The document analyzes and compares the performance of symmetric key cryptographic algorithms based on various file features such as data type, size, density, and key size. It tests the encryption time of algorithms like AES, DES, Triple DES, RC2, Blowfish, Skipjack and RC4 on different data types, file sizes ranging from 10MB to 482MB, and files with different data densities. The results show that encryption time is not affected by data type but increases proportionally with file size and number of bytes. Encryption time is also similar for sparse and dense files of comparable sizes. RC4 has the fastest encryption time while AES time is low compared to other block ciphers.
Dynamic selection of symmetric key cryptographic algorithms for securing data...csandit
Most of the information is in the form of electronic data. A lot of electronic data exchanged
takes place through computer applications. Therefore information exchange through these
applications needs to be secure. Different cryptographic algorithms are usually used to address
these security concerns. However, along with security there are other factors that need to be
considered for practical implementation of different cryptographic algorithms like
implementation cost and performance. This paper provides comparative analysis of time taken
for encryption by seven symmetric key cryptographic algorithms (AES, DES, Triple DES, RC2,
Skipjack, Blowfish and RC4) with variation of parameters like different data types, data density,
data size and key sizes.
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
Cryptography means storing and transmitting data or information in a particular form that allow to be kept secret.
Symmetric key cryptography:- Both sender and receiver share the secret key.The symmetric key is kept private.both parties use the same key for encryption and decryption.
Asymmetric key cryptography:- Asymmetric key cryptography uses public or private key for encryption and decryption.Public key is kept by publically and private is kept secret.sender use the public key to send message and receiver use the private or secret key to decrypt the message.
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic algorithms function more efficiently when implemented in hardware than in software running on single processor. However, systems that use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an alternative, it is possible to implement cryptographic algorithms in software running on multiple processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES have some drawbacks when implemented in software: DES is no longer secure as computers get more powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is rapidly being adopted worldwide, provides a better combination of performance and enhanced network security than DES or 3DES by being computationally more efficient than these earlier standards. Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against brute-force attacks.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
Dynamic selection of symmetric key cryptographic algorithms for securing data...csandit
Most of the information is in the form of electronic data. A lot of electronic data exchanged
takes place through computer applications. Therefore information exchange through these
applications needs to be secure. Different cryptographic algorithms are usually used to address
these security concerns. However, along with security there are other factors that need to be
considered for practical implementation of different cryptographic algorithms like
implementation cost and performance. This paper provides comparative analysis of time taken
for encryption by seven symmetric key cryptographic algorithms (AES, DES, Triple DES, RC2,
Skipjack, Blowfish and RC4) with variation of parameters like different data types, data density,
data size and key sizes.
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
Cryptography means storing and transmitting data or information in a particular form that allow to be kept secret.
Symmetric key cryptography:- Both sender and receiver share the secret key.The symmetric key is kept private.both parties use the same key for encryption and decryption.
Asymmetric key cryptography:- Asymmetric key cryptography uses public or private key for encryption and decryption.Public key is kept by publically and private is kept secret.sender use the public key to send message and receiver use the private or secret key to decrypt the message.
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic algorithms function more efficiently when implemented in hardware than in software running on single processor. However, systems that use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an alternative, it is possible to implement cryptographic algorithms in software running on multiple processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES have some drawbacks when implemented in software: DES is no longer secure as computers get more powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is rapidly being adopted worldwide, provides a better combination of performance and enhanced network security than DES or 3DES by being computationally more efficient than these earlier standards. Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against brute-force attacks.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
In modern world, security is the most valuable term in the field of communication system. Security comes
along with many technologies and methods, where one of the most secure technologies is Cryptography
where ordinary plain text is converted into cipher text for transferring data to the valid user. Cryptography
algorithms can be divided into two types based on the number of keys such as Symmetric and Asymmetric
where Symmetric algorithm works with one single key and Asymmetric algorithm works with two different
keys. However, selecting the appropriate algorithms for specific application has been always a challenging
task because of the latency, key size, and security issues. Cryptographic algorithms face different type of
attacks like brute force attack, man in the middle attack, cycle attacks etc., which are still remained as
threads. This paper presents the performance analysis, based on different performance metrics and threads,
of various techniques of cryptographic algorithms and identifies the suitable algorithms for different types
of applications.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
This document provides an overview of lossless data compression techniques. It discusses Huffman coding, Shannon-Fano coding, and Run Length Encoding as common lossless compression algorithms. Huffman coding assigns variable length binary codes to symbols based on their frequency, with more common symbols getting shorter codes. Shannon-Fano coding similarly generates a binary tree to assign codes but aims for a roughly equal probability between left and right subtrees. Run Length Encoding replaces repeated sequences with the length of the run and the symbol. The document contrasts lossless techniques that preserve all data with lossy techniques used for media that can tolerate some loss of information.
The document proposes a new cryptographic algorithm to improve data security within networks. It begins with an introduction to information security and cryptography. It then describes the proposed algorithm which uses logical and shifting operations on 512-bit keys to encrypt data in blocks. The algorithm encrypts messages multiple times for enhanced security. Experimental results show the algorithm has better speed and encryption strength compared to other algorithms like AES and DJSA. It concludes the proposed algorithm is more efficient and secure for data transmission within networks and distributed systems.
