SlideShare a Scribd company logo
1 of 7
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. II (Jan – Feb. 2015), PP 85-91
www.iosrjournals.org
DOI: 10.9790/0661-17128591 www.iosrjournals.org 85 | Page
The effect of Encryption algorithms Delay on TCP Traffic over
data networks
Esam Suliman Mustafa Ahmed1
, Dr.Amin Babiker A/Nabi Mustafa2
1, 2
(Faculty of Engineering / AL-Neelain University, Sudan)
Abstract: Security is a big concern for data networks users. Data encryption considered to be one of the best
solutions for security issues. There are some standard encryption algorithms that used to encrypt transferred data
using encryption keys. DES, 3DES, and AES are common encryption algorithms used in TCP/IP networks.
Virtual Private Networking (VPN) is the one of the best security mechanisms that used encrypted virtual tunnels
.In this paper the effect of encryption delay on TCP based applications is discussed. Simulation is a major part
of this Paper. Increasing the encryption delay and then comparing the effect of that delay on TCP protocol
through different scenarios is the methodology of the study, using OPNET. One server supporting HTTP and
DB services is used. Four scenarios have been simulated. Results were compared by measuring the effect of
applying different encryption delay values to the same network.
Keywords: VPN, DES,3DES, AES,OPNET, IRC, BLOWFISH
I. Introduction
There are two types of encryption methodologies
1.1 Symmetric encryption
Symmetric encryption also referred to as conventional encryption or single-key encryption was the only type of
encryption in use prior to the development of public key encryption in the 1970s.it is a form of cryptosystem in
which encryption and decryption are performed using the same key. It is also known as conventional encryption.
Symmetric encryption transforms plaintext into cipher text using a secret key and an encryption algorithm.
Using the same key and a decryption algorithm, the plaintext is recovered from the cipher text .Traditional
symmetric ciphers use substitution and/or transposition techniques. Substitution techniques map plaintext
elements (characters, bits) into cipher text elements. Transposition techniques systematically transpose the
positions of plaintext elements.
Symmetric encryption scheme has five ingredients (Figure 1):
• Plaintext: This is the original intelligible message or data that is fed into the Algorithm as input.
• Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the
plaintext.
• Secret key: The secret key is also input to the encryption algorithm. The key is a value independent of the
plaintext and of the algorithm. The algorithm will produce a different output depending on the specific key
being used at the time. The exact substitutions and transformations performed by the algorithm depend on the
key.
• Cipher text: This is the scrambled message produced as output. It depends on the plaintext and the secret key.
For a given message, two different keys will produce two different cipher texts. The cipher text is an apparently
random stream of data and, as it stands, is unintelligible.
• Decryption algorithm: This is essentially the encryption algorithm run in reverse. It takes the cipher text
and the secret key and produces the original plaintext.
The effect of Encryption algorithms Delay on TCP Traffic over data networks
DOI: 10.9790/0661-17128591 www.iosrjournals.org 86 | Page
Figure 1. Simplified Model of Symmetric Encryption
Cryptography
Cryptographic systems are characterized along three independent dimensions:
 The type of operations used for transforming plaintext to cipher text. All encryption algorithms are
based on two general principles: substitution, in which each element in the plaintext (bit, letter, group of bits or
letters) is mapped into another element, and transposition, in which elements in the plaintext are rearranged. The
fundamental requirement is that no information be lost (that is, that all operations are reversible). Most systems,
referred to as product systems, involve multiple stages of substitutions and transpositions.
 The number of keys used. If both sender and receiver use the same key, the system is referred to as
symmetric, single-key, secret-key, or conventional encryption. If the sender and receiver use different keys, the
system is referred to as asymmetric, two-key, or public-key encryption.
 The way in which the plaintext is processed. A block cipher processes the input one block of elements
at a time, producing an output block for each input block. A stream cipher processes the input elements
continuously, producing output one element at a time, as it goes along.
1.2 Asymmetric encryption
Is a form of cryptosystem in which encryption and decryption are performed using the different keys—
one a public key and one a private key. It is also known as public-key encryption. Asymmetric encryption
transforms plaintext into cipher text using a one of two keys and an encryption algorithm. Using the paired key
and a decryption algorithm, the plaintext is recovered from the cipher text. The most widely used public-key
cryptosystem is RSA. The difficulty of attacking RSA is based on the difficulty of finding the prime factors of a
composite number
Public-key cryptography provides a radical departure from all that has gone before. For one thing,
public-key algorithms are based on mathematical functions rather than on substitution and permutation. More
important, public-key cryptography is asymmetric, involving the use of two separate keys, in contrast to
symmetric encryption, which uses only one key. The use of two keys has profound consequences in the areas of
confidentiality, key distribution, and authentication.
Terminology Related to Asymmetric Encryption
Asymmetric Keys: Two related keys, a public key and a private key, that are used to perform
complementary operations, such as encryption and decryption or signature generation and signature verification.
Public Key Certificate: A digital document issued and digitally signed by the private key of a
Certification Authority that binds the name of a subscriber to a public key. The certificate indicates that the
