Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic algorithms function more efficiently when implemented in hardware than in software running on single processor. However, systems that use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an alternative, it is possible to implement cryptographic algorithms in software running on multiple processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES have some drawbacks when implemented in software: DES is no longer secure as computers get more powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is rapidly being adopted worldwide, provides a better combination of performance and enhanced network security than DES or 3DES by being computationally more efficient than these earlier standards. Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against brute-force attacks.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
Analysis and comparison of symmetric keyIJNSA Journal
The document analyzes and compares the performance of symmetric key cryptographic algorithms based on various file features such as data type, size, density, and key size. It tests the encryption time of algorithms like AES, DES, Triple DES, RC2, Blowfish, Skipjack and RC4 on different data types, file sizes ranging from 10MB to 482MB, and files with different data densities. The results show that encryption time is not affected by data type but increases proportionally with file size and number of bytes. Encryption time is also similar for sparse and dense files of comparable sizes. RC4 has the fastest encryption time while AES time is low compared to other block ciphers.
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)IJNSA Journal
This paper gives a new proposed cryptosystem (REBC3) that is designed to take advantages of the new generation of 64bits microprocessors which commercially known as x64 systems. The old version REBC2, which was published in Africon 2007. REBC2 was basically developed for the 32bits microprocessors which is commercially known as x86 systems. REBC3 like REBC2 use the concept of rotor enhanced block
cipher which was initially proposed by the author in [NRSC 2002] on the first version of REBC. REBC2 used the same concept from a another point of view, which is using rotors to achieve two basic cryptographic operations; permutation, and substitution. Round key is generated using rotor too, which is used to achieve ciphertext key dependency. To enhance non-linearity and to resist linear cryptanalysis, REBC3 has a variable block, and key lengths. Each round has its own block length which depends on round the key and round key length. Dependency is based upon the previous round generated key. Rotors implemented using successive affine transformation. The 32 bits version was proposed in KAMFEE cipher, then the 64bits version was proposed in KAMFEE-X64 cipher. This achieved memory-less, normalized ciphertext statistics, and small processing speed trend. The strength of this system is compared with the
REBC2 and RIJNDAEL (AES) ciphers. REBC3 cipher gives excellent results from security characteristics and statistical point of view of. So authors suggests to use REBC3 in the area of banking and electronic fund transfer.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
Dynamic selection of symmetric key cryptographic algorithms for securing data...csandit
Most of the information is in the form of electronic data. A lot of electronic data exchanged
takes place through computer applications. Therefore information exchange through these
applications needs to be secure. Different cryptographic algorithms are usually used to address
these security concerns. However, along with security there are other factors that need to be
considered for practical implementation of different cryptographic algorithms like
implementation cost and performance. This paper provides comparative analysis of time taken
for encryption by seven symmetric key cryptographic algorithms (AES, DES, Triple DES, RC2,
Skipjack, Blowfish and RC4) with variation of parameters like different data types, data density,
data size and key sizes.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic algorithms function more efficiently when implemented in hardware than in software running on single processor. However, systems that use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an alternative, it is possible to implement cryptographic algorithms in software running on multiple processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES have some drawbacks when implemented in software: DES is no longer secure as computers get more powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is rapidly being adopted worldwide, provides a better combination of performance and enhanced network security than DES or 3DES by being computationally more efficient than these earlier standards. Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against brute-force attacks.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
Analysis and comparison of symmetric keyIJNSA Journal
The document analyzes and compares the performance of symmetric key cryptographic algorithms based on various file features such as data type, size, density, and key size. It tests the encryption time of algorithms like AES, DES, Triple DES, RC2, Blowfish, Skipjack and RC4 on different data types, file sizes ranging from 10MB to 482MB, and files with different data densities. The results show that encryption time is not affected by data type but increases proportionally with file size and number of bytes. Encryption time is also similar for sparse and dense files of comparable sizes. RC4 has the fastest encryption time while AES time is low compared to other block ciphers.
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)IJNSA Journal
This paper gives a new proposed cryptosystem (REBC3) that is designed to take advantages of the new generation of 64bits microprocessors which commercially known as x64 systems. The old version REBC2, which was published in Africon 2007. REBC2 was basically developed for the 32bits microprocessors which is commercially known as x86 systems. REBC3 like REBC2 use the concept of rotor enhanced block
cipher which was initially proposed by the author in [NRSC 2002] on the first version of REBC. REBC2 used the same concept from a another point of view, which is using rotors to achieve two basic cryptographic operations; permutation, and substitution. Round key is generated using rotor too, which is used to achieve ciphertext key dependency. To enhance non-linearity and to resist linear cryptanalysis, REBC3 has a variable block, and key lengths. Each round has its own block length which depends on round the key and round key length. Dependency is based upon the previous round generated key. Rotors implemented using successive affine transformation. The 32 bits version was proposed in KAMFEE cipher, then the 64bits version was proposed in KAMFEE-X64 cipher. This achieved memory-less, normalized ciphertext statistics, and small processing speed trend. The strength of this system is compared with the
REBC2 and RIJNDAEL (AES) ciphers. REBC3 cipher gives excellent results from security characteristics and statistical point of view of. So authors suggests to use REBC3 in the area of banking and electronic fund transfer.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
Dynamic selection of symmetric key cryptographic algorithms for securing data...csandit
Most of the information is in the form of electronic data. A lot of electronic data exchanged
takes place through computer applications. Therefore information exchange through these
applications needs to be secure. Different cryptographic algorithms are usually used to address
these security concerns. However, along with security there are other factors that need to be
considered for practical implementation of different cryptographic algorithms like
implementation cost and performance. This paper provides comparative analysis of time taken
for encryption by seven symmetric key cryptographic algorithms (AES, DES, Triple DES, RC2,
Skipjack, Blowfish and RC4) with variation of parameters like different data types, data density,
data size and key sizes.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
In modern world, security is the most valuable term in the field of communication system. Security comes
along with many technologies and methods, where one of the most secure technologies is Cryptography
where ordinary plain text is converted into cipher text for transferring data to the valid user. Cryptography
algorithms can be divided into two types based on the number of keys such as Symmetric and Asymmetric
where Symmetric algorithm works with one single key and Asymmetric algorithm works with two different
keys. However, selecting the appropriate algorithms for specific application has been always a challenging
task because of the latency, key size, and security issues. Cryptographic algorithms face different type of
attacks like brute force attack, man in the middle attack, cycle attacks etc., which are still remained as
threads. This paper presents the performance analysis, based on different performance metrics and threads,
of various techniques of cryptographic algorithms and identifies the suitable algorithms for different types
of applications.