This document describes a proposed technique for information security that uses a hybrid of DES and RSA encryption along with LSB steganography. The message is first encrypted with DES, then the DES keys are encrypted with RSA. The hybrid encrypted result is then embedded into an image file using LSB steganography. This combines the strengths of cryptography and steganography for improved security of transmitted data. The encryption time is faster than previous techniques and brute force attacks on this technique would be very difficult.
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
In today’s digital communication era sharing of information is increasing significantly. The information being transmitted is vulnerable to various passive and active attacks. Therefore, the information security is one of the most challenging aspects of communication. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form by using Encryption and Decryption Techniques. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. There are basically two techniques of cryptography Symmetric and Asymmetric. This paper presents a detailed study of the symmetric encryption techniques.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses cryptography and searchable encryption. It defines cryptography as the science of secret communication and encryption as the process of hiding information using ciphers and keys. It describes the different types of cryptosystems including symmetric, asymmetric, and searchable encryption. It also explains the basic concepts and algorithms involved in searchable encryption such as encryption, indexing, trapdoor generation, and searching on encrypted data without decryption. Several examples of searchable encryption schemes are provided.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
This document summarizes a study that evaluates the performance of four symmetric key cryptography algorithms: DES, 3DES, Blowfish, and AES. The study considers criteria like file size, file type, encryption and decryption time, and block size. It finds that Blowfish has the best performance, encrypting and decrypting data faster than the other algorithms. AES also performs well, while 3DES has the lowest performance due to its longer key length. The document reviews related literature comparing the performance of symmetric key cryptography algorithms and techniques that combine cryptography with steganography for enhanced security.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
Implementation of New Modified MD5-512 bit Algorithm for CryptographyAM Publications
In the past few years, there have been significant research advances in the analysis of hash functions and it
was shown that none of the hash algorithm is secure enough for critical purposes whether it is MD5 or SHA-
1.Nowadays scientists have found weaknesses in a number of hash functions, including MD5, SHA and RIPEMD so
the purpose of this paper is combination of some function to reinforce these functions and also increasing hash code
length up to 512 that makes stronger algorithm against collision attests.
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
This document describes DNA cryptography techniques. It begins with an acknowledgement section thanking those who helped with the project. It then provides a declaration confirming the work is original. The introduction discusses using DNA to encode messages for encryption and storage. It describes using one-time pads with DNA substitution or XOR operations. The document outlines building one-time pads on DNA chips for random encryption/decryption of messages and images. It concludes by discussing using DNA steganography to hide messages within other DNA strands.
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
This document summarizes a research paper that proposes a new encryption algorithm to improve performance parameters. The algorithm is divided into two phases. Phase 1 involves reversing, swapping, circularly shifting bits of the plaintext and XORing with the key. Phase 2 divides the output into blocks, then recombines the left bits of each block. The paper analyzes avalanche effect and execution time of the proposed algorithm compared to existing algorithms to evaluate its performance. The results show better performance than existing algorithms.
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
This document discusses and analyzes various cryptographic algorithms used for network security. It begins with definitions of key cryptographic terms like plain text, cipher text, encryption, decryption, and keys. It then describes different types of cryptographic schemes, including symmetric, asymmetric, and hash functions. Specific algorithms are analyzed like DES, AES, RSA, and Diffie-Hellman. Factors to consider when selecting a cryptographic algorithm like speed, memory requirements, security needs, and data type are also discussed. Overall the document provides a comprehensive overview and comparison of cryptographic algorithms and their applications for network security.
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...IDES Editor
Hyperelliptic Curve Cryptography (HECC) is a Public
Key Cryptographic technique which is required for secure
transmission. HECC is better than the existing public key
cryptography technique such as RSA, DSA, AES and ECC in
terms of smaller key size. DNA cryptography is a next
generation security mechanism, storing almost a million
gigabytes of data inside DNA strands. Existing DNA based
Elliptic Curve Cryptographic technique require larger key
size to encrypt and decrypt the message resulting in increased
processing time, more computational and memory overhead.
To overcome the above limitations, DNA strands are used to
encode the data to provide first level of security and HECC
encryption algorithm is used for providing second level of
security. Hence this proposed integration of DNA computing
based HECC provides higher level of security with less
computational and memory overhead.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Dynamic selection of symmetric key cryptographic algorithms for securing data...csandit
Most of the information is in the form of electroni
c data. A lot of electronic data exchanged
takes place through computer applications. Therefor
e information exchange through these
applications needs to be secure. Different cryptogr
aphic algorithms are usually used to address
these security concerns. However, along with securi
ty there are other factors that need to be
considered for practical implementation of differen
t cryptographic algorithms like
implementation cost and performance. This paper pro
vides comparative analysis of time taken
for encryption by seven symmetric key cryptographic
algorithms (AES, DES, Triple DES, RC2,
Skipjack, Blowfish and RC4) with variation of param
eters like different data types, data density,
data size and key sizes.
