SlideShare a Scribd company logo
IFRSA’s International Journal Of Computing|Vol2|issue 2|April 2012 397
Analysis of a Hybrid Cipher Algorithm for Data Encryption
T.D.B Weerasinghe
BSc.Eng(Hons), MIEEE, AMIE(SL), MSc.Eng candidate, Department of Electrical and Electronic
Engineering, University of Peradeniya, Peradeniya 20400, Sri Lanka
ABSTRACT
Block and stream ciphers can be joined in order to obtain hybrid algorithms and the main idea of combining can be
enhancing the security of the cipher. This paper is presented to illustrate a hybrid algorithm created by combining a
block cipher algorithm, TripleDES (ECB mode) and a stream cipher algorithm, RC4.
In the encryption mode, first the plain text is encrypted by TripleDES; then the particular cipher text is encrypted by
RC4. In the decryption mode, first the cipher text is decrypted by RC4 and then by TripleDES to decrypt again and
obtain the original text. Input (plain text) is given as a text file.
Performance (encryption time) and secrecy (according to the theories of Shannon) of cipher are analysed over the
input data size.
Key words:TripleDES, RC4, Encryption time, Secrecy of ciphers.
1. INTRODUCTION
There are many ways to combine cryptographic algorithms to get new algorithms. The impetus behind these
combinations is increasing security[1]. In this research, the focus was, combining a block cipher with a stream
cipher to obtain a hybrid cipher and then analyze the performance of the encryption procedure and secrecy level of
the cipher. Motivation for this research is the feeling that the eavesdroppers who aim block ciphers and stream
ciphers alone might find it difficult to break the combined cipher. Block ciphers are strong in security but poor in
performance whereas stream ciphers are poor in security and strong in performance. Thus, the feeling of combining
these two lead me to obtain something in between.
So, TripleDES (168 bit key) and RC4 (128 bit key) are combined together in-order to obtain the hybrid cipher.
Performance of the proposed hybrid algorithm is compared with that of TripleDES and RC4. Performance is
measured as the encryption time of each algorithm for a given input. Input has been varied from 5KB to 100KB
(input is a text file, read by the relevant Java program)
Secrecy of the cipher of the proposed hybrid algorithm is also compared with that of TripleDES and RC4. Secrecy is
measured according to the Shannon’s theorems on Entropy and Secrecy of Ciphers. There also the input has been
varied from 5KB to 100KB, same as in the previous analysis.
2. METHODS
STEP 1:
In this research TripleDES (in ECB mode with PKCS5Padding which are used as the default mode and padding
schemes for TripleDES provided by SunJCE) and RC4 are combined to encrypt and decrypt a message.
After the final permutation of the TripleDES’s third round (i.e. the 16th
round of the third encryption cycle of
TripleDES) the cipher is converted to a bit stream and encrypted using RC4. Then it is decrypted using the same
algorithm used in RC4 encryption and the particular resultant cipher bit stream is converted to block of bits and those
are decrypted using the TripleDES decrypting operation.
Three Java programs are written to implement the algorithms TripleDES, RC4 and the Hybrid. Java’s cryptography
package is used to implement the algorithms. Hence the default key sizes provided by SunJCE are used. [4]
International journal of Computing
Journal homepage: www.ifrsa.org
T.D.B Weerasinghe| Analysis of a Hybrid Cipher Algorithm for Data Encryption
IFRSA’s International Journal Of Computing|Vol2|issue 2|April 2012 398
Fig.1 Combination of TripleDES and RC4[3]
Fig.2 Java Cryptography Package[2]
STEP 2:
Performance of the each algorithm should be measured in order to get an idea of the cost friendliness of the