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
1) The document discusses the implementation of the Advanced Encryption Standard (AES) algorithm for encryption on an Arduino Mega2560 board. AES was chosen to securely transmit sensor data collected by microcontrollers.
2) AES provides stronger encryption than older standards like DES and 3DES through its larger key sizes of 128, 192, and 256 bits and more rounds of encryption. The document implements a simple version of AES on the Arduino board.
3) Testing showed the AES code used 8824 bytes of program storage on the Arduino and encryption took 3016 microseconds while decryption took 3792 microseconds, demonstrating AES can provide security for resource-constrained devices.
Randomness evaluation framework of cryptographic algorithmsijcisjournal
Nowadays, computer systems are developing very rapidly and become more and more complex, which
leads to the necessity to provide security for them. This paper is intended to present software for testing
and evaluating cryptographic algorithms. When evaluating block and stream ciphers one of the most basic
property expected from them is to pass statistical randomness testing, demonstrating in this way their
suitability to be random number generators. The primary goal of this paper is to propose a new framework
to evaluate the randomness of cryptographic algorithms: based only on a .dll file which offers access to the
encryption function, the decryption function and the key schedule function of the cipher that has to be tested
(block cipher or stream cipher), the application evaluates the randomness and provides an interpretation of
the results. For this, all nine tests used for evaluation of AES candidate block ciphers and three NIST
statistical tests are applied to the algorithm being tested. In this paper, we have evaluated Tiny Encryption
Algorithm (block cipher), Camellia (block cipher) and LEX (stream cipher) to determine if they pass
statistical randomness testing.
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
This document summarizes a study that evaluates the performance of four symmetric key cryptography algorithms: DES, 3DES, Blowfish, and AES. The study considers criteria like file size, file type, encryption and decryption time, and block size. It finds that Blowfish has the best performance, encrypting and decrypting data faster than the other algorithms. AES also performs well, while 3DES has the lowest performance due to its longer key length. The document reviews related literature comparing the performance of symmetric key cryptography algorithms and techniques that combine cryptography with steganography for enhanced security.
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
This document summarizes a research paper that proposes a new encryption algorithm to improve performance parameters. The algorithm is divided into two phases. Phase 1 involves reversing, swapping, circularly shifting bits of the plaintext and XORing with the key. Phase 2 divides the output into blocks, then recombines the left bits of each block. The paper analyzes avalanche effect and execution time of the proposed algorithm compared to existing algorithms to evaluate its performance. The results show better performance than existing algorithms.
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
Abstract: In this research paper ,we developed a model for a large network, wireless nodes are interconnected and each can be considered as a node processor that offer services to other node processors connected to a specific network. A very high proportion of the nodes that offer services need to carry out an authentication process so as to make an access request to the node offering the service. In this context, an integrated reconfigurable network security architecture moved to the application layer has become the need of the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address based layer and the routing protocols of the network layer. This work focuses on the use of emulator and embedded hardware architectures for wireless network security. In this work, the individual nodes can have a unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation on node processor and application data located in the processor Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid
algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations
Extended of TEA: A 256 bits block cipher algorithm for image encryption IJECEIAES
This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size from 64-bit to 256-bit by using F-function in type three Feistel network design. The key schedule generation is very straightforward through admixture the entire major subjects in the identical manner for every round. The proposed ETEA algorithm is word-oriented, where wholly internal operations are executed on words of 32 bits. So, it is possible to efficiently implement the proposed algorithm on smart cards. The results of the experimental demonstration that the proposed encryption algorithm for all methods are efficient and have high security features through statistical analysis using histograms, correlation, entropy, randomness tests, and the avalanche effect.
New modification on feistel DES algorithm based on multi-level keys IJECEIAES
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it experiences many problems. For example, it uses only one function (XOR) in the encryption process, and the combination of data is finite because it occurs only twice and operates on bits. This paper presents a new modification of the DES to overcome these problems. This could be done through adding a new level of security by increasing the key space (using three keys) during the 16 rounds of the standard encryption algorithm and by replacing the predefined XOR operation with a new # operation. Our proposed algorithm uses three keys instead of one. The first key is the input key used for encrypting and decrypting operations. The second key is used for determining the number of bits, while the third key is used for determining the table numbers, which are from 0 to 255. Having evaluated the complexity of our proposed algorithm, the results show that it is the most complex compared with the well-known DES and other modified algorithms. Consequently, in our proposed algorithm, the attacker try a number of attempts 2 1173 at minimum to decrypt the message. This means that the proposed DES algorithm will increase the security level of the well-known DES.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
Enhanced Advanced Encryption Standard (E-AES): using ESETIRJET Journal
This document proposes an enhanced version of the Advanced Encryption Standard (AES) called E-AES. E-AES increases the key size to 2048 bits and the block size to 1024 bits. This provides more security than AES, which uses a 128, 192, or 256 bit key on a 128 bit block. E-AES specifies 64 rounds of encryption, compared to AES which uses 10 to 14 rounds depending on key size. The encryption process of E-AES involves four transformations at each round: byte substitution using an S-box, shifting rows of the state matrix, mixing data within columns, and adding a round key. This enhanced algorithm is proposed to address known attacks on AES and the use of its 16 year old standard with
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
This document presents a system for secure ranked keyword search over encrypted cloud data. It aims to allow data owners to outsource encrypted data to the cloud while enabling authorized users to efficiently search the data. The system uses an encrypted index and relevance scores to return search results in ranked order based on relevance, without revealing keywords or data contents. It proposes algorithms for building the encrypted index, calculating relevance scores, and mapping values to enable ranked search. The system is designed to achieve security of data and queries while providing efficient search functionality on outsourced encrypted cloud data.