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are considering the important performance of these algorithms like CPU time consumption, memory usage and battery usage. This research tries to demonstrate a fair comparison between the most common algorithms and with a novel method called Secured Watermark System (SWS) in data encryption field according to CPU time, packet size and power consumption. It provides a comparison the most known algorithms used in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the compared encryption algorithms with different parameters.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
In modern world, security is the most valuable term in the field of communication system. Security comes
along with many technologies and methods, where one of the most secure technologies is Cryptography
where ordinary plain text is converted into cipher text for transferring data to the valid user. Cryptography
algorithms can be divided into two types based on the number of keys such as Symmetric and Asymmetric
where Symmetric algorithm works with one single key and Asymmetric algorithm works with two different
keys. However, selecting the appropriate algorithms for specific application has been always a challenging
task because of the latency, key size, and security issues. Cryptographic algorithms face different type of
attacks like brute force attack, man in the middle attack, cycle attacks etc., which are still remained as
threads. This paper presents the performance analysis, based on different performance metrics and threads,
of various techniques of cryptographic algorithms and identifies the suitable algorithms for different types
of applications.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
This document provides an overview of lossless data compression techniques. It discusses Huffman coding, Shannon-Fano coding, and Run Length Encoding as common lossless compression algorithms. Huffman coding assigns variable length binary codes to symbols based on their frequency, with more common symbols getting shorter codes. Shannon-Fano coding similarly generates a binary tree to assign codes but aims for a roughly equal probability between left and right subtrees. Run Length Encoding replaces repeated sequences with the length of the run and the symbol. The document contrasts lossless techniques that preserve all data with lossy techniques used for media that can tolerate some loss of information.
The document proposes a new cryptographic algorithm to improve data security within networks. It begins with an introduction to information security and cryptography. It then describes the proposed algorithm which uses logical and shifting operations on 512-bit keys to encrypt data in blocks. The algorithm encrypts messages multiple times for enhanced security. Experimental results show the algorithm has better speed and encryption strength compared to other algorithms like AES and DJSA. It concludes the proposed algorithm is more efficient and secure for data transmission within networks and distributed systems.
This document describes a proposed technique for information security that uses a hybrid of DES and RSA encryption along with LSB steganography. The message is first encrypted with DES, then the DES keys are encrypted with RSA. The hybrid encrypted result is then embedded into an image file using LSB steganography. This combines the strengths of cryptography and steganography for improved security of transmitted data. The encryption time is faster than previous techniques and brute force attacks on this technique would be very difficult.
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
In today’s digital communication era sharing of information is increasing significantly. The information being transmitted is vulnerable to various passive and active attacks. Therefore, the information security is one of the most challenging aspects of communication. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form by using Encryption and Decryption Techniques. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. There are basically two techniques of cryptography Symmetric and Asymmetric. This paper presents a detailed study of the symmetric encryption techniques.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses cryptography and searchable encryption. It defines cryptography as the science of secret communication and encryption as the process of hiding information using ciphers and keys. It describes the different types of cryptosystems including symmetric, asymmetric, and searchable encryption. It also explains the basic concepts and algorithms involved in searchable encryption such as encryption, indexing, trapdoor generation, and searching on encrypted data without decryption. Several examples of searchable encryption schemes are provided.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
This document summarizes a study that evaluates the performance of four symmetric key cryptography algorithms: DES, 3DES, Blowfish, and AES. The study considers criteria like file size, file type, encryption and decryption time, and block size. It finds that Blowfish has the best performance, encrypting and decrypting data faster than the other algorithms. AES also performs well, while 3DES has the lowest performance due to its longer key length. The document reviews related literature comparing the performance of symmetric key cryptography algorithms and techniques that combine cryptography with steganography for enhanced security.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
Implementation of New Modified MD5-512 bit Algorithm for CryptographyAM Publications
In the past few years, there have been significant research advances in the analysis of hash functions and it
was shown that none of the hash algorithm is secure enough for critical purposes whether it is MD5 or SHA-
1.Nowadays scientists have found weaknesses in a number of hash functions, including MD5, SHA and RIPEMD so
the purpose of this paper is combination of some function to reinforce these functions and also increasing hash code
length up to 512 that makes stronger algorithm against collision attests.
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
This document describes DNA cryptography techniques. It begins with an acknowledgement section thanking those who helped with the project. It then provides a declaration confirming the work is original. The introduction discusses using DNA to encode messages for encryption and storage. It describes using one-time pads with DNA substitution or XOR operations. The document outlines building one-time pads on DNA chips for random encryption/decryption of messages and images. It concludes by discussing using DNA steganography to hide messages within other DNA strands.
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
This document summarizes a research paper that proposes a new encryption algorithm to improve performance parameters. The algorithm is divided into two phases. Phase 1 involves reversing, swapping, circularly shifting bits of the plaintext and XORing with the key. Phase 2 divides the output into blocks, then recombines the left bits of each block. The paper analyzes avalanche effect and execution time of the proposed algorithm compared to existing algorithms to evaluate its performance. The results show better performance than existing algorithms.
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
This document discusses and analyzes various cryptographic algorithms used for network security. It begins with definitions of key cryptographic terms like plain text, cipher text, encryption, decryption, and keys. It then describes different types of cryptographic schemes, including symmetric, asymmetric, and hash functions. Specific algorithms are analyzed like DES, AES, RSA, and Diffie-Hellman. Factors to consider when selecting a cryptographic algorithm like speed, memory requirements, security needs, and data type are also discussed. Overall the document provides a comprehensive overview and comparison of cryptographic algorithms and their applications for network security.
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...IDES Editor
Hyperelliptic Curve Cryptography (HECC) is a Public
Key Cryptographic technique which is required for secure
transmission. HECC is better than the existing public key
cryptography technique such as RSA, DSA, AES and ECC in
terms of smaller key size. DNA cryptography is a next
generation security mechanism, storing almost a million
gigabytes of data inside DNA strands. Existing DNA based
Elliptic Curve Cryptographic technique require larger key
size to encrypt and decrypt the message resulting in increased
processing time, more computational and memory overhead.