algorithm. Data ranging from size 5KB to 100KB (text files) are given to each algorithm (TripleDES, RC4 and
Hybrid respectively) to encrypt and the encryption time is measured using Java’s time calculation scenarios. Analysis
is done by comparing the encryption time of all the three algorithms.
A separate Java program is written in-order to calculate the execution times of the ciphers generated by each of the
algorithms. (TripleDES, RC4 and the Hybrid)
STEP 3:
Ciphers of the Algorithms should be analyzed in order to measure the security strength of it. As the measurement
criteria, in this research, the Secrecy of Ciphers is used.
Leading to the calculation of the secrecy value of a cipher, the following theories have been followed!
Definition of ‘entropy’:
The entropy of a message M, denoted H(M), is the amount of information in the message. It corresponds to the
minimum number of bits needed to encode all possible meanings of the message, assuming all messages are equally
likely. [5]
 The entropy of a given message X is defined by the weighted average:
 H(X) = - Σ{1≤i≤n} p(Xi)log2 p(Xi)
Definition of ‘uncertainty’:
The uncertainty of a message corresponds to the number of plaintext bits that must be recovered when the message
is scrambled in ciphertext in order to learn the plaintext. The uncertainty of a message is measured by its entropy. [5]
Definition of ‘equivocation’:
The equivocation is the uncertainty of a message that can be reduced by given additional information. [5]
 The equivocation is the conditional entropy of X given Y:
 HY(X) = - Σ{X,Y} p(X,Y)log2 pY(X)
T.D.B Weerasinghe| Analysis of a Hybrid Cipher Algorithm for Data Encryption
IFRSA’s International Journal Of Computing|Vol2|issue 2|April 2012 399
= -Σ{Y} p(Y)Σ{X} pY(X)log2 (p Y(X))
Definition of secrecy:
The secrecy of a cipher is measured in terms of the key equivocation Hc(K) of a key K for a given ciphertext C; that
is the amount of uncertainty in K given C: [5]
 Hc(K) = -Σ{C} p(C)Σ{K} pc(K)log2 (pc(K))
Note: This is used in the secrecy calculation in this research and the above equations are illustrated from theories
of Shannon related to entropy and secrecy. Claude Elwood Shannon [April 30, 1916 – February 24, 2001] is
called the Father of Information Theory.
Secrecy values are calculated for each cipher of the three algorithms (TripleDES, RC4 and the Hybrid) for input data
ranging from size 5KB to 100KB.
Average encryption times and secrecy of ciphers are calculated after 5 rounds of testing for each input (each text file)
3. RESULTS
INPUT DATA
SIZE/KB
AVERAGE ENCRYPTION TIME/ms
TripleDES(3DES) RC4 Hybrid Algorithm
5 22 9.4 25.2
10 24.8 9.4 31
15 28.4 1.6 31.2
20 28.2 3.2 31.8
25 31 9.4 28
30 29.8 9.2 27.8
35 30 10.8 31.8
40 33.2 12.8 32
45 34 11.4 36
50 33.4 11.2 34
55 35.4 11 37
60 35 11.2 36.4
65 37 11 39.5
70 39.3 11.5 39
75 40.5 11 40.5
80 39.5 9.4 37.2
85 37.4 12.6 43.4
90 47 15 43.6
95 47 6.4 39
100 46.4 6.4 47
Table.1 Average Encryption Times of the Algorithms for similar inputs
T.D.B Weerasinghe| Analysis of a Hybrid Cipher Algorithm for Data Encryption
IFRSA’s International Journal Of Computing|Vol2|issue 2|April 2012 400
Fig.3 Average Encryption Time vs. Data Size
INPUT DATA SIZE/KB
AVERAGE SECRECY VALUE
TripleDES RC4 Hybrid Algorithm
5 0.128433408 0.17480747 0.215101274
10 0.308858194 0.16832912 0.229507753
15 0.200804304 0.1585643 0.223708079
20 0.363490184 0.16556034 0.220657567
25 0.26001987 0.17118074 0.231303128
30 0.237138551 0.17770687 0.22593549
35 0.201835278 0.18044321 0.237518095
40
0.327427522 0.17294332 0.237910337
45 0.239508702 0.17469719 0.239328159
50 0.174385837 0.15607884 0.235069715
55 0.354634619 0.17911076 0.225973132
60 0.324950271 0.16998157 0.23258963