New approach in symmetric block cipher security using a new cubical techniqueijcsit
Cryptography is a security technique that must be applied in both communication sides to protect the data during its transmission through the network from all kinds of attack. On the sender side, the original data will be changed into different symbols or shapes by using a known key; this is
called encryption. On the other communication side, the decryption process will be done and the data will be returned to its former shape by using the agreed key. The importance of cryptography is to fulfil the communication security requirements. Real time applications (RTA) are vulnerable for the moment because of their big size. However, some of the current algorithms are not really
appropriate for use with these kinds of information. In this paper, a novel symmetric block cipher cryptography algorithm has been illustrated and discussed. The system uses an 8x8x8 cube, and each cell contains a pair of binary inputs. The cube can provide a huge number of combinations that can produce a very strong algorithm and a long key size. Due to the lightweight and fast technique used in this idea, it is expected to be extremely rapid compared to the majority of current algorithms, such as DES and AES.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
In this paper, a new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure than DES algorithm, but at the same time faster than 3DES algorithm. Some parts of the DES are modified to improve its security and performance aspects. The proposed algorithm is named XS-DES (Extra Secure DES). We modify the process of key generation to improve its level of security, and present the proposed algorithm’s design structure in more detail. We increase the size of the key from 64 bits into 128 bits, and then split the key into two halves, left and right (Kl, Kr), and each one consists of 64 bits. XS-DES will be used to encrypt some important information inside the database, like passwords, exam scores, and other confidential details. In other words, to increase the security in the database and protect it from attackers, all critical information must be encrypted using a strong encryption algorithm and a more secure algorithm (XS-DES) is proposed here. A workable Online Examination System (OES) that applies XS-DES and the original DES algorithms is developed. It has gone through some preliminary testings and a comparison is performed between the results of these algorithms based on their strengths in handling database attackers.
Improving Cloud Security Using Multi Level Encryption and AuthenticationAM Publications,India
As people have become more social and electronically attached, the concern for information sharing over the internet still persist. As known many powerful cryptographical approaches have been proposed in the past which are practically impossible to break, yet there exists a major concern of total encryption and decryption time taken as a whole. It is a known fact that in encrypting a large chunk of data, traditional asymmetric key algorithm may be slower to symmetric key algorithm by 1000 times or more. Hence this paper proposes a hierarchical structure in which the parties are first authenticated, then exchange keys by asymmetric key algorithm, then do actual encryption and decryption by the symmetric key algorithm. This will be useful to improve the security in cloud applications.
Dokumen tersebut membahas fungsi pengendalian dan pengawasan dalam manajemen pendidikan. Ia menjelaskan pengertian, jenis, asas, dan tujuan pengendalian dan pengawasan serta peranannya dalam mengarahkan proses manajemen pendidikan agar tetap terarah dan mencegah penyimpangan.
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
In modern world, security is the most valuable term in the field of communication system. Security comes
along with many technologies and methods, where one of the most secure technologies is Cryptography
where ordinary plain text is converted into cipher text for transferring data to the valid user. Cryptography
algorithms can be divided into two types based on the number of keys such as Symmetric and Asymmetric
where Symmetric algorithm works with one single key and Asymmetric algorithm works with two different
keys. However, selecting the appropriate algorithms for specific application has been always a challenging
task because of the latency, key size, and security issues. Cryptographic algorithms face different type of
attacks like brute force attack, man in the middle attack, cycle attacks etc., which are still remained as
threads. This paper presents the performance analysis, based on different performance metrics and threads,
of various techniques of cryptographic algorithms and identifies the suitable algorithms for different types
of applications.
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
1) The document discusses the implementation of the Advanced Encryption Standard (AES) algorithm for encryption on an Arduino Mega2560 board. AES was chosen to securely transmit sensor data collected by microcontrollers.
2) AES provides stronger encryption than older standards like DES and 3DES through its larger key sizes of 128, 192, and 256 bits and more rounds of encryption. The document implements a simple version of AES on the Arduino board.
3) Testing showed the AES code used 8824 bytes of program storage on the Arduino and encryption took 3016 microseconds while decryption took 3792 microseconds, demonstrating AES can provide security for resource-constrained devices.
Randomness evaluation framework of cryptographic algorithmsijcisjournal
Nowadays, computer systems are developing very rapidly and become more and more complex, which
leads to the necessity to provide security for them. This paper is intended to present software for testing
and evaluating cryptographic algorithms. When evaluating block and stream ciphers one of the most basic
property expected from them is to pass statistical randomness testing, demonstrating in this way their
suitability to be random number generators. The primary goal of this paper is to propose a new framework
to evaluate the randomness of cryptographic algorithms: based only on a .dll file which offers access to the
encryption function, the decryption function and the key schedule function of the cipher that has to be tested
(block cipher or stream cipher), the application evaluates the randomness and provides an interpretation of
the results. For this, all nine tests used for evaluation of AES candidate block ciphers and three NIST
statistical tests are applied to the algorithm being tested. In this paper, we have evaluated Tiny Encryption
Algorithm (block cipher), Camellia (block cipher) and LEX (stream cipher) to determine if they pass
statistical randomness testing.
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
This document summarizes a study that evaluates the performance of four symmetric key cryptography algorithms: DES, 3DES, Blowfish, and AES. The study considers criteria like file size, file type, encryption and decryption time, and block size. It finds that Blowfish has the best performance, encrypting and decrypting data faster than the other algorithms. AES also performs well, while 3DES has the lowest performance due to its longer key length. The document reviews related literature comparing the performance of symmetric key cryptography algorithms and techniques that combine cryptography with steganography for enhanced security.
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
This document summarizes a research paper that proposes a new encryption algorithm to improve performance parameters. The algorithm is divided into two phases. Phase 1 involves reversing, swapping, circularly shifting bits of the plaintext and XORing with the key. Phase 2 divides the output into blocks, then recombines the left bits of each block. The paper analyzes avalanche effect and execution time of the proposed algorithm compared to existing algorithms to evaluate its performance. The results show better performance than existing algorithms.
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
Abstract: In this research paper ,we developed a model for a large network, wireless nodes are interconnected and each can be considered as a node processor that offer services to other node processors connected to a specific network. A very high proportion of the nodes that offer services need to carry out an authentication process so as to make an access request to the node offering the service. In this context, an integrated reconfigurable network security architecture moved to the application layer has become the need of the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address based layer and the routing protocols of the network layer. This work focuses on the use of emulator and embedded hardware architectures for wireless network security. In this work, the individual nodes can have a unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation on node processor and application data located in the processor Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid
algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations
Extended of TEA: A 256 bits block cipher algorithm for image encryption IJECEIAES
This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size from 64-bit to 256-bit by using F-function in type three Feistel network design. The key schedule generation is very straightforward through admixture the entire major subjects in the identical manner for every round. The proposed ETEA algorithm is word-oriented, where wholly internal operations are executed on words of 32 bits. So, it is possible to efficiently implement the proposed algorithm on smart cards. The results of the experimental demonstration that the proposed encryption algorithm for all methods are efficient and have high security features through statistical analysis using histograms, correlation, entropy, randomness tests, and the avalanche effect.
