SlideShare a Scribd company logo
1 of 4
Download to read offline
Ankit Garg al. International Journal of Recent Research Aspects ISSN: 2349-7688, Special Issue: Engineering Research
Aspects Feb 2015, pp. 109-112
© 2014 IJRRA All Rights Reserved page - 109-
A Survey on Cryptographic Techniques
for Network Security
Ankit Garg1, Kamal Kumar Sharma2, Sharad Chauhan3
1Student, M. Tech, ESEAR, Ambala
2Professor, Dept. of ECE, E-Max group of Institutions, Ambala
3Assistant Professor, Dept. of CSE, E-Max group of Institutions, Ambala
Abstract— Cryptography plays a vital role in information security system against various types of attacks. This
security mechanism uses some algorithms to scramble data into unreadable text which can be only being decrypted by
party those possesses the associated key. The two important characteristics that identify and differentiate encryption
algorithms from another are their capability to secure the protected data against attacks and their speed and
effectiveness in securing the data. Cryptography is method that provides the security mechanism in timely driven
fashion. Main objective of this paper is to compare the most commonly used algorithms for data encryption. Main
concern in this paper is the performance analysis of different algorithms under different settings.
Keywords— cryptography, plain text, security, cipher text, encryption, decryption
I. INTRODUCTION
The security of network is a big issue for security
administrators because network is growing day by day.
Security on the Internet and on Local Area Networks is now
at the forefront of computer network related issues. Network
security consists of the provisions and policies adopted by a
network administrator to prevent and monitor unauthorized
access, modification, denial of a computer network, misuse
and network-accessible resources. Network security involves
authorization of access to data in network, which is controlled
by the network administrator. Each and every client who is
working on the internet wants security of information but
sometimes he or she do not know that someone else may be a
intruder is collecting the information. The information is an
asset that must be protected. Network security is the process
by which digital information assets are protected, the goal of
security is to protect confidentiality, to maintain integrity and
to assure availability. To secure the entire network system and
the information, one specific methodology is required which
can be capable of providing the complete security solutions.
II. CRYPTOGRAPHY
Cryptography is the study of Secret (crypto) Writing (graphy).
It is the art or science of encompassing the principle and
method of transforming an intelligible message into coded
form or unreadable form at the senders end and that coded
form then transforming the message back to its original form
at the receivers end. As we know the field of cryptography has
advanced, cryptography is the study of techniques of securing
the integrity and authenticity of transfer of information under
difficult circumstances. Cryptography encodes information in
such a way that nobody can read it, except the person who
holds the key i.e. receiver. More advanced crypto techniques
ensure that the information being transmitted has not been
modified during the transmission of information from sender
to receiver. The term cryptography and steganography are
different, in cryptography the hidden message is always
visible to all, and because information is in plain text form but
in steganography hidden message is invisible.
A. Various goals of cryptography
1) Confidentiality:
The information in computer is transmitted and has to be
accessed only by the authorized party and not by any other
unauthorized party.
2) Authentication:
The information received by any system has to check the
identity of the sender that whether the information is
arriving from an authorized party or a false identity.
3) Integrity:
Only the authorized party is allowed to modify the
information transmitted by the sender. No one in between
the sender and receiver are allowed to modify or change the
given message.
4) Non Repudiation:
Non repudiation is the assurance that both parties the sender
and the receiver of message should be able to deny the
transmission.
5) Access control:
Only the authorized persons are able to access the given
information, any unauthorized person cannot access the
given information.
B. Basic terms related to cryptography
1) Plain Text:
Plain text is the original message that the sender wishes to
transmit to others. For example, Alice is a person wants to
send “Hello how are you” message to the person Bob. Here
“Hello how are you” is a plain text message.
2) Cipher Text:
The message that cannot be understood by any unauthorized
person or a meaningless message is what we call as Cipher
text. For Example, “Ajd67@91ukl8*^5%” is a Cipher Text
produced for “Hello how are you”.
3) Encryption:
Encryption is the process of converting plain text into
cipher text in such a way that only authorized parties can
read our message. The encryption process requires two
things- an encryption algorithm and a key. An encryption
Ankit Garg al. International Journal of Recent Research Aspects ISSN: 2349-7688, Special Issue: Engineering Research
Aspects Feb 2015, pp. 109-112
© 2014 IJRRA All Rights Reserved page - 110-
algorithm is the technique that has been used for encryption
of plain text. The encryption takes place at the sender side.
Fig 1: Encryption process
4) Decryption:
A reverse process of encryption is called as Decryption. The
process of converting Cipher text into Plain text is called
decryption. The decryption process requires two things- a
decryption algorithm and a key. A decryption algorithm is
the technique that has been used for the decryption of cipher
text. Generally the encryption and decryption algorithm are
same and the decryption takes place at the receivers end.
Fig 2: Decryption process
5) Key:
A key is the numeric or alpha numeric text or may be a
special symbol. The key is used for the encryption process