65 0.407747905 0.18945935 0.234729998
70 0.139060063 0.15935405 0.237956204
75 0.128660882 0.15917461 0.233547191
80 0.154629452 0.18243486 0.242777805
85 0.146645331 0.16382689 0.240819397
90 0.159713292 0.18480739 0.242417182
95 0.140878024 0.19212304 0.232567338
100 0.162850973 0.18449194 0.229123519
Table.2 Average Secrecy Values of TripleDES, RC4 and Hybrid algorithms for similar inputs
Fig.4 Secrecy Value vs. Data Size
4. CONCLUSION
Conclusion with respect to the performance of the algorithms:
Proposed hybrid algorithm is more expensive than RC4 but goes parallel with TripleDES. Thus, the results
emphasize, generally the cost of the algorithm is higher than that of RC4 which is a very cost effective stream cipher
algorithm but it is quite similar to TripleDES in terms of the cost. When the size of the plain text is increased, the
performance lies at the low end. (Refer Fig.3)
Conclusion with respect to the secrecy of ciphers of the algorithms:
Secrecy of the ciphers is measured using the Shannon’s theories; so the results emphasize that the proposed hybrid
algorithm has a secrecy variation very much as a sinusoidal variation with small amplitude, whereas TripleDES
T.D.B Weerasinghe| Analysis of a Hybrid Cipher Algorithm for Data Encryption
IFRSA’s International Journal Of Computing|Vol2|issue 2|April 2012 401
(ECB mode) has drastic changes of the secrecy (even though it is higher than that of the hybrid) and RC4 has very
low level of secrecy, close to zero, as the size of the plain text is increased. Thus the secrecy of the hybrid cipher is
more stable than that of TripleDES and RC4. (Refer Fig.4)
Conclusion in general:
Average secrecy of the hybrid cipher is not drastically changing over the input data size. It is moderately distributed
without any drastic changes like that of TripleDES. Hence, it can be considered like an algorithm which has a stable
secrecy regardless of input data size. TripleDES has an unpredictable secrecy which deviates quite frequently. It may
arouse vulnerabilities to attacks. Average secrecy values of ciphers of RC4 are lying on the lower level as it is a
stream cipher. This mixture will confuse the eavesdroppers who aim TripleDES alone and RC4 alone.
But when the cost of the algorithms is concerned the hybrid is more expensive than the other two. At the beginning
of the research the imagination was the average secrecy value of the hybrid cipher would be far better than that of
TripleDES and RC4; but at the end a quite interesting result was obtained to show that it lies in between but more
stable than TripleDES as well as not lower than RC4. Thus idea of combining two types of symmetric key algorithms
has left a doubt behind in a way that can be solved by a future work of checking the vulnerability of these three
algorithms to a common plain text attack or even a brute-force one!
As another future work, key size of the two algorithms can be changed and analyzed. Over the variable key length,
the average encryption time and average secrecy value can be plotted and studied!
REFERENCES
[1] Mailewa, D.M.A.B., Weerasinghe T.D.B., Perera S.P.J., Munasinghe C.A., 2008: Types and Modes
Combined Algorithm for Data Encryption and Decryption, proceedings, 13th
Peradeniya University Research
Sessions, Peradeniya, Sri Lanka, 181-182
[2] Sachin Majithia, Kumar Dinesh, 2010: ‘Implementation and Analysis of AES, DES and Triple DES on GSM
Network’, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.1, 298-303
[3] Stallings, William, 2005: Cryptography and Network Security, Forth Edition: Principles and Practices,
Prentice Hall, 592
[4] http://docs.oracle.com/javase/6/docs/technotes/guides/security/SunProviders.html
[5] www.ece.uvic.ca/~itraore/elec567-04/notes/elec6704-6-2.pdf