New modification on feistel DES algorithm based on multi-level keys IJECEIAES
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it experiences many problems. For example, it uses only one function (XOR) in the encryption process, and the combination of data is finite because it occurs only twice and operates on bits. This paper presents a new modification of the DES to overcome these problems. This could be done through adding a new level of security by increasing the key space (using three keys) during the 16 rounds of the standard encryption algorithm and by replacing the predefined XOR operation with a new # operation. Our proposed algorithm uses three keys instead of one. The first key is the input key used for encrypting and decrypting operations. The second key is used for determining the number of bits, while the third key is used for determining the table numbers, which are from 0 to 255. Having evaluated the complexity of our proposed algorithm, the results show that it is the most complex compared with the well-known DES and other modified algorithms. Consequently, in our proposed algorithm, the attacker try a number of attempts 2 1173 at minimum to decrypt the message. This means that the proposed DES algorithm will increase the security level of the well-known DES.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
Enhanced Advanced Encryption Standard (E-AES): using ESETIRJET Journal
This document proposes an enhanced version of the Advanced Encryption Standard (AES) called E-AES. E-AES increases the key size to 2048 bits and the block size to 1024 bits. This provides more security than AES, which uses a 128, 192, or 256 bit key on a 128 bit block. E-AES specifies 64 rounds of encryption, compared to AES which uses 10 to 14 rounds depending on key size. The encryption process of E-AES involves four transformations at each round: byte substitution using an S-box, shifting rows of the state matrix, mixing data within columns, and adding a round key. This enhanced algorithm is proposed to address known attacks on AES and the use of its 16 year old standard with
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
This document presents a system for secure ranked keyword search over encrypted cloud data. It aims to allow data owners to outsource encrypted data to the cloud while enabling authorized users to efficiently search the data. The system uses an encrypted index and relevance scores to return search results in ranked order based on relevance, without revealing keywords or data contents. It proposes algorithms for building the encrypted index, calculating relevance scores, and mapping values to enable ranked search. The system is designed to achieve security of data and queries while providing efficient search functionality on outsourced encrypted cloud data.
New approach in symmetric block cipher security using a new cubical techniqueijcsit
Cryptography is a security technique that must be applied in both communication sides to protect the data during its transmission through the network from all kinds of attack. On the sender side, the original data will be changed into different symbols or shapes by using a known key; this is
called encryption. On the other communication side, the decryption process will be done and the data will be returned to its former shape by using the agreed key. The importance of cryptography is to fulfil the communication security requirements. Real time applications (RTA) are vulnerable for the moment because of their big size. However, some of the current algorithms are not really
appropriate for use with these kinds of information. In this paper, a novel symmetric block cipher cryptography algorithm has been illustrated and discussed. The system uses an 8x8x8 cube, and each cell contains a pair of binary inputs. The cube can provide a huge number of combinations that can produce a very strong algorithm and a long key size. Due to the lightweight and fast technique used in this idea, it is expected to be extremely rapid compared to the majority of current algorithms, such as DES and AES.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
In this paper, a new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure than DES algorithm, but at the same time faster than 3DES algorithm. Some parts of the DES are modified to improve its security and performance aspects. The proposed algorithm is named XS-DES (Extra Secure DES). We modify the process of key generation to improve its level of security, and present the proposed algorithm’s design structure in more detail. We increase the size of the key from 64 bits into 128 bits, and then split the key into two halves, left and right (Kl, Kr), and each one consists of 64 bits. XS-DES will be used to encrypt some important information inside the database, like passwords, exam scores, and other confidential details. In other words, to increase the security in the database and protect it from attackers, all critical information must be encrypted using a strong encryption algorithm and a more secure algorithm (XS-DES) is proposed here. A workable Online Examination System (OES) that applies XS-DES and the original DES algorithms is developed. It has gone through some preliminary testings and a comparison is performed between the results of these algorithms based on their strengths in handling database attackers.
Improving Cloud Security Using Multi Level Encryption and AuthenticationAM Publications,India
As people have become more social and electronically attached, the concern for information sharing over the internet still persist. As known many powerful cryptographical approaches have been proposed in the past which are practically impossible to break, yet there exists a major concern of total encryption and decryption time taken as a whole. It is a known fact that in encrypting a large chunk of data, traditional asymmetric key algorithm may be slower to symmetric key algorithm by 1000 times or more. Hence this paper proposes a hierarchical structure in which the parties are first authenticated, then exchange keys by asymmetric key algorithm, then do actual encryption and decryption by the symmetric key algorithm. This will be useful to improve the security in cloud applications.
Dokumen tersebut membahas fungsi pengendalian dan pengawasan dalam manajemen pendidikan. Ia menjelaskan pengertian, jenis, asas, dan tujuan pengendalian dan pengawasan serta peranannya dalam mengarahkan proses manajemen pendidikan agar tetap terarah dan mencegah penyimpangan.
This document discusses using artificial neural networks for network intrusion detection. Specifically, it proposes a hybrid classification model that uses entropy-based feature selection to reduce the dataset, followed by four neural network techniques (RBFN, SOM, SMO, PART) for classification. It provides details on each neural network technique and the overall methodology, which uses 10-fold cross validation to evaluate performance based on standard criteria. The goal is to build an efficient intrusion detection system with low false alarms and high detection rates.
This document is a curriculum vitae for Arpit Pathak. It includes his contact information, education history, skills and qualifications. He has a Bachelor's degree in Computer Applications from Punjab Technical University. His skills include proficiency in Salesforce administration, customization, development using Apex, Visualforce and databases. His hobbies include driving, cricket and music. He is looking for an opportunity to apply his knowledge and skills in a progressive organization.
The process of language learning involves the mastery of countless tasks: making the constituent sounds of
the language being learned, learning the grammatical patterns, and acquiring the requisite vocabulary for
reception and production.
While a plethora of computational tools exist to facilitate the first and second of these tasks, a number of
challenges arise with respect to enabling the third. This paper describes a tool that has been designed to
support language learners with the challenge of understanding the use of ‘closed-class’ lexical items.
The process of learning the Arabic for ‘office’ is (mktb) is relatively simple and should be possible by
means of simple repetition of the word. However, it is much more difficult to learn and correctly use the
Arabic equivalent of the word ‘on’. The current paper describes a mechanism for the delivery of diagnostic
information regarding specific lexical examples, with the aim of clearly demonstrating why a particular
translation of a given closed-class item may be appropriate in certain situations but not others, thereby
helping learners to understand and use the term correctly.
El documento describe el crecimiento del turismo Halal en España y la introducción del primer crucero Halal en el país. Halux Cruises opera cruceros por el Mediterráneo orientados principalmente al público musulmán a bordo de un barco de 44.000 toneladas con capacidad para 610 pasajeros y 300 tripulantes. El itinerario incluye paradas en puertos españoles populares entre los turistas musulmanes como Granada, Córdoba y Barcelona.