takes place on the plain text and at the time of decryption
process takes place on the cipher text. For example, if the
Alice uses a key of 4 to encrypt the plain text “Hello” then
cipher text produced will be “Lipps”.
III. SYMMETRIC AND ASYMMETRIC ENCRYPTIONS
There are two types of techniques that are commonly used for
the encryption/decryption of the secured data i.e. Asymmetric
and Symmetric encryption technique.
A. Symmetric Encryption/Decryption Technique:
In case of Symmetric Encryption/decryption, same
cryptography key are used for encryption of plaintext and
decryption of cipher text. Symmetric key encryption is simpler
and faster but their main drawback is that both the users need
to transfer their keys in a secure way for the encryption and
decryption.
Fig 3: Symmetric key cryptography
In the figure 3, there is only one key used for both encryption
and decryption of secured data. So the main problem over this
system is users have to transfer their keys also in a very safe
manner. If the key is disclosed to any other person, then
system will be collapsed.
B. Asymmetric Encryption/Decryption Technique:
In case of Asymmetric encryption process, two keys are used
i.e. public and private key. It is also known as Public Key
Cryptography (PKC), because users tend to use two keys: the
public key and the private key. If sender wishes to encrypt the
message then it uses the receiver’s public key for encryption
and at the receivers end the receiver use its own private key to
decrypt the message.
In figure 2, there are two different keys are used for
encryption and decryption of data i.e. Public key and Private
Key.
IV. ALGORITHM COMPARISON
A. DES (Data Encryption Standard):
Data Encryption Standard is a block encryption algorithm. It
is a symmetric algorithm, so in this algorithm same key is
used for encryption and decryption both. This algorithm uses
a 64-bit key. From these 64 bits, 56 bits make independent
key, which determines the exact cryptography transformation
process, and 8 bits are used for error detection in DES.
Six different permutation operations are used both in key
expansion part and cipher part. The decryption of DES
algorithm is similar to encryption, only the round keys are
applied in reverse order during the decryption. Many attacks
and methods recorded the weaknesses of DES, which made it
an insecure. The DES is now considered to be insecure, due to
the 56-bit key size being too small.
B. 3-DES:
It uses a 64 bit block size with 192 bits of key size. The
encryption method is similar to the original DES but applied
three times to increase the encryption level and the average
safe time. 3DES is slower than the other block cipher
methods.
C. AES:
The Advanced Encryption Standard algorithm (AES) also
known as the Rijndael algorithm is a symmetric block cipher.
It was recognized that Data Encryption Standard (DES) was
not secure because of advancement in computer processing
power. It can encrypt data blocks of 128 bits using symmetric
keys of size 128 bit, 192 bit, or 256 bit. It has variable key
length of 128, 192, or 256 bits; the default is 256 bits. It
encrypts the data blocks of size 128 bits in 10, 12 and 14
rounds depending on the key size. The AES encryption is fast
and flexible. AES algorithm can be implemented on various
platforms especially in small devices. This algorithm has been
tested for many security applications.
D.Blowfish:
The Blowfish is a symmetric block cipher that can be
effectively used for encryption of secure data. It takes a key of
variable-length of size from 32 bits to 448 bits, for encryption
process. The Blowfish was designed by Bruce Schneier in
1993 as a fast and free alternative to existing encryption
Ankit Garg al. International Journal of Recent Research Aspects ISSN: 2349-7688, Special Issue: Engineering Research
Aspects Feb 2015, pp. 109-112
© 2014 IJRRA All Rights Reserved page - 111-
algorithms. Blowfish is license-free, so it is available free for
all uses. Blowfish algorithm is a Feistel Network, iterating a
simple encryption function 16 times. The block size used in
Blowfish is 64 bits, and the key can be of any length up to 448
bits.
The comparison of symmetric encryption algorithms is based
on key size, block size and rounds as shown in table 1:
Algorithm Key size Block size Rounds
DES 56 bits 64 bits 16
3DES 112 bits or 168
bits
64 bits 48
AES 128 bits, 192 bits,
256 bits
128 bits 10,12 or 14
Blowfish 32-448 bits 64 bits 16
Table (1): Comparison of DES, 3DES, AES and Blowfish
algorithms
V. LITERATURE SURVEY
E. Rohiem et. al. presents a novel method of using
customized (AES) variable parameters is introduced. This
method depends on a continuous parameters reconfiguration
and a customization of each internal block. The customization
depends on varying the four transformations (polynomial and
affine transformations for S-Box (SB), ShiftRows (SR)
transformation, and MixColumn (MC) transformation).
Internal AES blocks (SB, SR, and MC) are varied each round.
Further more, these blocks are randomly interconnected
during each session. The ciphered output was tested using
avalanche, strict avalanche, and other NIST tests. This method
overcomes (ECB) mode problems which appear when there is
high redundancy in the plain data and also increasing strength
against brute force attacks. The proposed AES is implemented
on Field programmable Gate Arrays (FPGAs)[1].
Sumedha Kaushik et. al. Network Security is the most vital
component in information security because it is responsible
for securing all information passed through networked
computers. Network Security refers to all hardware and
software functions, characteristics, features, operational
procedures, accountability, measures, access control, and
administrative and management policy required to provide an
acceptable level of protection for Hardware and Software ,
and information in a network. Only one particular element
underlies many of the security mechanisms in use:
Cryptographic techniques; hence our focus is on this area
Cryptography. Cryptography is an emerging technology,
which is important for network security. Research on