More Related Content

What's hot

FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
IDES Editor
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
Mohammed Abdul Lateef
 
7. manuscript edit sat
7. manuscript edit sat7. manuscript edit sat
7. manuscript edit sat
IAESIJEECS
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
James McGivern
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
IJCERT
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...
ijsptm
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
Hardik Manocha
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Tharindu Weerasinghe
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
caijjournal
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
Shivam Singh
 
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud ComputingIRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET Journal
 
Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field
AJAL A J
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
Unit 3(1)Unit 3(1)
Color Cryptography using Substitution Method
Color Cryptography using Substitution MethodColor Cryptography using Substitution Method
Color Cryptography using Substitution Method
ijtsrd
 

What's hot (20)

FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
 
7. manuscript edit sat
7. manuscript edit sat7. manuscript edit sat
7. manuscript edit sat
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
 
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud ComputingIRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
 
Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Color Cryptography using Substitution Method
Color Cryptography using Substitution MethodColor Cryptography using Substitution Method
Color Cryptography using Substitution Method
 

Similar to Analysis of a hybrid cipher algorithm

Analysis of a Modified RC4
Analysis of a Modified RC4 Analysis of a Modified RC4
Analysis of a Modified RC4
Tharindu Weerasinghe
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
IJCNCJournal
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
IJECEIAES
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
ijcsa
 
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionSecured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
Tharindu Weerasinghe
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
ijcisjournal
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
 
A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...
A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...
A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...
IJMERJOURNAL
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
H42054550
H42054550H42054550
H42054550
IJERA Editor
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
aniruddh Tyagi
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
aniruddh Tyagi
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
Aniruddh Tyagi
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
IJECEIAES
 
Data Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyData Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA Cryptography
BALAKUMARC1
 

Similar to Analysis of a hybrid cipher algorithm (20)

Analysis of a Modified RC4
Analysis of a Modified RC4 Analysis of a Modified RC4
Analysis of a Modified RC4
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionSecured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...
A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...
A Compression & Encryption Algorithms on DNA Sequences Using R 2 P & Selectiv...
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
H42054550
H42054550H42054550
H42054550
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
 
Data Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA CryptographyData Encryption Technique Based on DNA Cryptography
Data Encryption Technique Based on DNA Cryptography
 

More from Tharindu Weerasinghe

C Propgramming.pdf
C Propgramming.pdfC Propgramming.pdf
C Propgramming.pdf
Tharindu Weerasinghe
 
Basics of Computer Networks in Sinhala
Basics of Computer Networks in SinhalaBasics of Computer Networks in Sinhala
Basics of Computer Networks in Sinhala
Tharindu Weerasinghe
 
Data Structures & Algorithms in Sinhala
Data Structures & Algorithms in SinhalaData Structures & Algorithms in Sinhala
Data Structures & Algorithms in Sinhala
Tharindu Weerasinghe
 
Object Oriended Programming in Sinhala
Object Oriended Programming in Sinhala Object Oriended Programming in Sinhala
Object Oriended Programming in Sinhala
Tharindu Weerasinghe
 
Tips For A Better Undergraduate Research
Tips For A Better Undergraduate ResearchTips For A Better Undergraduate Research
Tips For A Better Undergraduate Research
Tharindu Weerasinghe
 
Basics of Block Chain
Basics of Block ChainBasics of Block Chain
Basics of Block Chain
Tharindu Weerasinghe
 
Basics of IoT
Basics of IoTBasics of IoT
Basics of IoT
Tharindu Weerasinghe
 
REST API Basics
REST API BasicsREST API Basics
REST API Basics
Tharindu Weerasinghe
 
Cloud Conputing Basics and some Related Research Topics
Cloud Conputing Basics and some Related Research TopicsCloud Conputing Basics and some Related Research Topics
Cloud Conputing Basics and some Related Research Topics
Tharindu Weerasinghe
 
Basic Concepts and Trends in Emerging Technologies
Basic Concepts and Trends in Emerging TechnologiesBasic Concepts and Trends in Emerging Technologies
Basic Concepts and Trends in Emerging Technologies
Tharindu Weerasinghe
 