subscriber identified in the certificate has sole control and access to the corresponding private key.
Public Key (Asymmetric) Cryptographic Algorithm: A cryptographic algorithm that uses two related
keys, a public key and a private key. The two keys have the property that deriving the private key from the
public key is computationally infeasible.
Public Key Infrastructure (PKI): A set of policies, processes, server platforms, software and
workstations used for the purpose of administering certificates and public-private key pair including the ability
to issue ,maintain, and revoke public key certificates.
The effect of Encryption algorithms Delay on TCP Traffic over data networks
DOI: 10.9790/0661-17128591 www.iosrjournals.org 87 | Page
Figure 2. Encryption with public key
• Plaintext: This is the readable message or data that is fed into the algorithm as input.
• Encryption algorithm: The encryption algorithm performs various transformations on the plaintext.
• Public and private keys: This is a pair of keys that have been selected so that if one is used for encryption, the
other is used for decryption. The exact transformations performed by the algorithm depend on the public or
private key that is provided as input.
• Cipher text: This is the scrambled message produced as output. It depends on the plaintext and the key. For a
given message, two different keys will produce two different cipher texts.
• Decryption algorithm: This algorithm accepts the cipher text and the matching key and produces the original
plaintext.
II. The Design
Four scenarios are used to measure the effect of encryption delay on the network.
In the first scenario the server is accessed by Clients from different three remote LANs connected
through IP cloud to the Core router without applying any Encryption (no VPN) as it shown in fig (3). The server
supported tow services, DB and HTTP.
Figure 3.TCP/IP Traffic without Data encryption (No-Encryption Scenario)
In the other three scenarios, encrypted VPN tunneling applied between the three LANs and The Core Router as
it shown in figure 4
The effect of Encryption algorithms Delay on TCP Traffic over data networks
DOI: 10.9790/0661-17128591 www.iosrjournals.org 88 | Page
Figure 4. Encrypted VPN Tunnel applied
Encryption/Decryption delay values increased in (Encryption Delay 1, 2, 3) scenarios according to the following
table
Figure 5. Encryption/Decryption delay setting
III. The Results
An event of the simulation is defined as Web Browsing (Light HTTP), and Database Access (Light).
Results were collected after the simulation was run. Statistics of each scenario presented in a graph that detailed
the activity throughout the simulation. Graph 6 illustrates the time average (in TCP Delay (Second)).
Scenario Encryption/Decryption Delay(ms)
Encryption Delay 1 0.02 ms
Encryption Delay 2 0.04 ms
Encryption Delay 3 0.05 ms
The effect of Encryption algorithms Delay on TCP Traffic over data networks
DOI: 10.9790/0661-17128591 www.iosrjournals.org 89 | Page
Figure 6.Time_average(in TCP Delay (sec))
The graph shows that the TCP Delay increased simultaneously with the encryption/decryption delay.
the lowest value of the delay is before applying encrypted tunnels and the highest value in scenario 3(Encryption
Delay 3)which have the highest encryption delay value.
Graph 7 shows the time average (in TCP Segment delay (Sec)).from the graph we remarked that the segment
delay also increased according to the increased in encryption delay. Lowest value in NO_ Encryption scenario
and highest value in scenario 3(Encryption Delay 3).
Figure 7.Time average (in TCP segment Delay (sec))
Figure 8 illustrate IP End-to-End delay Variation in the four scenarios. The delay also increased according to the
value of encryption Delay.
The effect of Encryption algorithms Delay on TCP Traffic over data networks
DOI: 10.9790/0661-17128591 www.iosrjournals.org 90 | Page
Figure 8.Time_average (in IP End-to-End Delay Variation (Sec))
Figure 9 illustrate the TCP connection Delay. Three scenarios are shown here (Encryption Delay 1, 2, 3
Scenarios).the graph shows that the delay increased forward from scenario 1 to scenario 3.
Figure 9.Time_average (TCP connection Delay (Sec))
IV. Conclusion
Referring to the graphs we get that there is a vast TCP Delay after applying the Encrypted tunnels, TCP
delay increased according to encryption delay. The Delay on TCP traffic leads to network congestion which
affects the performance and stability of the network.
Encryption is the most effective mechanism to secure the flow of data traffic within the network.
Encrypted data face some issues. Packet loss, out-of order packets, and TCP latency. Balancing between
complex encryption algorithms and performance of the network must is so important to reduce the effect of
encryption delay on the network. Using fast encryption algorithms like Blowfish and RC4 when the data is not
so important. CPU speed is major part of any encryption system.
The effect of Encryption algorithms Delay on TCP Traffic over data networks
DOI: 10.9790/0661-17128591 www.iosrjournals.org 91 | Page
References
[1]. Henric Johnson , Network Security, Blekinge Institute of Technology, Sweden.
[2]. W. ~Diffie and E.~Hellman, {New directions in cryptography}, IEEE Transactions on Information Theory {22} (1976).
[3]. Douglas E.Comer, Computer Networks and Internets
[4]. McDysan. D. (2000), VPN applications Guide
[5]. Behrouz A. Forouzan (2007), Data Communications and Networking
[6]. J. Walrand and P. Varaiya, High-Performance Communication Networks.
[7]. Dina Katabi, Mark Handley, and Charlie Rohrs, "Congestion Control for High Bandwidth-Delay Product Networks,"
[8]. David D. Clark, Van Jacobson, John Romkey, and Howard Salwen, "An Analysis of TCP Processing Overhead," IEEE
Communications Magazine, June 1989
[9]. Kent, IP Authentication Header, November 1998.
[10]. IPsec VPN WAN Design Overview,http://www.cisco.com
[11]. IPsec Direct Encapsulation Design Guide— http://www.cisco.com/en/US/docs/solutions.
[12]. Kosiur, D,"Building and Managing Virtual Private Networks," New York, NY(1998).
[13]. Erwin, M., Scott, C, Wolfe ," Virtual Private Networks" Sebastopol CA: O'Rielly , Associates Inc(1999).