cryptography is still in its developing stages and a
considerable research effort is still required for secured
communication [2].
Sweta K. Parmar et. al. Security is the most challenging
aspects in the internet and network application. Internet and
networks applications are growing very fast, so the
importance and the value of the exchanged data over the
internet or other media types are increasing. Information
security has been very important issue in data communication.
Any loss or threat to information can prove to be great loss to
the organization. Encryption technique plays a main role in
information security system. This paper gives a comparison of
various encryption algorithms and then finds best available
one algorithm for the network security [3].
Ritu Pahal et. al. With the fast progression of digital data
exchange in electronic way, information security is becoming
much more important in data storage and transmission.
Cryptography has come up as a solution which plays a vital
role in information security system against various attacks.
This security mechanism uses some algorithms to scramble
data into unreadable text which can be only being decoded or
decrypted by party those possesses the associated key. Two
types of cryptographic techniques are being used: symmetric
and asymmetric. In this paper we have used symmetric
cryptographic technique AES (Advance encryption standard)
having 200 bit block as well as key size. And the same
conventional 128 bit conventional AES algorithm is
implemented for 200 bit using 5*5 Matrix. After the
implementation, the proposed work is compared with 128 bit,
192 bits & 256 bits AES techniques on two points. These
points are encryption and decryption time and throughput at
both encryption and decryption sides [4].
Siddharth Ghansela Network security is main issue of this
generation of computing because many types of attacks are
increasing day by day. Establishing a network is not a big
issue for network administrators but protecting the entire
network is a big issue. There are various methods and tools
are available today for destroying the existing network. In this
paper we mainly emphasize on the network security also we
present some major issues that can affect our network [5].
Amritpal Singh et. al. In today world importance of
exchange of data over internet and other media type is
eminent; the search for best data protection against security
attacks and a method to timely deliver the data without much
delay is the matter of discussion among security related
communities. Cryptography is one such method that provides
the security mechanism in timely driven fashion.
Cryptography is usually referred to as "the study of secret",
which is most attached to the definition of encryption. The
two main characteristics that identify and differentiate
encryption algorithm from another are their capability to
secure the protected data against attacks and their speed and
effectiveness in securing the data. This paper provides a
comparative study between four such widely used encryption
algorithms DES, of DES, 3DES, AES and RSA on the basis
of their ability to secure and protect data against attacks and
speed of encryption and decryption[6].
N.Lalitha et. al. In this paper we propose a data hiding
technique using AES algorithm.Steganography and
Cryptography are two popular ways of sending vital
information in a secret way.Cryptography was introduced for
making data secure. But alone cryptography cannot provide a
better security approach because the scrambled message is
still available to the eavesdropper. There arises a need of data
hiding. So here we are using a combination of steganography
and cryptography for improving the security. There are many
cryptography techniques available; among them AES is one of
the most useful techniques .In Cryptography, I have using
Ankit Garg al. International Journal of Recent Research Aspects ISSN: 2349-7688, Special Issue: Engineering Research
Aspects Feb 2015, pp. 109-112
© 2014 IJRRA All Rights Reserved page - 112-
AES algorithm to encrypt a message using 128 bit key the
message is hidden . In this proposed technique, we use
advance hill cipher and AES to enhance the security level
which can be measured by some measuring factors. The result
of this work shows that this advance hybrid scheme gives
better results than previous techniques [7].
VI. CONCLUSION
This paper mainly emphasize on the network security and
some major issues that can affect network. This paper
provides a comparative study of four widely used encryption
algorithms DES, 3DES, Blowfish and AES. DES is the most
vulnerable and can be easily broken by brute force attack.
AES is the better algorithm in terms of performance and
security.
REFERENCES
[1] A. E. Rohiem, F. M. Ahmed and A. M. Mustafa
’’FPGA Implementation of Reconfigurable
Parameters AES Algorithm”, 13th International
Conference on Aerospace Sciences & Aviation
Technology, ASAT- 13, May 26 – 28, 2009
[2] Sumedha Kaushik Ankur Singhal, ”Network
Security Using Cryptographic Techniques”,
International Journal of Advanced Research in
Computer Science and Software Engineering Volume
2, Issue 12, December 2012
[3] Sweta K. Parmar and Prof K.C. Dave, ”A Review on
Various Most Common Symmetric Encryptions
Algorithms”, IJSRD - International Journal for
Scientific Research & Development| Vol. 1, Issue 4,
2013
[4] Ritu Pahal and Vikas Kumar, ”Efficient
Implementation of AES” International Journal of
Advanced Research in Computer Science and
Software Engineering Volume 3, Issue 7, July 2013
[5] Siddharth Ghansela, “Network Security: Attacks,
Tools and Techniques” International Journal of
Advanced Research in Computer Science and
Software Engineering Volume 3, Issue 6, June 2013
[6] Amritpal Singh, Mohit Marwaha, Baljinder Singh,
Sandeep Singh, “Comparative Study of DES, 3DES,
AES and RSA”
[7] N.Lalitha, P.Manimegalai, V.P.Muthukumar,
M.Santha,” Efficient data diding by using AES &
advanced hill cipher algorithm” International
Journal of Research in Computer Applications and
Robotics Vol.2 Issue.1