To overcome the above limitations, DNA strands are used to
encode the data to provide first level of security and HECC
encryption algorithm is used for providing second level of
security. Hence this proposed integration of DNA computing
based HECC provides higher level of security with less
computational and memory overhead.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Dynamic selection of symmetric key cryptographic algorithms for securing data...csandit
Most of the information is in the form of electroni
c data. A lot of electronic data exchanged
takes place through computer applications. Therefor
e information exchange through these
applications needs to be secure. Different cryptogr
aphic algorithms are usually used to address
these security concerns. However, along with securi
ty there are other factors that need to be
considered for practical implementation of differen
t cryptographic algorithms like
implementation cost and performance. This paper pro
vides comparative analysis of time taken
for encryption by seven symmetric key cryptographic
algorithms (AES, DES, Triple DES, RC2,
Skipjack, Blowfish and RC4) with variation of param
eters like different data types, data density,
data size and key sizes.
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are considering the important performance of these algorithms like CPU time consumption, memory usage and battery usage. This research tries to demonstrate a fair comparison between the most common algorithms and with a novel method called Secured Watermark System (SWS) in data encryption field according to CPU time, packet size and power consumption. It provides a comparison the most known algorithms used in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the compared encryption algorithms with different parameters.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
Cryptography technology is a security technique used to change plain text to another shape of data or to symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey through public networks. Currently, there are many proposed algorithms that provide this service especially for sensitive data or very important conversations either through mobile or video conferences. In this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is compared to the AES. The algorithm has four different rounds for each quarter of the key container table, and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table are big.
With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.
The advent of Big Data has presented nee challenges in terms of Data Security. There is an increasing need of research
in technologies that can handle the vast volume of Data and make it secure efficiently. Current Technologies for securing data are
slow when applied to huge amounts of data. This paper discusses security aspect of Big Data.
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
Pipelining Architecture of AES Encryption and Key Generation with Search Base...VLSICS Design
A high speed security algorithm is always important for wired/wireless environment. The symmetric block cipher plays a major role in the bulk data encryption. One of the best existing symmetric security algorithms to provide data security is AES. AES has the advantage of being implemented in both hardware and software. Hardware implementation of the AES has the advantage of increased throughput and offers better security. Search based S-box architecture has been proposed in this paper to reduce the constraint in the hardware resources. The pipelined architecture of the AES algorithm is proposed in order to increase the throughput of the algorithm. Moreover the key schedule algorithm of the AES encryption is pipelined to get the speedup.
Pipelining Architecture of AES Encryption and Key Generation with Search Base...VLSICS Design
A high speed security algorithm is always important for wired/wireless environment. The symmetric block cipher plays a major role in the bulk data encryption. One of the best existing symmetric security algorithms to provide data security is AES. AES has the advantage of being implemented in both hardware and software. Hardware implementation of the AES has the advantage of increased throughput and offers better security. Search based S-box architecture has been proposed in this paper to reduce the constraint in the hardware resources. The pipelined architecture of the AES algorithm is proposed in order to increase the throughput of the algorithm. Moreover the key schedule algorithm of the AES encryption is pipelined to get the speedup.
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...IRJET Journal
This document summarizes a research paper that proposes a model for privacy and data ownership in cloud computing using symmetric key encryption. The model uses AES-256 encryption to encrypt user data uploaded to the cloud, providing security. AES-256 is shown to be faster than other encryption algorithms like AES-128, AES-192, and DES. The proposed model includes user registration, encrypted file uploading and downloading using AES-256, and a trusted third party for sharing files between authorized users while maintaining security. Experimental results show AES-256 provides faster encryption than other algorithms.
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
In this era the computer and software engineers have faced many attacks on cyber security that affect the confidentiality of the users.
These attacks broke almost all the security algorithms due to which the confidentiality, authentication, integrity, availability and identification of the user data is being affected.
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
This document proposes an encryption technique that uses binary coded decimal (BCD) and bit complementation. The technique encrypts the key first using a two's complement before encrypting the data with the encrypted key. This provides three levels of encryption. The algorithm uses basic binary operations and computation, making it faster than other algorithms. An experimental analysis showed it outperformed similar variants in terms of performance. The document provides background on symmetric key cryptography and reviews related work on other encryption algorithms.
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
In this age of universal electronic connectivity of viruses and hackers of electronic eavesdropping and electronic fraud, there is indeed needed to store the information securely. This, in turn, led to a heightened awareness to protect data and resources from disclosure, to guarantee the authenticity of data and messages and to protect systems from network-based attacks. Information security via encryption decryption techniques is a very popular research area for many people’s over the years. This paper elaborates the basic concept of the cryptography, specially public and private cryptography. It also contains a review of some popular encryption decryption algorithms. A modified method is also proposed. This method is fast in comparison to the existing methods.
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET Journal
1. The document discusses a hardware-software co-design of the AES encryption algorithm implemented on the NIOS II soft-core processor on an FPGA.
2. It proposes using a hardware-software co-design methodology to implement AES for encryption and decryption of 128-bit blocks using 128, 192, or 256-bit keys.
3. The implementation will utilize the Quartus II software tools and NIOS II integrated development environment to program the FPGA with the AES algorithm designed around the NIOS II soft-core processor.
