in the encry p tion op eration. Figure 4 shows the key generation using Lagrange interpolation calculation. The second st age is encry p ting the resulted data from the first st age by the prop osed Lagrange interp olation encry p tion op eration key and XOR op eration. In this st age, the encry p tion op eration will do by using the Lagrange interp olation p olynomial calculation to generate key (as shown in Figure 4) and will be used in the XOR encry p tion op eration to encry p t the outp ut st ream from the AES algorithm (from previous stage). This stage was used to increase the randomness of the outp ut data st ream (in the p ackets) in order to get the benefits of the multi encry p tion techniques with less time of encry p tion as p ossible. Additionally , the encry p tion/decry p tion op erations are designed to time efficient depending on the visual studio 2008 programming facilities. The final encry p ted data will send into the TCP/IP p rotocol services in order to encapsulate the outgoing/incoming p ackets to comp lete the communication between the Agents and mast er server comp uters through the local wireless network. In this p rop osed sy st em, the local area wireless network was built from 10 comp uter connected using Ethernet wireless card of 54M bp s sp eed connection sep arated by average 1km Not e: in Figure 4, Li is the Lagr ange calculation outp ut and Kvi is the element of (K0 for first stage when v=0) or K3 when v=3 in second stage of gener ation. Kj is generated encry ption key (for j=1 in the first st age, and j=2 in the second st age of encry ption). Also, the K0 differs from K2 to avoid the similarity . The steps of t he prop osed sy st em are: In se nding operation (For Agent program in the host compute r conne cted to Agent se rver) case : a. Loading the sending data. b. Encry p t the sending data using (first the Lagrange interpolation polynomial key generation and AES algorithm with 128 bit key ). c. Encry p ts the resulted encry p ted data (from st ep b) using second Lagrange interp olation p olynomial generation key and XOR encryp tion operation. C. Establish the connection with t he agent server. d. Send the resulted encry p ted data to T CP/IP p rotocol for sending the encryp ted data to agent server. e. Using one of the encry p tion wireless network technique like WAP, WEP and other. In se nding operation (For Agent se rver program in the se rver compute r conne cted to Agent host) case : a. Loading the sending data. b. Encry p t the sending data using the first Lagrange interp olation p olynomial key generation and AES algorithm with 128 bit key . c. Encry p ts the resulted encry p ted data (from st ep b) using second Lagrange interp olation p olynomial key generation with XOR encry p tion operation. c. Est ablish the connection with t he selected agent host. d. Send the resulted encry p ted data to T CP/IP p rotocol for sending the encryp ted data to agent host . e. Using one of the encry p tion wireless network technique like WAP, WEP and other. ة مجلة إبن الھیثم للعلوم الصرفة و التطبیقی 2012 السنة 25 المجلد 1 العدد Ibn A l-Haitham Journal f or Pure and Applied Science No. 1 Vol. 25 Year 2012 In receiving operation (For Agent program in the host compute r conne cted to Agent se rver) case : a. Est ablish the connection with t he agent server. b. Loading the receiving p acket from the TCP/IP p rotocol st ack after decry p ting p acket using one of the encry p tion/decry p tion wireless network technique like WAP, WEP and other. c. Decryp ts the resulted data (from st ep b) using second Lagrange interp olation p olynomial key generation with XOR encry p tion/decry p tion operation. d. Decryp t the receiving data using the first Lagrange interpolation polynomial key generation and AES algorithm with 128 bit key . e. Send the resulted data to Agent p rogram to saving and disp lay ing. In receiving operation (For Agent se rver program in the se rver compute r connected to Agent host) case : a. Est ablish the connection with t he agent server. b. Loading the receiving p acket from the TCP/IP p rotocol st ack after decry p ting p acket using one of the encry p tion/decry p tion wireless network technique like WAP, WEP and other. c. Decryp ts the resulted data (from st ep b) using second Lagrange interp olation p olynomial key generation with XOR encry p tion/decry p tion operation. d. Decryp t the receiving data using the first Lagrange interpolation polynomial key generation and AES algorithm with 128 bit key . e. Send the resulted data to Agent server p rogram to saving and disp lay ing. Results and Conclusions The prop osed technique was applied to local wireless network of 1 router with 10 PC connected to this network (with up to 54M B bitrate). One of these comp uters works as a center server to agents. The others have the Agent connection p rogram for many services of internet. The delays time was calculated in many services lik e navigation, downloading, up loading, and chatting in two cases (without and with app lied p rop osed encryption technique). This local wireless network has a web server, FT P server, exchange server, and other services servers installed in the