Introcution to EJB
Introcution to EJBIntrocution to EJB
Introcution to EJB
Tharindu Weerasinghe
 
Introduction to Enterprise Applications and Tools
Introduction to Enterprise Applications and ToolsIntroduction to Enterprise Applications and Tools
Introduction to Enterprise Applications and Tools
Tharindu Weerasinghe
 
Introduction to Agile Software Development & Python
Introduction to Agile Software Development & PythonIntroduction to Agile Software Development & Python
Introduction to Agile Software Development & Python
Tharindu Weerasinghe
 
Agile Languages for Rapid Prototyping
Agile Languages for Rapid PrototypingAgile Languages for Rapid Prototyping
Agile Languages for Rapid Prototyping
Tharindu Weerasinghe
 
Things to ponder before you start building [cooperate] software
Things to ponder before you start building [cooperate] softwareThings to ponder before you start building [cooperate] software
Things to ponder before you start building [cooperate] software
Tharindu Weerasinghe
 
How to make screens and the internet safe for Children
How to make screens and the internet safe for Children How to make screens and the internet safe for Children
How to make screens and the internet safe for Children
Tharindu Weerasinghe
 
Different Concepts on Databases
Different Concepts on DatabasesDifferent Concepts on Databases
Different Concepts on Databases
Tharindu Weerasinghe
 
A Survey Study on Higher Education Trends among Sri Lankan IT Professionals
A Survey Study on Higher Education Trends among Sri Lankan IT ProfessionalsA Survey Study on Higher Education Trends among Sri Lankan IT Professionals
A Survey Study on Higher Education Trends among Sri Lankan IT Professionals
Tharindu Weerasinghe
 
A Survey Study on Higher Education Trends among Information Technology Prof...
A Survey Study  on  Higher Education Trends among Information Technology Prof...A Survey Study  on  Higher Education Trends among Information Technology Prof...
A Survey Study on Higher Education Trends among Information Technology Prof...
Tharindu Weerasinghe
 
Professionalism and Industry Expectations related to IT industry
Professionalism and Industry Expectations related to IT industry  Professionalism and Industry Expectations related to IT industry
Professionalism and Industry Expectations related to IT industry
Tharindu Weerasinghe
 

More from Tharindu Weerasinghe (20)

C Propgramming.pdf
C Propgramming.pdfC Propgramming.pdf
C Propgramming.pdf
 
Basics of Computer Networks in Sinhala
Basics of Computer Networks in SinhalaBasics of Computer Networks in Sinhala
Basics of Computer Networks in Sinhala
 
Data Structures & Algorithms in Sinhala
Data Structures & Algorithms in SinhalaData Structures & Algorithms in Sinhala
Data Structures & Algorithms in Sinhala
 
Object Oriended Programming in Sinhala
Object Oriended Programming in Sinhala Object Oriended Programming in Sinhala
Object Oriended Programming in Sinhala
 
Tips For A Better Undergraduate Research
Tips For A Better Undergraduate ResearchTips For A Better Undergraduate Research
Tips For A Better Undergraduate Research
 
Basics of Block Chain
Basics of Block ChainBasics of Block Chain
Basics of Block Chain
 
Basics of IoT
Basics of IoTBasics of IoT
Basics of IoT
 
REST API Basics
REST API BasicsREST API Basics
REST API Basics
 
Cloud Conputing Basics and some Related Research Topics
Cloud Conputing Basics and some Related Research TopicsCloud Conputing Basics and some Related Research Topics
Cloud Conputing Basics and some Related Research Topics
 
Basic Concepts and Trends in Emerging Technologies
Basic Concepts and Trends in Emerging TechnologiesBasic Concepts and Trends in Emerging Technologies
Basic Concepts and Trends in Emerging Technologies
 
Introcution to EJB
Introcution to EJBIntrocution to EJB
Introcution to EJB
 
Introduction to Enterprise Applications and Tools
Introduction to Enterprise Applications and ToolsIntroduction to Enterprise Applications and Tools
Introduction to Enterprise Applications and Tools
 