This document provides an overview of traditional California Indian regalia, including headdresses, tattoos, hairstyles, and other ceremonial items. It describes the materials and cultural significance of regalia among different tribes, such as feathered headdresses among Great Basin chiefs and tattooing practices across California. The regalia reflected deep spiritual traditions and allowed expression of cultural identity, though many practices were suppressed or lost due to colonization.
The social network analysis (SNA), branch of complex systems can be used in the construction of multiagent
systems. This paper proposes a study of how social network analysis can assist in modeling multiagent
systems, while addressing similarities and differences between the two theories. We built a prototype
of multi-agent systems for resolution of tasks through the formation of teams of agents that are formed on
the basis of the social network established between agents. Agents make use of performance indicators to
assess when should change their social network to maximize the participation in teams.
In the absence of a dedicated designer on a project, teams are left with no option but to take a leap of faith where it comes to the quality of usability of a product or feature. As a result although you may deliver great quality code and a feature set net value to the end user and thereby your customer is in question.
The focus of this workshop is to equip non design roles with tools designers use for testing quality of designs.
This document discusses key concepts in inventory management for veterinary practices. It defines important terms like inventory, suppliers, and costs associated with inventory. Effective inventory management is critical for practice profitability as inventory is the second largest operating cost after staffing. The document outlines the goals of inventory control and describes an effective inventory system, including tracking item information, reorder points, costs, storage locations, and pricing. It also discusses determining ordering quantities and timing to balance inventory levels and costs.
Study in Risk Management of Steel Plant ProjectsDilpreet Singh
The scope of study includes qualitative and quantitative analysis which helps in consolidating decision making under uncertainty. The emphasis has been given in finding the most critical risks which were quantified with the help of @RISK software and as per the tornedo chart the results are interpreted. This helps in identifying major project as a management input and which in turn identifies mitigation solutions to resolve riskoriented issues in steel plant projects.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a study that analyzed the performance of the AES-128 encryption algorithm using CBC mode on wireless sensor network motes. The study implemented AES-128 encryption and decryption with a 128-bit key on TinyOS motes. It found that AES-128 CBC provided reliable encryption for sensor networks and its performance was analyzed by measuring encryption time and energy consumption for different plaintext sizes and network scales. The encryption and decryption processes used the same 128-bit key and performed 10 rounds of AES transformations as specified for a 128-bit key.
ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VA...IJNSA Journal
For achieving faster communication most of confidential data is circulated through networks as electronic data. Cryptographic ciphers have an important role for providing security to these confidential data against unauthorized attacks. Though security is an important factor, there are various factors that can affect the performance and selection of cryptographic algorithms during the practical implementation of these cryptographic ciphers for various applications. This paper provides analysis and comparison of some symmetric key cryptographic ciphers (RC4, AES, Blowfish, RC2, DES, Skipjack, and Triple DES) on the basis of encryption time with the variation of various file features like different data types, data size, data density and key sizes.
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...IRJET Journal
This document summarizes a research paper that proposes a model for privacy and data ownership in cloud computing using symmetric key encryption. The model uses AES-256 encryption to encrypt user data uploaded to the cloud, providing security. AES-256 is shown to be faster than other encryption algorithms like AES-128, AES-192, and DES. The proposed model includes user registration, encrypted file uploading and downloading using AES-256, and a trusted third party for sharing files between authorized users while maintaining security. Experimental results show AES-256 provides faster encryption than other algorithms.
Implementation of Cryptography Architecture with High Secure CoreIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
Dynamic selection of symmetric key cryptographic algorithms for securing data...csandit
Most of the information is in the form of electroni
c data. A lot of electronic data exchanged
takes place through computer applications. Therefor
e information exchange through these
applications needs to be secure. Different cryptogr
aphic algorithms are usually used to address
these security concerns. However, along with securi
ty there are other factors that need to be
considered for practical implementation of differen
t cryptographic algorithms like
implementation cost and performance. This paper pro
vides comparative analysis of time taken
for encryption by seven symmetric key cryptographic
algorithms (AES, DES, Triple DES, RC2,
Skipjack, Blowfish and RC4) with variation of param
eters like different data types, data density,
data size and key sizes.
Advanced approach for encryption using advanced encryption standard with chao...IJECEIAES
At present, security is significant for individuals and organizations. All information need security to prevent theft, leakage, alteration. Security must be guaranteed by applying some or combining cryptography algorithms to the information. Encipherment is the method that changes plaintext to a secure form called cipherment. Encipherment includes diverse types, such as symmetric and asymmetric encipherment. This study proposes an improved version of the advanced encryption standard (AES) algorithm called optimized advanced encryption standard (OAES). The OAES algorithm utilizes sine map and random number to generate a new key to enhance the complexity of the generated key. Thereafter, multiplication operation was performed on the original text, thereby creating a random matrix (4×4) before the five stages of the coding cycles. A random substitution-box (S-Box) was utilized instead of a fixed S-Box. Finally, we utilized the eXclusive OR (XOR) operation with digit 255, also with the key that was generated last. This research compared the features of the AES and OAES algorithms, particularly the extent of complexity, key size, and number of rounds. The OAES algorithm can enhance complexity of encryption and decryption by using random values, random S-Box, and chaotic maps, thereby resulting in difficulty guessing the original text.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
In this age of universal electronic connectivity of viruses and hackers of electronic eavesdropping and electronic fraud, there is indeed needed to store the information securely. This, in turn, led to a heightened awareness to protect data and resources from disclosure, to guarantee the authenticity of data and messages and to protect systems from network-based attacks. Information security via encryption decryption techniques is a very popular research area for many people’s over the years. This paper elaborates the basic concept of the cryptography, specially public and private cryptography. It also contains a review of some popular encryption decryption algorithms. A modified method is also proposed. This method is fast in comparison to the existing methods.
With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET Journal
1. The document discusses a hardware-software co-design of the AES encryption algorithm implemented on the NIOS II soft-core processor on an FPGA.
2. It proposes using a hardware-software co-design methodology to implement AES for encryption and decryption of 128-bit blocks using 128, 192, or 256-bit keys.
3. The implementation will utilize the Quartus II software tools and NIOS II integrated development environment to program the FPGA with the AES algorithm designed around the NIOS II soft-core processor.