center agent server PC. The results were collected by testing local wireless network t o 6 months with p rop er services and internet conditions. Good results were gett ing from app lied the p rop osed algorithm, best and f ast encry ption message was t ransfered from the p oint to other p oints in wireless network. From the results of app lied the p rop osed algorithm (as shown in Table 1), the delay time was increased by 19s in minimum to -1.20 minutes from the original d elay time (calculated for the same services without p rop osed algor ithm). The QoS is calculating for this condition to this local wireless network and found app roximately equals to 97% (QoS calcu lation depended on the number of received p acket of the sp ecific service to total p acket sending through the network). Re ferences 1. Shih, T. K. (2008),Cryp tosyst em App lications in M obile Agent Secur ity , Journal of Secur ity Engineering, Art icle 5 (1), February. 2. Navarro, G. ; Ort ega-Ruiz, J.A. ; Garcia, J. and Robles, S. (2003), Secur e A gent-Based M anagement For Pervasive Environ ments, Sp anish Government Commission CICYT, TIC2003-02041,. 3. Vladimirov, A. A. ; Gavrilenko, K. V. and M ikhailovsky ,A. A. (2004),Wi-Foo - The Secr ets Of Wireless Hackin g “,Addison Wesley , June 28, , ISBN: 0-321-20217-1. ة مجلة إبن الھیثم للعلوم الصرفة و التطبیقی 2012 السنة 25 المجلد 1 العدد Ibn A l-Haitham Journal f or Pure and Applied Science No. 1 Vol. 25 Year 2012 4. M ay k ,I. and Regli, W. C. (2006)Agent Sy st ems Reference M odel Release Version 1.0 a “,DoD Contract #DAAB07-01-9-L504, -11-20 13:15:19 -0400. 5. Khemakhem, M . ; Rekik, W. and Fay olle, J. (2010),A flexible and secure web service architectural model based on PKI and agent techno logy ”, International Journal for Infonomics (IJI), Volu me 3, Issue 2, June. 6. Korba, L. (1999), Towards Secure Agent Dist ribution and Communication”, Proceed ings of the 32nd Hawaii International Conferen ce on Science Sy st ems –0-7695-0001-3/99. 7. J. Edney , W. A. Arbaugh,” Real 802.11 Security : Wi-Fi Prot ected Access and 802.11i”, Addison Wesley , July 15, 2003, ISBN: 0-321-13620-9. 8. Zhang, X. and Parhi, K. K. (2004),High- Sp eed VLSI Architectures for the AES Algorithm", IEEE TRANSACTIONS ON VERY LARGE SCALE INT EGRAT ION (VLSI) SYSTEM S, 12, (9), SEPTEM BER. 9. Hussien,K. A. (2011),The Lagr ange Interpolation Poly nomial For Neural Network Learnin g”, International Journal of Computer Science & Network Security ,11 (3) M arch. Table (1): The Results Agent Connection After/Before Appli ed The Propose d S yste m In Local Wireless Ne twork Se rvice name Size of data routing (MB) Delay time in se nding/receiving without propose d algorithm (average for MB) Delay time with propose d algorithm (average for MB) Navigation 8970 1s-1.30minutes 21s-1.54minutes Downloading(HT TP) 38570 8s-4minutes 27s-2.90minutes Downloading (FT P) 73400 15s-7minutes 50s-8.17min Emailing 3200 5s-120s 30s-3.71minutes Chatt ing 400 10s-120s 30s-200s ة مجلة إبن الھیثم للعلوم الصرفة و التطبیقی 2012 السنة 25 المجلد 1 العدد Ibn A l-Haitham Journal f or Pure and Applied Science No. 1 Vol. 25 Year 2012 Fig. (1): Abstract model of an age nt system. . Fig.(3): The propose d Agent Connection Encryption/De cryption S yste m Key (K0 ) Decrypted Data Original data Sending throu gh Wireless network Receiving throu gh Wireless network Second sta ge encry ption using XOR gat e Key (K2 ) First Lagrange Key Genera�on (K 1) First Stage of Encrypt Data using AES algorithm Send To TCP/IP protocol Encrypt dat a using WPA ,WEP or other Decrypt using XOR Gat e Send To TCP/IP protocol Decrypt data using WPA ,WEP or other Decrypt D ata us ing AES algorithm Secon d Lagrange Key Generation (K3) De cryption Side Encryption Side Fig.(2): The block diagram of the AES algorithm. ة مجلة إبن الھیثم للعلوم الصرفة و التطبیقی 2012 السنة 25 المجلد 1 العدد Ibn A l-Haitham Journal f or Pure and Applied Science No. 1 Vol. 25 Year 2012 Kv1 Kv2 Kv3 Kv4 Kv5 Kv6 Kvn Lagrange Int erpolati on P oly no mial Cal culati on L1 L2 L3 L4 L5 L6 Ln Fig. (4): The Lagrange Inte rpolation Polynomi al Key Generation Ke y (Kj) ة مجلة إبن الھیثم للعلوم الصرفة و التطبیقی 2012 السنة 25 المجلد 1 العدد Ibn A l-Haitham Journal f or Pure and Applied Science No. 1 Vol. 25 Year 2012 المحمولاستیفاء آلكرانج لتشفیر اتصال العمیل حیدر كاظم حمود قسم علوم الحاسبات، كلیة التربیة، الجامعة المستنصریة 2011 تموز 13: ،قبل البحث في 2011 حزیران 6: استلم البحث في الخالصة ة تقنیة جدیدة اقترحت من ا جل اتصاالت امینة مستعملة في نقل البیانات والتعلیمات بین الوكیل والخادم في شبك محلیة ء AESاستعمال خوارزمیة (یعتمد األسلوب المقترح على مرحلتین من التشفیر . االتصال الالسلكیة ال ومتعدد استیفا باستخدام مفاتیح المقترحة AES ل تولید مفتاحّقد عد. لتشفیر الحزم) XORالكرانج لتولید مفتاح التشفیر مدعومة ببوابة ر كمن تولد طریقة استیفاء ال رانج لتفادي مفتاح تشفیر ضعیف ثم نتائج جیدة للطریقة المقترحة من خالل إجراء عملیة تشفی .متعدد وفي وقت تشفیر سریع وجودة عالیة في عملیة االتصال Agent, Agent security :الكلمات المفتاحیة , M obile Agent, Lagrange interp olation app lication. ة مجلة إبن الھیثم للعلوم الصرفة و التطبیقی 2012 السنة 25 المجلد 1 العدد Ibn A l-Haitham Journal f or Pure and Applied Science No. 1 Vol. 25 Year 2012