This document provides an overview of file security systems and encryption techniques. It begins with an introduction to access control and the need to protect important files from unauthorized access. It then reviews 13 relevant research papers on topics like parallel AES encryption on GPUs, key management in secure network file systems, image encryption using color, and evaluations of existing file security systems. The document discusses techniques like separating key management from file security, hybrid encryption algorithms, and performance evaluations of encrypted file systems. Overall, it covers a range of cryptographic techniques and file security systems aimed at securely storing and sharing files.
The document compares and summarizes various encryption algorithms and techniques for improving secured data communication. It first discusses symmetric and asymmetric encryption techniques. It then analyzes popular encryption algorithms like AES, DES, Triple DES, RSA, Diffie-Hellman, and Blowfish. For each algorithm, it explains the methodology, provides a performance summary, and discusses key characteristics. It finds that AES and Triple DES provide better security than older standards like DES. The document also proposes a new encryption algorithm based on block cipher concepts like XOR and shifting operations.
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
This document summarizes and compares various encryption algorithms and techniques for improving secured data communication. It first discusses symmetric and asymmetric cryptography approaches. It then evaluates the performance of common symmetric algorithms like AES, DES, Triple DES, and Blowfish based on encryption speed tests. It provides a table summarizing the key features and security status of each algorithm. The document also introduces modern cryptography that combines symmetric and asymmetric techniques, and discusses some important encryption algorithms like DES, IDEA, and RSA.
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
The document discusses preparing data sets for analysis in data mining and privacy preserving techniques. It states that preparing data sets is a time-consuming task that requires complex SQL queries, joining tables, and aggregating columns. Significant manual effort is needed to build data sets in a horizontal layout. It also discusses the need for privacy-preserving algorithms to protect sensitive data during the data mining process. The document proposes using case, pivot and SPJ methods to horizontally aggregate data, then employing a homomorphic encryption scheme to preserve privacy during the aggregations. Homomorphic encryption allows computations on encrypted data to produce an encrypted result that matches the result of operations on plaintext.
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxDeepikaShivam
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many technique
Similar to Analysis and comparison of symmetric key (20)
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Analysis and comparison of symmetric key
1. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014
DOI : 10.5121/ijnsa.2014.6404 43
ANALYSIS AND COMPARISON OF SYMMETRIC KEY
CRYPTOGRAPHIC ALGORITHMS BASED ON VARIOUS
FILE FEATURES
Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona
Department of Computer Engineering and Information Technology,
College of Engineering Pune, India
ABSTRACT
For achieving faster communication most of confidential data is circulated through networks as electronic
data. Cryptographic ciphers have an important role for providing security to these confidential data
against unauthorized attacks. Though security is an important factor, there are various factors that can
affect the performance and selection of cryptographic algorithms during the practical implementation of
these cryptographic ciphers for various applications. This paper provides analysis and comparison of some
symmetric key cryptographic ciphers (RC4, AES, Blowfish, RC2, DES, Skipjack, and Triple DES) on the
basis of encryption time with the variation of various file features like different data types, data size, data
density and key sizes.
KEYWORDS
Cipher Algorithms, data type, data size, data density and encryption time
1. INTRODUCTION
Cryptography is a powerful tool used to protect the information in computer systems. When a
browser is used for home banking, numbers of cryptographic algorithms are being used to protect
data send to the bank. When someone login to computer, the password is protected by
cryptographic hash functions. An email it is often encrypted using SSL while sending it. [9]. In
cryptography original message is basically encoded in some non readable format. This process is
called encryption. The only person who knows how to decode the message can get the original
information. This process is called decryption. On the basis of key used, cipher algorithms are
classified as asymmetric key algorithms, in which encryption and decryption is done by two
different keys and symmetric key algorithms, where the same key is used for encryption and
decryption [8]. On the basis of the input data, cipher algorithms are classified as block ciphers, in
which the size of the block is of fixed size for encryption and stream ciphers in which a
continuous stream is passed for encryption and decryption [9].
A data file formats represents the standard for encoding the information to be stored in computer
file. There are file formats like textual, image, audio and video data file formats. Textual data
formats are ANSII, UNICODE (16 & 32 bit little and big Endian and UTF-8). ANSII is encoding
scheme for 128 characters basically made for English alphabets. It contains alphabets a-z and A-
Z, numbers 0-9 and some special characters. In Unicode standard unique numbers are provided
for every character independent of platform. Image file formats are JPEG, TIFF, BMP, GIF and
PNG [10]. JPEG is image file format for digital images that uses lossy compression method. TIFF
and BMP are image file format that are used to store images of raster graphics. GIF image is
similar to image format of bitmap images. GIF uses LZW (Lempel-Ziv-Welch) technique of
2. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014
44
compression and for each image it can support up to 8 bits/pixel. PNG is alternative to GIF image
file format and allows more compression than GIF. Audio file formats are WAV, AIFF, M4A,
MP3 and WMA. WAV and AIFF are usually uncompressed audio file format. M4A (audio) uses
Apple Lossless compression format but often it is compressed with Advance audio coding (lossy).
MP3 and WMA are lossy compression audio formats. Video file formats are AVI, M4V, MPEG
and WMV etc. AVI format contains the data (audio and video data) file container; which allows
audio-with-video playback synchronously. M4V and MP4 are very similar format, but M4v can
be protected by Digital Rights Management copy protection. MPEG contains compressed audio
and visual digital data. WMV is compressed video format developed by Microsoft.