Pipelining Architecture of AES Encryption and Key Generation with Search Base...VLSICS Design
A high speed security algorithm is always important for wired/wireless environment. The symmetric block cipher plays a major role in the bulk data encryption. One of the best existing symmetric security algorithms to provide data security is AES. AES has the advantage of being implemented in both hardware and software. Hardware implementation of the AES has the advantage of increased throughput and offers better security. Search based S-box architecture has been proposed in this paper to reduce the constraint in the hardware resources. The pipelined architecture of the AES algorithm is proposed in order to increase the throughput of the algorithm. Moreover the key schedule algorithm of the AES encryption is pipelined to get the speedup.
Pipelining Architecture of AES Encryption and Key Generation with Search Base...VLSICS Design
A high speed security algorithm is always important for wired/wireless environment. The symmetric block cipher plays a major role in the bulk data encryption. One of the best existing symmetric security algorithms to provide data security is AES. AES has the advantage of being implemented in both hardware and software. Hardware implementation of the AES has the advantage of increased throughput and offers better security. Search based S-box architecture has been proposed in this paper to reduce the constraint in the hardware resources. The pipelined architecture of the AES algorithm is proposed in order to increase the throughput of the algorithm. Moreover the key schedule algorithm of the AES encryption is pipelined to get the speedup.
This document proposes a hybrid encryption-decryption algorithm combining AES and DES. It implements the algorithm in VHDL using a Modelsim platform. The hybrid algorithm integrates AES into each iteration of DES's Feistel network, using AES operations like substitution and key addition. This increases computational complexity compared to the individual standards. The VHDL implementation includes modules for AES encryption/decryption and the hybrid algorithm. Simulations validate the code works correctly. Future work could increase iterations to suit different security levels or implement a 128-bit AES variant. The hybrid approach strengthens AES security against attacks.
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
The document compares and analyzes different encryption techniques. It summarizes the Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES). DES uses a 56-bit key and 64-bit block size, while 3DES extends DES to 168 bits for improved security. AES was developed later to replace DES and uses 128, 192, or 256 bit keys and block sizes. The document concludes that AES is more secure than DES and 3DES based on its longer key lengths and that it is the symmetric encryption algorithm of choice for future applications.
This document summarizes a research paper that designed and implemented a Quality of Security Service (QoSS)-compliant Advanced Encryption Standard (AES) processor for use in multimedia applications. The processor uses a reconfigurable architecture that can provide up to 12 different AES cipher schemes with reasonable hardware costs. It allows users to specify security requirements through a security vector. Evaluation showed the QoSS-AES processor can provide high security for multimedia communications like MPEG video with low latency. Implementation on FPGAs demonstrated competitive speed, area and power performance compared to other FPGA-based AES designs.
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
This document proposes a three-layer security model for privacy-preserving cloud storage. The model uses encryption techniques like AES and Triple DES to encrypt user data before storing it in the cloud. The encrypted data is then divided into blocks that are distributed across different cloud, fog, and local storage locations. This prevents data leakage even if some blocks are lost or accessed. Computational intelligence paradigms help optimize the distribution of data blocks for efficiency and security. The model aims to provide stronger privacy protection compared to traditional cloud storage security methods.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...IRJET Journal
This document discusses image encryption and decryption using AES (Advanced Encryption Standard) for robust data security and defense against intrusion attacks. It begins with an abstract that outlines the need for strong image encryption techniques to keep up with increasing information theft. The introduction provides background on cryptography, encryption, and decryption. It then discusses issues with existing encryption systems and proposes an AES-based encryption/decryption system for images that ensures confidentiality, integrity, and authentication to evade intrusion attacks. The document reviews related work on image encryption techniques and the AES algorithm. It describes the proposed AES encryption and decryption process in detail using techniques like substitution bytes, shift rows, mix columns, and add round key. The goal is to
Similar to A performance evaluation of common (20)
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
1. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
DOI : 10.5121/ijnsa.2015.7303 31
A PERFORMANCE EVALUATION OF COMMON
ENCRYPTION TECHNIQUES WITH SECURE WATERMARK
SYSTEM (SWS)
Ashraf Odeh1
, Shadi R.Masadeh2
, Ahmad Azzazi3
1
Computer Information Systems Department, Isra University, Amman, Jordan
2
Computer Networks Department, Isra University, Amman, Jordan
3
Computer Information Systems Department, Applied Science University, Amman,
Jordan
ABSTRACT
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
KEYWORDS
AES, DES, Blowfish, Secured Watermark System (SWS) and Computer Security.
1.INTRODUCTION
Security of information systems could be implemented with many widely known security
algorithms, which can be adjusted with different settings for these algorithms [1],[2],[11],[12].
There are a lot of factors for security settings [3],[5] with main important factors like the type of
cipher, which proves the security functionality, the processor time consumption, the size of
packets, the general power consumption, the data type used and the battery power consumption
[6],[10],[13].
A brief description of the most common ciphering algorithms like AES, DES, Blowfish and
3DES are discussed below:
1- DES: - The Data Encryption Standard is one of the most common used encryption mechanism
introduced in the year 1977.Using this algorithm data are encrypted using a 64 bit blocks with an
encryption key of 56 bit length. The DES with 64 bit input as steps applied in series gives an
output of 64 bits. The decryption of the cipher data is done with the reversed steps of the
2. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
32
encryption mechanism with the same key. Using the same key for the encryption and for the
decryption mechanisms gives the attackers of the cipher data a big opportunity to attack the
encryption system, which forms an important weakness of this algorithm [20],[19],[22].
2- 3DES: The 3DES encryption algorithm has the block of the size 64 bits. It uses an encryption
key of 192 bits. This algorithm is similar to the original Data Encryption Standard, but with the
difference that the 3DES is to be applied 3 times. The repeated application of 3 times of the
algorithm should give the encryption more complexity to increase security level of it and to
increase the safe time when trying to decrypt it. The 3DES is therefore slower than the traditional
block encryption algorithms [23],[24],[25].
3- AES: - Which stands for the Advanced Encryption Standard. This standard was introduced in
the year 2001.The AES algorithm was developed to overcome the weaknesses of the Data
Encryption Standard. It is a block cipher standard with a symmetric key solution. It provides an
encryption method better than the 3DES one with improved security level and improved security
efficiency. A variation of the AES is called the "Rijindael" with a variable key length of 128 bits,
192 bits or 256 bits, which is specified independent of the block length. The block length should
be limited in the standard to 128 bits [7]-[9],[11].
4-Blowfish: - This newly developed encryption mechanism is a symmetric block cipher standard.