More Related Content

What's hot

Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...IJECEIAES
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
Internet security protocol
Internet security protocolInternet security protocol
Internet security protocolMousmi Pawar
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganographyAlexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganographyAlexander Decker
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocolsguestfbf635
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 

What's hot (18)

Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Internet security protocol
Internet security protocolInternet security protocol
Internet security protocol
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
5215ijcis01
5215ijcis015215ijcis01
5215ijcis01
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Virtualization
VirtualizationVirtualization
Virtualization
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 

Viewers also liked

Comparative Analysis of a 15 Story Flat Plate Building with and Without Shear...
Comparative Analysis of a 15 Story Flat Plate Building with and Without Shear...Comparative Analysis of a 15 Story Flat Plate Building with and Without Shear...
Comparative Analysis of a 15 Story Flat Plate Building with and Without Shear...IOSR Journals
 
Bandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slotsBandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slotsIOSR Journals
 
Effect on Environment by Burning Different Agricultural Waste
Effect on Environment by Burning Different Agricultural WasteEffect on Environment by Burning Different Agricultural Waste
Effect on Environment by Burning Different Agricultural WasteIOSR Journals
 
Design and Optimization of Front Underrun Protection Device
Design and Optimization of Front Underrun Protection DeviceDesign and Optimization of Front Underrun Protection Device
Design and Optimization of Front Underrun Protection DeviceIOSR Journals
 
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionComparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionIOSR Journals
 