More Related Content

Similar to A Survey on Cryptographic Techniques for Network Security.pdf

Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Techniqueijsrd.com
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic TechniquesStacy Taylor
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Techglyphs
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534IJRAT
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
 

Similar to A Survey on Cryptographic Techniques for Network Security.pdf (20)

Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Data encryption
Data encryptionData encryption
Data encryption
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
 
security issue
security issuesecurity issue
security issue
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 

More from Yasmine Anino

Short Essay On Swami Vivekananda
Short Essay On Swami VivekanandaShort Essay On Swami Vivekananda
Short Essay On Swami VivekanandaYasmine Anino
 
Evaluation Essay Samples
Evaluation Essay SamplesEvaluation Essay Samples
Evaluation Essay SamplesYasmine Anino
 
Science Topics For Essays
Science Topics For EssaysScience Topics For Essays
Science Topics For EssaysYasmine Anino
 
Essay Environmental Protection
Essay Environmental ProtectionEssay Environmental Protection
Essay Environmental ProtectionYasmine Anino
 
College Level Persuasive Essay Topics
College Level Persuasive Essay TopicsCollege Level Persuasive Essay Topics
College Level Persuasive Essay TopicsYasmine Anino
 
Free Printable Ice Cream Shaped Writing Templates
Free Printable Ice Cream Shaped Writing TemplatesFree Printable Ice Cream Shaped Writing Templates
Free Printable Ice Cream Shaped Writing TemplatesYasmine Anino
 
Outrageous How To Write A Concl
Outrageous How To Write A ConclOutrageous How To Write A Concl
Outrageous How To Write A ConclYasmine Anino
 
Free Printable Essay Writing Worksheets - Printable Wo
Free Printable Essay Writing Worksheets - Printable WoFree Printable Essay Writing Worksheets - Printable Wo
Free Printable Essay Writing Worksheets - Printable WoYasmine Anino
 
Structure Of An Academic Essay
Structure Of An Academic EssayStructure Of An Academic Essay
Structure Of An Academic EssayYasmine Anino
 
Critical Appraisal Example 2020-2022 - Fill And Sign
Critical Appraisal Example 2020-2022 - Fill And SignCritical Appraisal Example 2020-2022 - Fill And Sign
Critical Appraisal Example 2020-2022 - Fill And SignYasmine Anino
 
Uva 2023 Supplemental Essays 2023 Calendar
Uva 2023 Supplemental Essays 2023 CalendarUva 2023 Supplemental Essays 2023 Calendar
Uva 2023 Supplemental Essays 2023 CalendarYasmine Anino
 
Superhero Writing Worksheet By Jill Katherin
Superhero Writing Worksheet By Jill KatherinSuperhero Writing Worksheet By Jill Katherin
Superhero Writing Worksheet By Jill KatherinYasmine Anino
 
Printable Writing Paper Vintage Christmas Holly B
Printable Writing Paper Vintage Christmas Holly BPrintable Writing Paper Vintage Christmas Holly B
Printable Writing Paper Vintage Christmas Holly BYasmine Anino
 