Introduction to Agile Software Development & Python
Introduction to Agile Software Development & PythonIntroduction to Agile Software Development & Python
Introduction to Agile Software Development & Python
 
Agile Languages for Rapid Prototyping
Agile Languages for Rapid PrototypingAgile Languages for Rapid Prototyping
Agile Languages for Rapid Prototyping
 
Things to ponder before you start building [cooperate] software
Things to ponder before you start building [cooperate] softwareThings to ponder before you start building [cooperate] software
Things to ponder before you start building [cooperate] software
 
How to make screens and the internet safe for Children
How to make screens and the internet safe for Children How to make screens and the internet safe for Children
How to make screens and the internet safe for Children
 
Different Concepts on Databases
Different Concepts on DatabasesDifferent Concepts on Databases
Different Concepts on Databases
 
A Survey Study on Higher Education Trends among Sri Lankan IT Professionals
A Survey Study on Higher Education Trends among Sri Lankan IT ProfessionalsA Survey Study on Higher Education Trends among Sri Lankan IT Professionals
A Survey Study on Higher Education Trends among Sri Lankan IT Professionals
 
A Survey Study on Higher Education Trends among Information Technology Prof...
A Survey Study  on  Higher Education Trends among Information Technology Prof...A Survey Study  on  Higher Education Trends among Information Technology Prof...
A Survey Study on Higher Education Trends among Information Technology Prof...
 
Professionalism and Industry Expectations related to IT industry
Professionalism and Industry Expectations related to IT industry  Professionalism and Industry Expectations related to IT industry
Professionalism and Industry Expectations related to IT industry
 

Recently uploaded

Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Mobile app Development Services | Drona Infotech
Mobile app Development Services  | Drona InfotechMobile app Development Services  | Drona Infotech
Mobile app Development Services | Drona Infotech
Drona Infotech
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
kalichargn70th171
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
Hironori Washizaki
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Codeigniter VS Cakephp Which is Better for Web Development.pdf
Codeigniter VS Cakephp Which is Better for Web Development.pdfCodeigniter VS Cakephp Which is Better for Web Development.pdf
Codeigniter VS Cakephp Which is Better for Web Development.pdf
Semiosis Software Private Limited
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 

Recently uploaded (20)

Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Mobile app Development Services | Drona Infotech
Mobile app Development Services  | Drona InfotechMobile app Development Services  | Drona Infotech
Mobile app Development Services | Drona Infotech
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Codeigniter VS Cakephp Which is Better for Web Development.pdf
Codeigniter VS Cakephp Which is Better for Web Development.pdfCodeigniter VS Cakephp Which is Better for Web Development.pdf
Codeigniter VS Cakephp Which is Better for Web Development.pdf
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 