Engine Emissions at Various Cetane Numbers with Exhaust Gas Recirculation
Engine Emissions at Various Cetane Numbers with Exhaust Gas RecirculationEngine Emissions at Various Cetane Numbers with Exhaust Gas Recirculation
Engine Emissions at Various Cetane Numbers with Exhaust Gas RecirculationIOSR Journals
 
Measurement and Evaluation of Reliability, Availability and Maintainability o...
Measurement and Evaluation of Reliability, Availability and Maintainability o...Measurement and Evaluation of Reliability, Availability and Maintainability o...
Measurement and Evaluation of Reliability, Availability and Maintainability o...IOSR Journals
 
Determination of volatile organic compounds in surface water and sediment usi...
Determination of volatile organic compounds in surface water and sediment usi...Determination of volatile organic compounds in surface water and sediment usi...
Determination of volatile organic compounds in surface water and sediment usi...IOSR Journals
 
Spectroscopic, Thermal, Magnetic and conductimetric studies on some 7-hydroxy...
Spectroscopic, Thermal, Magnetic and conductimetric studies on some 7-hydroxy...Spectroscopic, Thermal, Magnetic and conductimetric studies on some 7-hydroxy...
Spectroscopic, Thermal, Magnetic and conductimetric studies on some 7-hydroxy...IOSR Journals
 
Rheological Characterization of Bituminous Binder containing Wax based Warm M...
Rheological Characterization of Bituminous Binder containing Wax based Warm M...Rheological Characterization of Bituminous Binder containing Wax based Warm M...
Rheological Characterization of Bituminous Binder containing Wax based Warm M...IOSR Journals
 
Capital Structure andCorporate Governance practices. Evidence from Listed Non...
Capital Structure andCorporate Governance practices. Evidence from Listed Non...Capital Structure andCorporate Governance practices. Evidence from Listed Non...
Capital Structure andCorporate Governance practices. Evidence from Listed Non...IOSR Journals
 
Effect of 3D parameters on Antifungal Activities of Some Heterocyclic Compounds
Effect of 3D parameters on Antifungal Activities of Some Heterocyclic CompoundsEffect of 3D parameters on Antifungal Activities of Some Heterocyclic Compounds
Effect of 3D parameters on Antifungal Activities of Some Heterocyclic CompoundsIOSR Journals
 

Viewers also liked (20)

Comparative Analysis of a 15 Story Flat Plate Building with and Without Shear...
Comparative Analysis of a 15 Story Flat Plate Building with and Without Shear...Comparative Analysis of a 15 Story Flat Plate Building with and Without Shear...
Comparative Analysis of a 15 Story Flat Plate Building with and Without Shear...
 
J010415660
J010415660J010415660
J010415660
 
Bandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slotsBandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slots
 
Effect on Environment by Burning Different Agricultural Waste
Effect on Environment by Burning Different Agricultural WasteEffect on Environment by Burning Different Agricultural Waste
Effect on Environment by Burning Different Agricultural Waste
 
G1103044353
G1103044353G1103044353
G1103044353
 
Design and Optimization of Front Underrun Protection Device
Design and Optimization of Front Underrun Protection DeviceDesign and Optimization of Front Underrun Protection Device
Design and Optimization of Front Underrun Protection Device
 
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionComparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
 
Engine Emissions at Various Cetane Numbers with Exhaust Gas Recirculation
Engine Emissions at Various Cetane Numbers with Exhaust Gas RecirculationEngine Emissions at Various Cetane Numbers with Exhaust Gas Recirculation
Engine Emissions at Various Cetane Numbers with Exhaust Gas Recirculation
 
Measurement and Evaluation of Reliability, Availability and Maintainability o...
Measurement and Evaluation of Reliability, Availability and Maintainability o...Measurement and Evaluation of Reliability, Availability and Maintainability o...
Measurement and Evaluation of Reliability, Availability and Maintainability o...
 
G010224751
G010224751G010224751
G010224751
 
A010410109
A010410109A010410109
A010410109
 
E010412941
E010412941E010412941
E010412941
 
Determination of volatile organic compounds in surface water and sediment usi...
Determination of volatile organic compounds in surface water and sediment usi...Determination of volatile organic compounds in surface water and sediment usi...
Determination of volatile organic compounds in surface water and sediment usi...
 