Good Personal Reflective Essay
Good Personal Reflective EssayGood Personal Reflective Essay
Good Personal Reflective EssayYasmine Anino
 
Position Paper Mun Examples - Position Paper
Position Paper Mun Examples - Position PaperPosition Paper Mun Examples - Position Paper
Position Paper Mun Examples - Position PaperYasmine Anino
 
Hook C Lead C Attention Grabber Beginning An Ess
Hook C Lead C Attention Grabber Beginning An EssHook C Lead C Attention Grabber Beginning An Ess
Hook C Lead C Attention Grabber Beginning An EssYasmine Anino
 
Princess Themed Writing Paper Teaching Resources
Princess Themed Writing Paper Teaching ResourcesPrincess Themed Writing Paper Teaching Resources
Princess Themed Writing Paper Teaching ResourcesYasmine Anino
 
How To Write Essays Faster - CIPD Students Help
How To Write Essays Faster - CIPD Students HelpHow To Write Essays Faster - CIPD Students Help
How To Write Essays Faster - CIPD Students HelpYasmine Anino
 
Research Paper Step By Step Jfk Research Paper Outline Researc
Research Paper Step By Step  Jfk Research Paper Outline  ResearcResearch Paper Step By Step  Jfk Research Paper Outline  Researc
Research Paper Step By Step Jfk Research Paper Outline ResearcYasmine Anino
 

More from Yasmine Anino (20)

Essay On Shylock
Essay On ShylockEssay On Shylock
Essay On Shylock
 
Short Essay On Swami Vivekananda
Short Essay On Swami VivekanandaShort Essay On Swami Vivekananda
Short Essay On Swami Vivekananda
 
Evaluation Essay Samples
Evaluation Essay SamplesEvaluation Essay Samples
Evaluation Essay Samples
 
Science Topics For Essays
Science Topics For EssaysScience Topics For Essays
Science Topics For Essays
 
Essay Environmental Protection
Essay Environmental ProtectionEssay Environmental Protection
Essay Environmental Protection
 
College Level Persuasive Essay Topics
College Level Persuasive Essay TopicsCollege Level Persuasive Essay Topics
College Level Persuasive Essay Topics
 
Free Printable Ice Cream Shaped Writing Templates
Free Printable Ice Cream Shaped Writing TemplatesFree Printable Ice Cream Shaped Writing Templates
Free Printable Ice Cream Shaped Writing Templates
 
Outrageous How To Write A Concl
Outrageous How To Write A ConclOutrageous How To Write A Concl
Outrageous How To Write A Concl
 
Free Printable Essay Writing Worksheets - Printable Wo
Free Printable Essay Writing Worksheets - Printable WoFree Printable Essay Writing Worksheets - Printable Wo
Free Printable Essay Writing Worksheets - Printable Wo
 
Structure Of An Academic Essay
Structure Of An Academic EssayStructure Of An Academic Essay
Structure Of An Academic Essay
 
Critical Appraisal Example 2020-2022 - Fill And Sign
Critical Appraisal Example 2020-2022 - Fill And SignCritical Appraisal Example 2020-2022 - Fill And Sign
Critical Appraisal Example 2020-2022 - Fill And Sign
 
Uva 2023 Supplemental Essays 2023 Calendar
Uva 2023 Supplemental Essays 2023 CalendarUva 2023 Supplemental Essays 2023 Calendar
Uva 2023 Supplemental Essays 2023 Calendar
 
Superhero Writing Worksheet By Jill Katherin
Superhero Writing Worksheet By Jill KatherinSuperhero Writing Worksheet By Jill Katherin
Superhero Writing Worksheet By Jill Katherin
 
Printable Writing Paper Vintage Christmas Holly B
Printable Writing Paper Vintage Christmas Holly BPrintable Writing Paper Vintage Christmas Holly B
Printable Writing Paper Vintage Christmas Holly B
 
Good Personal Reflective Essay
Good Personal Reflective EssayGood Personal Reflective Essay
Good Personal Reflective Essay
 
Position Paper Mun Examples - Position Paper
Position Paper Mun Examples - Position PaperPosition Paper Mun Examples - Position Paper
Position Paper Mun Examples - Position Paper
 
Hook C Lead C Attention Grabber Beginning An Ess
Hook C Lead C Attention Grabber Beginning An EssHook C Lead C Attention Grabber Beginning An Ess
Hook C Lead C Attention Grabber Beginning An Ess
 
Princess Themed Writing Paper Teaching Resources
Princess Themed Writing Paper Teaching ResourcesPrincess Themed Writing Paper Teaching Resources
Princess Themed Writing Paper Teaching Resources
 