It should be fast for encrypting data with a 32 bit processor at the clock speed of 18 cycles per
byte. It should use a compact memory size of 5K of less. This standard has a simple structure,
which is easy to implement and use. Therefore the strength of the standard could be easily
determined. The length of the key of the Blowfish standard is variable and can have the length of
448 bits. This gives the user of this mechanism to get higher security, but the user should consider
the speed issues when deploying higher values of the key length. The Block size of the Blowfish
is usually 64 bits [5],[22].
In our Research, we developed a novel algorithm to provide data security which is called the
Watermark System (SWS) algorithm. The newly developed algorithm SWS was tested through
the evaluation of the four mentioned algorithms for encryption (i.e. AES, DES and Blowfish)
compared with the developed (SWS) algorithm in term of time and power consumption. The
SWS adopts asymmetric encryption technique.
2. RELATED WORKS
There are many research studies related to the comparison of the commonly used security
algorithms like DES,AES,3DES, Blowfish and others [15].Different studies implement these
algorithms with different input files of different content and different sizes to compare the
performance of these algorithms with each other[15].
From pervious studies results show that the performance of Blowfish algorithm is the better
algorithm compared with the other mentioned algorithms. It showed also that the AES Algorithm
is efficient and faster than the other algorithms [16]. The transmission of data where considered
also in the pervious studies, with the conclusion that the AES has the best performance among the
compared encryption algorithms. It follows that; the DES encryption algorithm is faster 3 times
more than the 3DES algorithm for the same size of encrypted data.
In [14], the authors gave some assumptions about the most common security algorithms like
AES, XOR, and RC4. They compared the encryption algorithms by encrypting video streams in
real time and not text data only. They concluded; that the delay overhead of the AES encryption
3. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
33
algorithm is less than the overhead of the XOR algorithm and the RC4 algorithm when encrypting
real time video stream data. Thus, the AES is a better solution when transmitting real time video
data streams.
In [18] the authors made a performance study to get results about the usability of security
algorithms within the scripting languages of web based programming languages. They analysed
the performance of the encryption algorithms when using web browser data.
Another study done in [17] has been done to compare the consumption of energy of the different
available symmetric key encryption algorithms on handheld devices. It shows that only about
45% of the battery power is remaining when encrypting a file of about 5MB using the 3DES,that
means, the no further encryption is [possible after that size of data because the battery died at all.
In the study [21], the authors used the free c++ encryption library (Cryto++ library).They have
done an evaluation of the most know encryption algorithms. They showed that the Blowfish and
the AES algorithms have the best security performance results. They showed also that both have
better security level against attacks than the of DES and 3DES security algorithms.
3. THE SECURE WATERMARK SYSTEM (SWS)
The functionality overview of the proposed system (SWS) consists of two phases. The first phase
is called the encoding phase. The steps of encoding phases are as follows:
1. Read Dataset.
2. Divide Dataset into subset (64 blocks)
3. Convert Watermark image into decimal equivalent (array of 8 elements)
4. Embedded each of array element into each block
5. Encrypt the embedded dataset using private key
6. The data in this model is read serially from an input stream or file as a block of 64- bits as
a plain text. The 4 blocks numbered from b1 – b4, and then the blocks are divided into
constituent bytes where each block yields 2 bytes that represent the left and Right of the
block.
7. The bytes are swapped into constituent.
8. All Block's after swapping process are shifted in a symmetrical way.
9. The first block in the left side is X-oring with key1 .The key1 was received from key
generation process as shown figure 2.
10. Do step 4 for all other blocks in order but each block has different key.
11. Combined all blocks in order then send the 64-bits cipher text to receiver side
Key generation process as illustrated as shown below:
1. Read the plain text as a key (16-bits)
2. Split the key (16-bits) into two bytes as left and right.
3. Use the logical shift to the right for the first two bits in the left portion of the key.
4. Use the logical shift to the right for the first two bits in the right portion of the key.
5. Concatenate the new result after the logical shift from step 3 and 4.
6. Use the (16-bit key) round 1 for the key1 shown in Fig 3.
4. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
34
Repeat all steps before for all the keys (4- Rounds).
To clarify in further the watermark embedding in the first phase, the watermark embedding
procedure consists of the following operational steps as illustrated as shown below:
Step 1: Arrange the watermark image into b strings each of n bits length.
Step 2: Make a logical division of the dataset into sub-sets of blocks. A sub-set has m blocks.
Step 3: Embed the n-bit binary string in the corresponding m block of a sub-set as
follows:
• Find the decimal equivalent of the string. Let the decimal equivalent d.
• The decimal number d must be embedded into a pre selected block.
Step 4: Repeat step 3 for each block in the dataset.
4. EXPERIMENTAL RESULTS
For our experiment, we used a laptop IV 1.5 GHz CPU, in which performance data is collected.
As hardware for the different experiments a personal computer with a CPU speed of 1.5GHz was
used.
The following criteria that will be achieved are shown as follows:
The different selected algorithms were compared with each, to see the time and power
consumption of each when encrypting or decrypting data.
A research is performed on the effect of changing packet size on CPU time for each
selected cryptography algorithm.
In the experiments, the laptop encrypts a different the size ranges from 250 MB to 1GB for text
data only and compared with different platforms such as Windows XP, Windows 8 and Linux in
term of time and power consumption. Several performance metrics are collected as below:
4.1 Time Consumption
Figure 1, Figure 2 and Figure 3 show the four encryption algorithms namely the Blow Fish, The
AES-128, the DES and SWS algorithms. They are showing the time consumption of each
compared algorithm in seconds when varying the size of data samples. The data sizes are 250MB,
500MB, 750MB and 1000MB. Different operating systems where used when applying these
algorithms such as Windows 8, Windows XP and Linus OS.
5. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
35
Figure 1. Time consumption results of the comparison on OS Windows 8 for encryption of different sizes
of data Packet.
Figure 2. Time consumption results of the comparison on OS Windows XP for encryption of different
sizes of data Packet.
Figure3. Time consumption results of the comparison on OS Linux for encryption of different sizes of
data Packet.
4.2 The results of the power Consumption
Figure 4, Figure 5 and Figure 6 show the power consumption of each encryption algorithms when
varying the data size.
6. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
36
Figure 4. Power consumption for encrypt different data Packet size using windows XP
Figure 5. Power consumption for encrypt different data Packet size using windows 8
Figure 6. Power consumption for encrypt different data Packet size using Linux
7. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
37
5. CONCLUSION AND FUTURE WORK
This paper presents a performance comparison of selected common encryption algorithms. The
selected algorithms are AES, DES, Blowfish and Secure Watermark System (SWS).