Spectroscopic, Thermal, Magnetic and conductimetric studies on some 7-hydroxy...
Spectroscopic, Thermal, Magnetic and conductimetric studies on some 7-hydroxy...Spectroscopic, Thermal, Magnetic and conductimetric studies on some 7-hydroxy...
Spectroscopic, Thermal, Magnetic and conductimetric studies on some 7-hydroxy...
 
Rheological Characterization of Bituminous Binder containing Wax based Warm M...
Rheological Characterization of Bituminous Binder containing Wax based Warm M...Rheological Characterization of Bituminous Binder containing Wax based Warm M...
Rheological Characterization of Bituminous Binder containing Wax based Warm M...
 
Capital Structure andCorporate Governance practices. Evidence from Listed Non...
Capital Structure andCorporate Governance practices. Evidence from Listed Non...Capital Structure andCorporate Governance practices. Evidence from Listed Non...
Capital Structure andCorporate Governance practices. Evidence from Listed Non...
 
Effect of 3D parameters on Antifungal Activities of Some Heterocyclic Compounds
Effect of 3D parameters on Antifungal Activities of Some Heterocyclic CompoundsEffect of 3D parameters on Antifungal Activities of Some Heterocyclic Compounds
Effect of 3D parameters on Antifungal Activities of Some Heterocyclic Compounds
 
E017613040
E017613040E017613040
E017613040
 
B010620715
B010620715B010620715
B010620715
 
G012334650
G012334650G012334650
G012334650
 

Similar to O017128591

Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
Php text processing by softroniics
Php text processing by softroniicsPhp text processing by softroniics
Php text processing by softroniicsaswin tbbc
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxMohamedNowfeek1
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxpooleavelina
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...ams1ams11
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSacijjournal
 

Similar to O017128591 (20)

Unit 2
Unit 2Unit 2
Unit 2
 
L017136269
L017136269L017136269
L017136269
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
Php text processing by softroniics
Php text processing by softroniicsPhp text processing by softroniics
Php text processing by softroniics
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
N45028390
N45028390N45028390
N45028390
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 

Recently uploaded (20)