Density of data represents the amount of different information present in the data file [10]. File is
said to be dense file if file size is less and content is more. For example if there are two file X and
Y both containing 2000 words and having sizes 50kb and 200kb respectively, then file X is
denser. The more the information, the dense is the data and lesser the information, sparse is the
data. Sparse file is a file that contains most of the empty spaces and attempts to use the computer
space more effectively.
Data size is space occupied by a file on a disk. Audio, video takes more space on disk than textual
files as they contain multimedia information. Key size in cryptography represents the size of key
file in bits. For example AES is having key sizes 128, 192 and 256 bits.
The main objective of this paper is to analyze time taken for encryption by various cryptographic
algorithms for parameters like data type, data size, data density and key size.
2. CRYPTOGRAPHIC ALGORITHMS
This section provides information about the various symmetric key cryptographic algorithms to
be analyzed for performance evaluation, to select the best algorithm with appropriate parameter
suitable to provide security for data.
Symmetric key cryptographic ciphers come in two varieties, stream and block ciphers. Stream
ciphers works on a stream of bits or bytes. Stream ciphers are used for securing data of terminal
and wireless applications. Block ciphers performs encryption or decryption on fixed size block of
data. The plaintext is not always in multiple of block size, therefore padding bits are needed to
compensate partially filled block. The padding scheme defines how the plaintext is filled with
data for last block. In network applications block ciphers are used for transmission of files of
huge sizes which require high security. Deciphering ciphertext without knowing the key is called
cryptanalysis. Cryptanalysis of block ciphers is difficult compared to stream ciphers [9]. Hence in
most of the applications, block ciphers are used for providing better security than stream ciphers.
Mathematically linked series of operations are used in Substitution-permutation network in
cryptography to construct the block of the Symmetric key cryptographic block cipher. In SP
network key and plain text are taken as an input and number of alternating rounds of S-Box
substitution and permutation are applied to get a single ciphertext block. The reverse process is
done for decryption of the blocks. Symmetric key cryptographic ciphers have different structures
that are used to construct the block of the different Symmetric key block ciphers. There are
symmetric key structures like Feistel network, Substitution-permutation network etc. In the case
of Fiestel network, the encryption and decryption process of the block are almost similar to each
other, except it requires the reversal of key schedule. Iteration is a characteristic feature of Fiestel
network cipher as an internal function knows as round function.
3. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014
45
There are different symmetric cryptographic algorithms in the literature [8] [9]. Out of them, the
algorithms listed in the Table 1 are selected for detailed study in case of data from health field.
Except RC4, all the selected algorithms are of block type, since most of the health related data are
to be provided with high security.
The various features of the cryptographic algorithm are listed in Table 1.
Table 1. Cryptographic Algorithms Information
Algorithm
Name
Structure
Key Size
(In bits)
Rounds
Cipher
Type
AES
Substitution-permutation
network
128,
192,
256
10,
12,
14
Block
DES Balanced Feistel network 56 16 Block
Triple DES Feistel network
112,
168
48 Block
RC2 Source-heavy Feistel network 40 to 1024 18 Block
Blowfish Feistel network 32 to 448 16 Block
Skipjack Unbalanced Feistel network 80 32 Block
RC4 ---- 40 to 2048 256 Stream
3. RELATED WORK
This section provides the information and results which are obtained from the numerous sources.
Cryptographic algorithms have been compared with each other for performance evaluation
on basis of throughput, CPU Memory utilization, energy consumption, attacks, Encryption
time, Decryption time etc.
In [3] the author compared AES and RC4 algorithm and the performance metrics were encryption
throughput, CPU work load, memory utilization, and key size variation and encryption and
decryption time. Results show that the RC4 is fast and energy saving for encryption and
decryption. RC4 proved to be better than AES for larger size data. In [2] author compared AES
and DES algorithms on image file, MATLAB software platform was used for implementation of
these two cipher algorithms. AES took less encryption and decryption time than DES. In [4] the
author compared cipher algorithms (AES, DES, Blowfish) for different cipher block modes
(ECB, CBC, CFB, OFB) on different file sizes varying from 3kb to 203kb. Blowfish algorithm
yield better performance for all block cipher modes that were tested and OFB block mode gives
better performance than other block modes. In [7] the author talks about comparison between
three algorithms (DES, Triple DES, Blowfish) on processing time. They found, that the key
generation time for all these three algorithms is almost same but there is a difference in time taken
by CPU for encryption. On SunOS platform Blowfish seem to be fastest, followed by DES and
Triple DES respectively. They analyzed CPU execution time for generating the secret key,
encryption and decryption time on 10MB file. In [6] the author compared cipher algorithms
(AES, DES, 3-DES and Blowfish) for varying file size and compared the encryption time on two
different machines Pentium-4, 2.4 GHz and Pentium-II 266 MHz in EBC and CFB Mode. The
author concluded that Blowfish is fastest followed by DES and Triple DES and CFB takes more
time than ECB cipher block mode.
4. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014
46
4. PROPOSED WORK
From the related works, it is realized that none of the work did a very detailed analysis of the
performance of various symmetric algorithms on various parameters on different type of files,
especially the files which are used for medical health related data.
The main objective of this paper is to analyze the time taken for encryption by various
cryptographic algorithms for parameters like data type, data size, data density and key size in
order to select the most suitable cryptographic algorithm for encryption.