Analysis of a hybrid cipher algorithm

  • 1. IFRSA’s International Journal Of Computing|Vol2|issue 2|April 2012 397 Analysis of a Hybrid Cipher Algorithm for Data Encryption T.D.B Weerasinghe BSc.Eng(Hons), MIEEE, AMIE(SL), MSc.Eng candidate, Department of Electrical and Electronic Engineering, University of Peradeniya, Peradeniya 20400, Sri Lanka ABSTRACT Block and stream ciphers can be joined in order to obtain hybrid algorithms and the main idea of combining can be enhancing the security of the cipher. This paper is presented to illustrate a hybrid algorithm created by combining a block cipher algorithm, TripleDES (ECB mode) and a stream cipher algorithm, RC4. In the encryption mode, first the plain text is encrypted by TripleDES; then the particular cipher text is encrypted by RC4. In the decryption mode, first the cipher text is decrypted by RC4 and then by TripleDES to decrypt again and obtain the original text. Input (plain text) is given as a text file. Performance (encryption time) and secrecy (according to the theories of Shannon) of cipher are analysed over the input data size. Key words:TripleDES, RC4, Encryption time, Secrecy of ciphers. 1. INTRODUCTION There are many ways to combine cryptographic algorithms to get new algorithms. The impetus behind these combinations is increasing security[1]. In this research, the focus was, combining a block cipher with a stream cipher to obtain a hybrid cipher and then analyze the performance of the encryption procedure and secrecy level of the cipher. Motivation for this research is the feeling that the eavesdroppers who aim block ciphers and stream ciphers alone might find it difficult to break the combined cipher. Block ciphers are strong in security but poor in performance whereas stream ciphers are poor in security and strong in performance. Thus, the feeling of combining these two lead me to obtain something in between. So, TripleDES (168 bit key) and RC4 (128 bit key) are combined together in-order to obtain the hybrid cipher. Performance of the proposed hybrid algorithm is compared with that of TripleDES and RC4. Performance is measured as the encryption time of each algorithm for a given input. Input has been varied from 5KB to 100KB (input is a text file, read by the relevant Java program) Secrecy of the cipher of the proposed hybrid algorithm is also compared with that of TripleDES and RC4. Secrecy is measured according to the Shannon’s theorems on Entropy and Secrecy of Ciphers. There also the input has been varied from 5KB to 100KB, same as in the previous analysis. 2. METHODS STEP 1: In this research TripleDES (in ECB mode with PKCS5Padding which are used as the default mode and padding schemes for TripleDES provided by SunJCE) and RC4 are combined to encrypt and decrypt a message. After the final permutation of the TripleDES’s third round (i.e. the 16th round of the third encryption cycle of TripleDES) the cipher is converted to a bit stream and encrypted using RC4. Then it is decrypted using the same algorithm used in RC4 encryption and the particular resultant cipher bit stream is converted to block of bits and those are decrypted using the TripleDES decrypting operation. Three Java programs are written to implement the algorithms TripleDES, RC4 and the Hybrid. Java’s cryptography package is used to implement the algorithms. Hence the default key sizes provided by SunJCE are used. [4] International journal of Computing Journal homepage: www.ifrsa.org
  • 2. T.D.B Weerasinghe| Analysis of a Hybrid Cipher Algorithm for Data Encryption IFRSA’s International Journal Of Computing|Vol2|issue 2|April 2012 398 Fig.1 Combination of TripleDES and RC4[3] Fig.2 Java Cryptography Package[2] STEP 2: Performance of the each algorithm should be measured in order to get an idea of the cost friendliness of the algorithm. Data ranging from size 5KB to 100KB (text files) are given to each algorithm (TripleDES, RC4 and Hybrid respectively) to encrypt and the encryption time is measured using Java’s time calculation scenarios. Analysis is done by comparing the encryption time of all the three algorithms. A separate Java program is written in-order to calculate the execution times of the ciphers generated by each of the algorithms. (TripleDES, RC4 and the Hybrid) STEP 3: Ciphers of the Algorithms should be