How To Write Essays Faster - CIPD Students Help
How To Write Essays Faster - CIPD Students HelpHow To Write Essays Faster - CIPD Students Help
How To Write Essays Faster - CIPD Students Help
 
Research Paper Step By Step Jfk Research Paper Outline Researc
Research Paper Step By Step  Jfk Research Paper Outline  ResearcResearch Paper Step By Step  Jfk Research Paper Outline  Researc
Research Paper Step By Step Jfk Research Paper Outline Researc
 

Recently uploaded

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 

A Survey on Cryptographic Techniques for Network Security.pdf

  • 1. Ankit Garg al. International Journal of Recent Research Aspects ISSN: 2349-7688, Special Issue: Engineering Research Aspects Feb 2015, pp. 109-112 © 2014 IJRRA All Rights Reserved page - 109- A Survey on Cryptographic Techniques for Network Security Ankit Garg1, Kamal Kumar Sharma2, Sharad Chauhan3 1Student, M. Tech, ESEAR, Ambala 2Professor, Dept. of ECE, E-Max group of Institutions, Ambala 3Assistant Professor, Dept. of CSE, E-Max group of Institutions, Ambala Abstract— Cryptography plays a vital role in information security system against various types of attacks. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decrypted by party those possesses the associated key. The two important characteristics that identify and differentiate encryption algorithms from another are their capability to secure the protected data against attacks and their speed and effectiveness in securing the data. Cryptography is method that provides the security mechanism in timely driven fashion. Main objective of this paper is to compare the most commonly used algorithms for data encryption. Main concern in this paper is the performance analysis of different algorithms under different settings. Keywords— cryptography, plain text, security, cipher text, encryption, decryption I. INTRODUCTION The security of network is a big issue for security administrators because network is growing day by day. Security on the Internet and on Local Area Networks is now at the forefront of computer network related issues. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, modification, denial of a computer network, misuse and network-accessible resources. Network security involves authorization of access to data in network, which is controlled by the network administrator. Each and every client who is working on the internet wants security of information but sometimes he or she do not know that someone else may be a intruder is collecting the information. The information is an asset that must be protected. Network security is the process by which digital information assets are protected, the goal of security is to protect confidentiality, to maintain integrity and to assure availability. To secure the entire network system and the information, one specific methodology is required which can be capable of providing the complete security solutions. II. CRYPTOGRAPHY Cryptography is the study of Secret (crypto) Writing (graphy). It is the art or science of encompassing the principle and method of transforming an intelligible message into coded form or unreadable form at the senders end and that coded form then transforming the message back to its original form at the receivers end. As we know the field of cryptography has advanced, cryptography is the study of techniques of securing the integrity and authenticity of transfer of information under difficult circumstances. Cryptography encodes information in such a way that nobody can read it, except the person who holds the key i.e. receiver. More advanced crypto techniques ensure that the information being transmitted has not been modified during the transmission of information from sender to receiver. The term cryptography and steganography are different, in cryptography the hidden message is always visible to all, and because information is in plain text form but in steganography hidden message is invisible. A. Various goals of cryptography 1) Confidentiality: The information in computer is transmitted and has to be accessed only by the authorized party and not by any other unauthorized party. 2) Authentication: The information received by any system has to check the identity of the sender that whether the information is arriving from an authorized party or a false identity. 3) Integrity: Only the authorized party is allowed to modify the information transmitted by the sender. No one in between the sender and receiver are allowed to modify or change the given message. 4) Non Repudiation: Non repudiation is the assurance that both parties the sender and the receiver of message should be able to deny the transmission. 5) Access control: Only the authorized persons are able to access the given information, any unauthorized person cannot access the given information. B. Basic terms related to cryptography 1) Plain Text: Plain text is the original message that the sender wishes to transmit to others. For example, Alice is a person wants to send “Hello how are you” message to the person Bob. Here “Hello how are you” is a plain text message. 2) Cipher Text: The message that cannot be understood by any unauthorized person or a meaningless message is what we call as Cipher text. For Example, “Ajd67@91ukl8*^5%” is a Cipher Text produced for “Hello how are you”. 3) Encryption: Encryption is the process of converting plain text into cipher text in such a way that only authorized parties can read our message. The encryption process requires two things- an encryption algorithm and a key. An encryption