5. EXPERIMENTAL SETUP AND TESTING
The execution results are taken on machine having Intel® Core™ i7-2600 (3.40 GHz) processor
with Intel® Q65 Express 4 GB 1333 MHz DDR3 (RAM) and Ubuntu 12.04 LTS operating
System. The java platform (openjdk1.6.0_14) is used for implementation. JCA (Java
Cryptography Architecture) and JCE (Java Cryptography Extension) are used for cipher
algorithm implementation. The JCA is a major platform that contains ”provider" architecture and
the set of APIs for encryption (symmetric ciphers, asymmetric ciphers, block ciphers, stream
ciphers), message digests (hash), digital signatures, certificates and certificate validation, key
generation and secure random number generation. Here we have used sun and Bouncy Castel
provider for implementing cryptographic algorithms.
Figure 1: Symmetric key cryptography flowchart
The flow chart in Figure 1 gives the brief idea about the execution of the program flow control.
There are various security providers available in java like sun, bouncy castle, cryptix etc. Initially
obtain one of these security providers. Read the input file for encryption or decryption. The
program checks that the key is present for algorithm or not. If the key is not present,
5. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014
47
KeyGenerator is used to generate the key for performing the cipher operation. KeyGenerator is a
class provided by java security API for generating the key of the symmetric ciphers. The
generated key is stored to the specified path. If the key is already present at the specified path,
that key is used. A timer is started before encrypting or decrypting a file. After encryption or
decryption is performed, the timer is stopped. The output file is then written to specified location.
And the results are written to result sheet. During any of the cipher operation the I/O time is not
taken. Due to this pure encryption time is obtained for evaluating the performance of a particular
cipher algorithm.
The brief analysis of different symmetric key cryptographic algorithm for various parameters is as
follows:
Case Study 1: Files with different Data types.
This case study has taken to check whether the encryption has dependency on type of data.
Different data type files like audio, image, textual and video of nearly 50MB in size are chosen
and encryption time of different cipher algorithms is calculated for these data types. For all
executions of a specific cipher algorithm, varying parameter is data type and constant parameters
are key size and block cipher mode. Key size and block mode are at kept at bare minimal
parameters. The key size of AES, DES, 3-DES, RC2, Blowfish, Skipjack, and RC4 are kept at
minimum values as 128, 56, 112, 40, 32, 80 and 40 bits respectively. Block cipher mode used is
ECB with PKCS#5 padding scheme. Figure 2 shows the execution time of the algorithms for
different data type files.
Figure 2. Encryption time Vs Cipher Algorithm for files of different data type
Observation: In Figure 2 it can be clearly seen that encryption time for all the data type is almost
same. The result shows that the encryption time does not vary according to the type of the data.
Encryption depends only on the number of bytes in the file and not on the type of file. Encryption
time of AES is quiet low compared to other block ciphers. RC4 with key size 40 is fastest among
the cipher algorithms tested.
6. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014
48
Case Study 2: Data files of same type with different sizes.
This case study is taken to ensure once again the observations obtained in case study 1. Case
study 1 revealed that encryption time depends on number of bytes in the file. To ensure this
another study is made in which different files (BMP and FLV) of same types but different sizes
are given for encryption and their encryption time is calculated. For all executions key size and
block mode are kept at bare minimal parameters. Table 2 gives the details about the files used for
all executions and Figure 3 and 4 show the execution results for BMP and FLV file formats of
different sizes respectively.
Table 2. Execution Parameters for files of different size.
File Type Varying Parameters (Data Size) Constant Parameters
BMP 10.7MB, 50MB, 100MB
Data Type, Key size
FLV 50MB, 100MB, 482MB
Figure 3. File size Vs Encryption time for BMP file of different sizes.
7. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014
49
Figure 4. File size Vs Encryption time for FLV file of different sizes.
Table 3. Encryption time for files of different sizes
File
Type
Size
(In
MB)
Encryption Time in Millisecond
AES DES
3-
DES
RC2 Blowfish Skipjack RC4
128 56 112 40 32 80 40
BMP
10.7 101 272 788 238 133 381 40
50 455 1253 3804 1095 614 1729 198
100 909 2595 7628 2189 1223 3505 372
FLV
50 456 1268 3810 1112 629 1731 196
100 918 2586 7631 2224 1267 3515 360
482 4518 12529 35654 11038 6087 16941 1972
Observation: For each encryption algorithm same parameters are used for files of different sizes.
Table 3 shows encryption time of different sizes of files of same type. From the results in Table 3
and Figure 3 and 4 we can find that the result for different size of data varies proportional to the
size of data file. Encryption time increases as file size increases in multiples of data size.
Case Study 3: File with different data densities.
This case study is taken to check whether the encryption depends on density of data or not.
Encryption rate is evaluated for the two different data density file; a sparse file of 69MB and a
dense file of 58.5MB. For a cipher algorithm, key size and block mode are kept at bare minimal
parameters. The results of execution are shown in Table 4.
8. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014
50
Table 4. Execution rate for sparse and dense data file
Algorithm
Name
Dense
(61392454 Bytes)
AIFF file
Sparse
(72000118 Bytes)
AIFF file
Encrypt
Time(ms)
Encryption
Rate(MB/s)
Encrypt
Time(ms)
Encryption
Rate(MB/s)
AES 128 539 108.62 632 108.64
DES 56 1535 38.14 1800 38.14
3-DES 112 4363 13.42 5074 13.53
RC2 128 1283 45.63 1518 45.23
Blowfish 128 725 80.75 852 80.59
Skipjack 128 2040 28.70 2384 28.80
RC4 128 216 271.05 251 271.56
Observation: Encryption rate for sparse and dense file has been calculated. The Table 4 shows
that the encryption time is not affected by density of data in a file. The variation in time with
respect to different algorithms follows the same pattern for both sparse and dense files. The
encryption rate for a particular cipher algorithm remains the same, even if the file is sparse or
dense. It depends on only the number of bytes in the file.