Many conclusions can be done when analyzing the results of the experiments of this study. First;
when varying the size of data packets, it can be shown that the SWS and the Blowfish algorithms
have the best time consumption performance than the other compared algorithms.
Secondly; when varying the size of data, it can be shown that the DES algorithm have worst
power consumption performance than the other compared algorithms.
Also, we find that DES still has low performance compared to algorithms used.
Finally; when varying the type of operating system used, it shows that the SWS has better time
consumption under the Windows XP operating system than the other compared operating
systems.
And we found (blowfish) result in time consumption in windows 8 is better than other operating
system (Linux and Windows XP). And we found (AES) result in time consumption in LINUX is
better than other operating system (Windows XP and Windows 8) and we conclude that the same
result in the term of power consumption.
In our future work we will apply the same methodology on images and audio data, and we will
work on a new methodology to make a reduction on the energy/power consumption of the
security algorithms and to apply it on Wireless LANs to provide an energy efficient mechanism
for the 802.11 WLAN protocol. We will try to replace all the primitives of the security algorithms
with high energy consumptions with lower energy consumptions while keeping the security level
of each.
REFERENCES
[1] S. Masadeh W.Salameh(2007). "End to end keyless self-encrypting/decrypting streaming cipher",
Information Technology & National Security Conference 2007.
[2] A. Nadeem MYJ (2005)."A performance comparison of data encryption algorithms", First
International Conference on Information and Communication Technologies, pp 84- 89.
[3] Hardjono(2005),"Security in wireless lans and wans", Artech House Publishers.
[4] N. Ruangch ,aijatupon and P. Krishnamurthy(2001),"Encryption and power consumption in wireless
LANs-N",The Third IEEE Workshop on Wireless LANs, pp. 148-152.
[5] Schneier, Bruce (2012)."The Blowfish Encryption Algorithm". Blowfish,
<http://www.schneier.com/blowfish.html>.
[6] W. Stallings (2005),"Cryptography and Network Security", 4th Ed, pp. 58-309, Prentice Hall.
[7] Penchalaiah, N. and Seshadri, R. ffective (2010),"Comparison and Evaluation of DES and Rijndael
Algorithm (AES)", International Journal of Computer Science and Engineering, Vol. 02, No.05.
[8] J. Daemen and V. Rijmen (2002),"The Design of Rijndael", Springer-Verlag.
[9] N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M.Stay, D. Wagner, and D. Whiting(2000), Improved
crypt-analysis of Rijndael,Seventh Fast Software Encryption Workshop, pp. 19, Springer-Verlag .
[10] K. Naik and D. S. L. Wei (2001),"Software implementation strategies for power-conscious systems,
Mobile Networks and Applications", vol. 6, pp. 291-305.
[11] Singhal, Nidhi and Raina, J P S (2011)."Comparative Analysis of AES and RC4 Algorithms for
Better Utilization", International Journal of Computer Trends and Technology, ISSN: 2231-280, July
to Aug Issue 2011, pp. 177-181.
8. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
38
[12] Singh, S Preet and Maini, Raman (2011)."Comparison of Data Encryption Algorithms", International
Journal of Computer Science and Communication, vol. 2, No. 1, pp. 125-127.
[13] N. Ferguson, D. Whiting, B. Schneier, J. Kelsey, S. Lucks, T .Kohno (2003)."Helix fast encryption
and authentication in a single cryptographic primitive", Fast Software Encryption, volume 2887 of
LNCS. Springer-Verlag: 330-346.
[14] S. Hirani, Energy Consumption of Encryption Schemes in Wireless Devices Thesis(2008), University
of Pittsburgh.
[15] A. Nadeem and M. Y. Javed,A performance comparison of data encryption algorithms(2005),
Information and Communication Technologies, ICICT 2005, pp.84-89.
[16] Results of Comparing Tens of Encryption Algorithms Using Different Settings (2008), Crypto++
Benchmark. (http://www.eskimo.com/weidai/benchmarks.html)
[17] W.S.Elkilani, "H.m.Abdul-Kader (2009),"Performance of Encryption Techniques for Real Time
Video Streaming", IBIMA Conference, PP 1846-1850
[18] D. Salama, A. Elminaam and etal (2010),"Evaluating the Performance of Symmetric Encryption
Algorithms", International Journal of Network Security, Vol.10, No.3, PP.216–222.
[19] DES Overview, http://www.tropsoft.com/strongenc/des.htm [Explains how DES works in details,
features and weaknesses].
[20] [Bruce1996] BRUCE SCHNEIER, Applied Cryptography, John Wiley & Sons, Inc. 1996.
[21] Crypto++ benchmark http://www.eskimo.com/~weidai/benchmarks.html.
[22] [Blowfish.NET] Coder's Lagoon, http://www.hotpixel.net/software.html
[23] http://en.wikipedia.org/wiki/Triple_DES.
[24] http://searchsecurity.techtarget.com/tip/Expertadvice-Encryption-101-Triple-DES-explained.
[25] Aamer Nadeem et al (2005),"A Performance Comparison of Data Encryption Algorithms", IEEE.
Authors
Ashraf Odeh was born in 24th
February 1974 in Amman –Jordan he received a BSc degree
in Computer Science in 1995 at Princess Summay University in Amman-Jordan and MSc
degree in Information Technology in 2003 at Al-Nileen University in Sudan with a Thesis
titled " Visual Database administrator Techniques " After that, he received PhD from
department of Computer Information System in 2009 at Arab Academy in Amman-Jordan
with a Thesis titled " Robust Watermarking of Relational Database Systems ". He interested
in image processing, Watermarking, Relational Database, E-copyright protection, E-learning and Security
Issues, Encryption and Decryption Systems. Dr. Odeh Currently, working at Al-ISRA University in
Computer Information System Department as assistant Prof. and submitted a number of conference papers
and journals.
Shadi R. Masadeh was born in 21th
March 1977 in Amman –Jordan he received a BSc
degree in Computer Science and Computer Information System in 2000 at Philadelphia
University in Amman-Jordan and MSc degree in Information Technology in 2003 After that,
he received PhD from department of Computer Information System in 2009 at Arab Academy
in Amman-Jordan .He interests in many areas of research such as E-learning Management and Security
Issues, Encryption and Decryption Systems, Networking and Wireless security. Dr. Masadeh Currently,
working at Al-ISRA University in Computer Networks Department as assistant Prof. and submitted a
number of conference papers and journals.
Ahmad Azzazi is an assistant professor in the Faculty of Information Technology at the
Applied Science University. Dr. Azzazi’s research interests include Software security
engineering, software engineering frameworks, natural language processing, security expert
systems.