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

O017128591

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. II (Jan – Feb. 2015), PP 85-91 www.iosrjournals.org DOI: 10.9790/0661-17128591 www.iosrjournals.org 85 | Page The effect of Encryption algorithms Delay on TCP Traffic over data networks Esam Suliman Mustafa Ahmed1 , Dr.Amin Babiker A/Nabi Mustafa2 1, 2 (Faculty of Engineering / AL-Neelain University, Sudan) Abstract: Security is a big concern for data networks users. Data encryption considered to be one of the best solutions for security issues. There are some standard encryption algorithms that used to encrypt transferred data using encryption keys. DES, 3DES, and AES are common encryption algorithms used in TCP/IP networks. Virtual Private Networking (VPN) is the one of the best security mechanisms that used encrypted virtual tunnels .In this paper the effect of encryption delay on TCP based applications is discussed. Simulation is a major part of this Paper. Increasing the encryption delay and then comparing the effect of that delay on TCP protocol through different scenarios is the methodology of the study, using OPNET. One server supporting HTTP and DB services is used. Four scenarios have been simulated. Results were compared by measuring the effect of applying different encryption delay values to the same network. Keywords: VPN, DES,3DES, AES,OPNET, IRC, BLOWFISH I. Introduction There are two types of encryption methodologies 1.1 Symmetric encryption Symmetric encryption also referred to as conventional encryption or single-key encryption was the only type of encryption in use prior to the development of public key encryption in the 1970s.it is a form of cryptosystem in which encryption and decryption are performed using the same key. It is also known as conventional encryption. Symmetric encryption transforms plaintext into cipher text using a secret key and an encryption algorithm. Using the same key and a decryption algorithm, the plaintext is recovered from the cipher text .Traditional symmetric ciphers use substitution and/or transposition techniques. Substitution techniques map plaintext elements (characters, bits) into cipher text elements. Transposition techniques systematically transpose the positions of plaintext elements. Symmetric encryption scheme has five ingredients (Figure 1): • Plaintext: This is the original intelligible message or data that is fed into the Algorithm as input. • Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the plaintext. • Secret key: The secret key is also input to the encryption algorithm. The key is a value independent of the plaintext and of the algorithm. The algorithm will produce a different output depending on the specific key being used at the time. The exact substitutions and transformations performed by the algorithm depend on the key. • Cipher text: This is the scrambled message produced as output. It depends on the plaintext and the secret key. For a given message, two different keys will produce two different cipher texts. The cipher text is an apparently random stream of data and, as it stands, is unintelligible. • Decryption algorithm: This is essentially the encryption algorithm run in reverse. It takes the cipher text and the secret key and produces the original plaintext.
  • 2. The effect of Encryption algorithms Delay on TCP Traffic over data networks DOI: 10.9790/0661-17128591 www.iosrjournals.org 86 | Page Figure 1. Simplified Model of Symmetric Encryption Cryptography Cryptographic systems are characterized along three independent dimensions:  The type of operations used for transforming plaintext to cipher text. All encryption algorithms are based on two general principles: substitution, in which each element in the plaintext (bit, letter, group of bits or letters) is mapped into another element, and transposition, in which elements in the plaintext are rearranged. The fundamental requirement is that no information be lost (that is, that all operations are reversible). Most systems, referred to as product systems, involve multiple stages of substitutions and transpositions.  The number of keys used. If both sender and receiver use the same key, the system is referred to as symmetric, single-key, secret-key, or conventional encryption. If the sender and receiver use different keys, the system is referred to as asymmetric, two-key, or public-key encryption.  The way in which the plaintext is processed. A block cipher processes the input one block of elements at a time, producing an output block for each input block. A stream cipher processes the input elements continuously, producing output one element at a time, as it goes along. 1.2 Asymmetric encryption Is a form of cryptosystem in which encryption and decryption are performed using the different keys— one a public key and one a private key. It is also known as public-key encryption. Asymmetric encryption transforms plaintext into cipher text using a one of two keys and an encryption algorithm. Using the paired key and a decryption algorithm, the plaintext is recovered from the cipher text. The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on the difficulty of finding the prime factors of a composite number Public-key cryptography provides a radical departure from all that has gone before. For one thing, public-key algorithms are based on mathematical functions rather than on substitution and permutation. More important, public-key cryptography is asymmetric, involving the use of two separate keys, in contrast to symmetric encryption, which uses only one key. The use of two keys has profound consequences in the areas of confidentiality, key distribution, and authentication. Terminology Related to Asymmetric Encryption Asymmetric Keys: Two related keys, a public key and a private key, that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification. Public Key Certificate: A digital document issued and digitally signed by the private key of a Certification Authority that binds the name of a subscriber to a public key. The certificate indicates that the subscriber identified in the certificate has sole control and access to the corresponding private key. Public Key (Asymmetric) Cryptographic Algorithm: A cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that deriving the private key from the public key is computationally infeasible. Public Key Infrastructure (PKI): A set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pair including the ability to issue ,maintain, and revoke public key certificates.