Case Study 4: Encryption Algorithms with different key sizes
This case study is to analyze the effect of changing the size of encryption key on encryption time.
BMP file of 50.5MB is taken and different cipher algorithms are executed for different size of
keys supported by them in ECB mode with PKCS#5 padding scheme. The various key sizes
mentioned in Table 1 are used during experimentation. Figure 5 shows the result of execution for
key size variation.
Figure 5. Variation of key sizes for different cipher Algorithms
Obsevation: The execution results show that for all ciphers algorithms, the encryption time varies
with the change in the size of the of the key. Encryption time increases with increase in key size
for block ciphers. The variation in time is very small. AES dominates in the block cipher. RC4 is
fastest among all algorithms tested.
9. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014
51
6. CONCLUSION
In this paper different symmetric key algorithm have been analyzed for various file features like
different data type, data density, data size and key size, and analyzed the variation of encryption
time for different selected cipher algorithms. From the simulated results it is concluded that
encryption time is does not dependent upon data type and date density of the file. The research
reveled that; encryption only depends upon the number of bytes present in the file. It also reveled
that encryption time and data size is proportional to each other. As the size of data increase the
encryption time also increase proportional to data size and vice versa. For all block cipher
algorithms that are analyzed, with increase in key size, encryption time also increases, but reduces
with increase in key size for stream cipher like RC4. AES is appears to be fastest block cipher
with encryption rate of 108MB/sec at bare minimal parameter, but RC4 stream cipher with
encryption rate of 270MB/sec comes out to be fastest among all analyzed cipher algorithms.
ACKNOWLEDGEMENT
We would like to thanks C-DAC, Pune for all providing funding to the project. We would
also like to thanks Dr. P.K. Sinha, Mrs Gaur Sunder, Mr. Prashant Bendale and Mrs.
Sayali Pophalkar for their support during the project.
REFERENCES
[1] AL.Jeeva1, Dr.V.Palanisamy and K.Kanagaram, “Comparative Analysis of Performance
Efficiency and Security Measures of Some Encryption Algorithms”, International Journal of
Engineering Research and Applications (IJERA), Vol. 2, Issue 3, May-Jun 2012, pp.3033-3037.
[2] S. Soni, H. Agrawal, M. Sharma, “Analysis and comparison between AES and DES Cryptographic
Algorithm”, International Journal of Engineering and Innovative Technology, Vol 2, Issue 6,
December 2012, pp.362-365.
[3] Nidhi Singhal and J.P.S.Raina, “Comparative Analysis of AES and RC4 Algorithms for Better
Utilization”, International Journal of Computer Trends and Technology, Vol 2, Issue 6, July-Aug
2011, pp.177-181.
[4] Jawahar Thakur and Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography
Algorithms Simulation Based Performance Analysis”, International Journal of Emerging
Technology and Advanced Engineering, Vol 1, Issue 2, December 2011, pp.6-12.
[5] Allam Mousa and Ahmad Hamad, “Evaluation of the RC4 Algorithm for Data Encryption”,
International Journal of Computer Science & Applications, Vol 3,Issue 2, June 2006, pp.44-56.
[6] Aamer Nadeem, Dr M. Younus Javed, “A Performance Comparison of Data Encryption
Algorithms”, First International Conference on IEEE Information and Communication
Technologies (ICICT), Vol 1, Issue 6, 27-28 Aug. 2005, pp 84-89.
[7] Kofahi, N.A, Turki Al-Somani, Khalid Al-Zamil, “Performance evaluation of three
Encryption/Decryption Algorithms”, IEEE 46th Midwest Symposium on Circuits and Systems,
Vol 2, Issue 1, 30-30 Dec. 2003, pp. 790-793.
[8] Jonathan Knudsen, Java Cryptography, 2nd Edition, O’Reilly, 2011.
[9] Behrouz A. Forouzan, Debdeep Mukhopadhyay, Cryptography and Network Security, 2nd
Edition, Tata McGraw Hill, 2012.
[10] John Miano, Compressed Image File Formats, 1st Edition, Addison Wesley Longman, Inc, 1999.
10. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014
52
Authors
Ranjeet Masram is M tech Student in Computer Engineering from College of
Engineering, Pune (India). He is appointed as JRF for Joint project on Medical data
Security between C-DAC, Pune and College of Engineering, Pune for a period of one
year
Vivek Shahare received his Bachelor Degree in Computer Science and Engineering fr
om Government College of Engineering, Amravati (India). He is appointed as JRF for
Joint project on Medical data Security between C-DAC, Pune and College of
Engineering, Pune for a period of one year.
Dr. Jibi Abraham is Professor at College of Engineering, Pune. She received her
Doctor of Philosophy (PhD) in Computer Engineering from Visvesvaraya
Technological University. She is the Principal Investigator from COEP for Joint
project on Medical data Security between C-DAC, Pune and College of Engineering
Mrs. Rajni Moona was project engineer at IIT Kanpur. She was Visiting faculty at
International Institute of Information Technology. She is the co-investigator for Joint
project on Medical data Security between C-DAC, Pune and College of Engineering