  • 2. Ankit Garg al. International Journal of Recent Research Aspects ISSN: 2349-7688, Special Issue: Engineering Research Aspects Feb 2015, pp. 109-112 © 2014 IJRRA All Rights Reserved page - 110- algorithm is the technique that has been used for encryption of plain text. The encryption takes place at the sender side. Fig 1: Encryption process 4) Decryption: A reverse process of encryption is called as Decryption. The process of converting Cipher text into Plain text is called decryption. The decryption process requires two things- a decryption algorithm and a key. A decryption algorithm is the technique that has been used for the decryption of cipher text. Generally the encryption and decryption algorithm are same and the decryption takes place at the receivers end. Fig 2: Decryption process 5) Key: A key is the numeric or alpha numeric text or may be a special symbol. The key is used for the encryption process takes place on the plain text and at the time of decryption process takes place on the cipher text. For example, if the Alice uses a key of 4 to encrypt the plain text “Hello” then cipher text produced will be “Lipps”. III. SYMMETRIC AND ASYMMETRIC ENCRYPTIONS There are two types of techniques that are commonly used for the encryption/decryption of the secured data i.e. Asymmetric and Symmetric encryption technique. A. Symmetric Encryption/Decryption Technique: In case of Symmetric Encryption/decryption, same cryptography key are used for encryption of plaintext and decryption of cipher text. Symmetric key encryption is simpler and faster but their main drawback is that both the users need to transfer their keys in a secure way for the encryption and decryption. Fig 3: Symmetric key cryptography In the figure 3, there is only one key used for both encryption and decryption of secured data. So the main problem over this system is users have to transfer their keys also in a very safe manner. If the key is disclosed to any other person, then system will be collapsed. B. Asymmetric Encryption/Decryption Technique: In case of Asymmetric encryption process, two keys are used i.e. public and private key. It is also known as Public Key Cryptography (PKC), because users tend to use two keys: the public key and the private key. If sender wishes to encrypt the message then it uses the receiver’s public key for encryption and at the receivers end the receiver use its own private key to decrypt the message. In figure 2, there are two different keys are used for encryption and decryption of data i.e. Public key and Private Key. IV. ALGORITHM COMPARISON A. DES (Data Encryption Standard): Data Encryption Standard is a block encryption algorithm. It is a symmetric algorithm, so in this algorithm same key is used for encryption and decryption both. This algorithm uses a 64-bit key. From these 64 bits, 56 bits make independent key, which determines the exact cryptography transformation process, and 8 bits are used for error detection in DES. Six different permutation operations are used both in key expansion part and cipher part. The decryption of DES algorithm is similar to encryption, only the round keys are applied in reverse order during the decryption. Many attacks and methods recorded the weaknesses of DES, which made it an insecure. The DES is now considered to be insecure, due to the 56-bit key size being too small. B. 3-DES: It uses a 64 bit block size with 192 bits of key size. The encryption method is similar to the original DES but applied three times to increase the encryption level and the average safe time. 3DES is slower than the other block cipher methods. C. AES: The Advanced Encryption Standard algorithm (AES) also known as the Rijndael algorithm is a symmetric block cipher. It was recognized that Data Encryption Standard (DES) was not secure because of advancement in computer processing power. It can encrypt data blocks of 128 bits using symmetric keys of size 128 bit, 192 bit, or 256 bit. It has variable key length of 128, 192, or 256 bits; the default is 256 bits. It encrypts the data blocks of size 128 bits in 10, 12 and 14 rounds depending on the key size. The AES encryption is fast and flexible. AES algorithm can be implemented on various platforms especially in small devices. This algorithm has been tested for many security applications. D.Blowfish: The Blowfish is a symmetric block cipher that can be effectively used for encryption of secure data. It takes a key of variable-length of size from 32 bits to 448 bits, for encryption process. The Blowfish was designed by Bruce Schneier in 1993 as a fast and free alternative to existing encryption
  • 3. Ankit Garg al. International Journal of Recent Research Aspects ISSN: 2349-7688, Special Issue: Engineering Research Aspects Feb 2015, pp. 109-112 © 2014 IJRRA All Rights Reserved page - 111- algorithms. Blowfish is license-free, so it is available free for all uses. Blowfish algorithm is a Feistel Network, iterating a simple encryption function 16 times. The block size used in Blowfish is 64 bits, and the key can be of any length up to 448 bits. The comparison of symmetric encryption algorithms is based on key size, block size and rounds as shown in table 1: Algorithm Key size Block size Rounds DES 56 bits 64 bits 16 3DES 112 bits or 168 bits 64 bits 48 AES 128 bits, 192 bits, 256 bits 128 bits 10,12 or 14 Blowfish 32-448 bits 64 bits 16 Table (1): Comparison of DES, 3DES, AES and Blowfish algorithms V. LITERATURE SURVEY E. Rohiem et. al. presents a novel method of using customized (AES) variable parameters is introduced. This method depends on a continuous parameters reconfiguration and a customization of each internal block. The customization depends on varying the four transformations (polynomial and affine transformations for S-Box (SB), ShiftRows (SR) transformation, and MixColumn (MC) transformation). Internal AES blocks (SB, SR, and MC) are varied each round. Further more, these blocks are randomly interconnected during each session. The ciphered output was tested using avalanche, strict avalanche, and other NIST tests. This method overcomes (ECB) mode problems which appear when there is high redundancy in the plain data and also increasing strength against brute force attacks. The proposed AES is implemented on Field programmable Gate Arrays (FPGAs)[1]. Sumedha Kaushik et. al. Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software , and information in a network. Only one particular element underlies many of the security mechanisms in use: Cryptographic techniques; hence our focus is on this area Cryptography. Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication [2]. Sweta K. Parmar et. al. Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security [3]. Ritu Pahal et. al. With the fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against various attacks. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. Two types of cryptographic techniques are being used: symmetric and asymmetric. In this paper we have used symmetric cryptographic technique AES (Advance encryption standard) having 200 bit block as well as key size. And the same conventional 128 bit conventional AES algorithm is implemented for 200 bit using 5*5 Matrix. After the implementation, the proposed work is compared with 128 bit, 192 bits & 256 bits AES techniques on two points. These points are encryption and decryption time and throughput at both encryption and decryption sides [4]. Siddharth Ghansela Network security is main issue of this generation of computing because many types of attacks are increasing day by day. Establishing a network is not a big issue for network administrators but protecting the entire network is a big issue. There are various methods and tools are available today for destroying the existing network. In this paper we mainly emphasize on the network security also we present some major issues that can affect our network [5]. Amritpal Singh et. al. In today world importance of exchange of data over internet and other media type is eminent; the search for best data protection against security attacks and a method to timely deliver the data without much delay is the matter of discussion among security related communities. Cryptography is one such method that provides the security mechanism in timely driven fashion. Cryptography is usually referred to as "the study of secret", which is most attached to the definition of encryption. The two main characteristics that identify and differentiate encryption algorithm from another are their capability to secure the protected data against attacks and their speed and effectiveness in securing the data. This paper provides a comparative study between four such widely used encryption algorithms DES, of DES, 3DES, AES and RSA on the basis of their ability to secure and protect data against attacks and speed of encryption and decryption[6]. N.Lalitha et. al. In this paper we propose a data hiding technique using AES algorithm.Steganography and Cryptography are two popular ways of sending vital information in a secret way.Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to the eavesdropper. There arises a need of data hiding. So here we are using a combination of steganography and cryptography for improving the security. There are many cryptography techniques available; among them AES is one of the most useful techniques .In Cryptography, I have using
  • 4. Ankit Garg al. International Journal of Recent Research Aspects ISSN: 2349-7688, Special Issue: Engineering Research Aspects Feb 2015, pp. 109-112 © 2014 IJRRA All Rights Reserved page - 112- AES algorithm to encrypt a message using 128 bit key the message is hidden . In this proposed technique, we use advance hill cipher and AES to enhance the security level which can be measured by some measuring factors. The result of this work shows that this advance hybrid scheme gives better results than previous techniques [7]. VI. CONCLUSION This paper mainly emphasize on the network security and some major issues that can affect network. This paper provides a comparative study of four widely used encryption algorithms DES, 3DES, Blowfish and AES. DES is the most vulnerable and can be easily broken by brute force attack. AES is the better algorithm in terms of performance and security. REFERENCES [1] A. E. Rohiem, F. M. Ahmed and A. M. Mustafa ’’FPGA Implementation of Reconfigurable Parameters AES Algorithm”, 13th International Conference on Aerospace Sciences & Aviation Technology, ASAT- 13, May 26 – 28, 2009 [2] Sumedha Kaushik Ankur Singhal, ”Network Security Using Cryptographic Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 12, December 2012 [3] Sweta K. Parmar and Prof K.C. Dave, ”A Review on Various Most Common Symmetric Encryptions Algorithms”, IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 4, 2013 [4] Ritu Pahal and Vikas Kumar, ”Efficient Implementation of AES” International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 7, July 2013 [5] Siddharth Ghansela, “Network Security: Attacks, Tools and Techniques” International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 6, June 2013 [6] Amritpal Singh, Mohit Marwaha, Baljinder Singh, Sandeep Singh, “Comparative Study of DES, 3DES, AES and RSA” [7] N.Lalitha, P.Manimegalai, V.P.Muthukumar, M.Santha,” Efficient data diding by using AES & advanced hill cipher algorithm” International Journal of Research in Computer Applications and Robotics Vol.2 Issue.1