  • 3. The effect of Encryption algorithms Delay on TCP Traffic over data networks DOI: 10.9790/0661-17128591 www.iosrjournals.org 87 | Page Figure 2. Encryption with public key • Plaintext: This is the readable message or data that is fed into the algorithm as input. • Encryption algorithm: The encryption algorithm performs various transformations on the plaintext. • Public and private keys: This is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption. The exact transformations performed by the algorithm depend on the public or private key that is provided as input. • Cipher text: This is the scrambled message produced as output. It depends on the plaintext and the key. For a given message, two different keys will produce two different cipher texts. • Decryption algorithm: This algorithm accepts the cipher text and the matching key and produces the original plaintext. II. The Design Four scenarios are used to measure the effect of encryption delay on the network. In the first scenario the server is accessed by Clients from different three remote LANs connected through IP cloud to the Core router without applying any Encryption (no VPN) as it shown in fig (3). The server supported tow services, DB and HTTP. Figure 3.TCP/IP Traffic without Data encryption (No-Encryption Scenario) In the other three scenarios, encrypted VPN tunneling applied between the three LANs and The Core Router as it shown in figure 4
  • 4. The effect of Encryption algorithms Delay on TCP Traffic over data networks DOI: 10.9790/0661-17128591 www.iosrjournals.org 88 | Page Figure 4. Encrypted VPN Tunnel applied Encryption/Decryption delay values increased in (Encryption Delay 1, 2, 3) scenarios according to the following table Figure 5. Encryption/Decryption delay setting III. The Results An event of the simulation is defined as Web Browsing (Light HTTP), and Database Access (Light). Results were collected after the simulation was run. Statistics of each scenario presented in a graph that detailed the activity throughout the simulation. Graph 6 illustrates the time average (in TCP Delay (Second)). Scenario Encryption/Decryption Delay(ms) Encryption Delay 1 0.02 ms Encryption Delay 2 0.04 ms Encryption Delay 3 0.05 ms
  • 5. The effect of Encryption algorithms Delay on TCP Traffic over data networks DOI: 10.9790/0661-17128591 www.iosrjournals.org 89 | Page Figure 6.Time_average(in TCP Delay (sec)) The graph shows that the TCP Delay increased simultaneously with the encryption/decryption delay. the lowest value of the delay is before applying encrypted tunnels and the highest value in scenario 3(Encryption Delay 3)which have the highest encryption delay value. Graph 7 shows the time average (in TCP Segment delay (Sec)).from the graph we remarked that the segment delay also increased according to the increased in encryption delay. Lowest value in NO_ Encryption scenario and highest value in scenario 3(Encryption Delay 3). Figure 7.Time average (in TCP segment Delay (sec)) Figure 8 illustrate IP End-to-End delay Variation in the four scenarios. The delay also increased according to the value of encryption Delay.
  • 6. The effect of Encryption algorithms Delay on TCP Traffic over data networks DOI: 10.9790/0661-17128591 www.iosrjournals.org 90 | Page Figure 8.Time_average (in IP End-to-End Delay Variation (Sec)) Figure 9 illustrate the TCP connection Delay. Three scenarios are shown here (Encryption Delay 1, 2, 3 Scenarios).the graph shows that the delay increased forward from scenario 1 to scenario 3. Figure 9.Time_average (TCP connection Delay (Sec)) IV. Conclusion Referring to the graphs we get that there is a vast TCP Delay after applying the Encrypted tunnels, TCP delay increased according to encryption delay. The Delay on TCP traffic leads to network congestion which affects the performance and stability of the network. Encryption is the most effective mechanism to secure the flow of data traffic within the network. Encrypted data face some issues. Packet loss, out-of order packets, and TCP latency. Balancing between complex encryption algorithms and performance of the network must is so important to reduce the effect of encryption delay on the network. Using fast encryption algorithms like Blowfish and RC4 when the data is not so important. CPU speed is major part of any encryption system.
  • 7. The effect of Encryption algorithms Delay on TCP Traffic over data networks DOI: 10.9790/0661-17128591 www.iosrjournals.org 91 | Page References [1]. Henric Johnson , Network Security, Blekinge Institute of Technology, Sweden. [2]. W. ~Diffie and E.~Hellman, {New directions in cryptography}, IEEE Transactions on Information Theory {22} (1976). [3]. Douglas E.Comer, Computer Networks and Internets [4]. McDysan. D. (2000), VPN applications Guide [5]. Behrouz A. Forouzan (2007), Data Communications and Networking [6]. J. Walrand and P. Varaiya, High-Performance Communication Networks. [7]. Dina Katabi, Mark Handley, and Charlie Rohrs, "Congestion Control for High Bandwidth-Delay Product Networks," [8]. David D. Clark, Van Jacobson, John Romkey, and Howard Salwen, "An Analysis of TCP Processing Overhead," IEEE Communications Magazine, June 1989 [9]. Kent, IP Authentication Header, November 1998. [10]. IPsec VPN WAN Design Overview,http://www.cisco.com [11]. IPsec Direct Encapsulation Design Guide— http://www.cisco.com/en/US/docs/solutions. [12]. Kosiur, D,"Building and Managing Virtual Private Networks," New York, NY(1998). [13]. Erwin, M., Scott, C, Wolfe ," Virtual Private Networks" Sebastopol CA: O'Rielly , Associates Inc(1999).