analyzed in order to measure the security strength of it. As the measurement criteria, in this research, the Secrecy of Ciphers is used. Leading to the calculation of the secrecy value of a cipher, the following theories have been followed! Definition of ‘entropy’: The entropy of a message M, denoted H(M), is the amount of information in the message. It corresponds to the minimum number of bits needed to encode all possible meanings of the message, assuming all messages are equally likely. [5]  The entropy of a given message X is defined by the weighted average:  H(X) = - Σ{1≤i≤n} p(Xi)log2 p(Xi) Definition of ‘uncertainty’: The uncertainty of a message corresponds to the number of plaintext bits that must be recovered when the message is scrambled in ciphertext in order to learn the plaintext. The uncertainty of a message is measured by its entropy. [5] Definition of ‘equivocation’: The equivocation is the uncertainty of a message that can be reduced by given additional information. [5]  The equivocation is the conditional entropy of X given Y:  HY(X) = - Σ{X,Y} p(X,Y)log2 pY(X)
  • 3. T.D.B Weerasinghe| Analysis of a Hybrid Cipher Algorithm for Data Encryption IFRSA’s International Journal Of Computing|Vol2|issue 2|April 2012 399 = -Σ{Y} p(Y)Σ{X} pY(X)log2 (p Y(X)) Definition of secrecy: The secrecy of a cipher is measured in terms of the key equivocation Hc(K) of a key K for a given ciphertext C; that is the amount of uncertainty in K given C: [5]  Hc(K) = -Σ{C} p(C)Σ{K} pc(K)log2 (pc(K)) Note: This is used in the secrecy calculation in this research and the above equations are illustrated from theories of Shannon related to entropy and secrecy. Claude Elwood Shannon [April 30, 1916 – February 24, 2001] is called the Father of Information Theory. Secrecy values are calculated for each cipher of the three algorithms (TripleDES, RC4 and the Hybrid) for input data ranging from size 5KB to 100KB. Average encryption times and secrecy of ciphers are calculated after 5 rounds of testing for each input (each text file) 3. RESULTS INPUT DATA SIZE/KB AVERAGE ENCRYPTION TIME/ms TripleDES(3DES) RC4 Hybrid Algorithm 5 22 9.4 25.2 10 24.8 9.4 31 15 28.4 1.6 31.2 20 28.2 3.2 31.8 25 31 9.4 28 30 29.8 9.2 27.8 35 30 10.8 31.8 40 33.2 12.8 32 45 34 11.4 36 50 33.4 11.2 34 55 35.4 11 37 60 35 11.2 36.4 65 37 11 39.5 70 39.3 11.5 39 75 40.5 11 40.5 80 39.5 9.4 37.2 85 37.4 12.6 43.4 90 47 15 43.6 95 47 6.4 39 100 46.4 6.4 47 Table.1 Average Encryption Times of the Algorithms for similar inputs
  • 4. T.D.B Weerasinghe| Analysis of a Hybrid Cipher Algorithm for Data Encryption IFRSA’s International Journal Of Computing|Vol2|issue 2|April 2012 400 Fig.3 Average Encryption Time vs. Data Size INPUT DATA SIZE/KB AVERAGE SECRECY VALUE TripleDES RC4 Hybrid Algorithm 5 0.128433408 0.17480747 0.215101274 10 0.308858194 0.16832912 0.229507753 15 0.200804304 0.1585643 0.223708079 20 0.363490184 0.16556034 0.220657567 25 0.26001987 0.17118074 0.231303128 30 0.237138551 0.17770687 0.22593549 35 0.201835278 0.18044321 0.237518095 40 0.327427522 0.17294332 0.237910337 45 0.239508702 0.17469719 0.239328159 50 0.174385837 0.15607884 0.235069715 55 0.354634619 0.17911076 0.225973132 60 0.324950271 0.16998157 0.23258963 65 0.407747905 0.18945935 0.234729998 70 0.139060063 0.15935405 0.237956204 75 0.128660882 0.15917461 0.233547191 80 0.154629452 0.18243486 0.242777805 85 0.146645331 0.16382689 0.240819397 90 0.159713292 0.18480739 0.242417182 95 0.140878024 0.19212304 0.232567338 100 0.162850973 0.18449194 0.229123519 Table.2 Average Secrecy Values of TripleDES, RC4 and Hybrid algorithms for similar inputs Fig.4 Secrecy Value vs. Data Size 4. CONCLUSION Conclusion with respect to the performance of the algorithms: Proposed hybrid algorithm is more expensive than RC4 but goes parallel with TripleDES. Thus, the results emphasize, generally the cost of the algorithm is higher than that of RC4 which is a very cost effective stream cipher algorithm but it is quite similar to TripleDES in terms of the cost. When the size of the plain text is increased, the performance lies at the low end. (Refer Fig.3) Conclusion with respect to the secrecy of ciphers of the algorithms: Secrecy of the ciphers is measured using the Shannon’s theories; so the results emphasize that the proposed hybrid algorithm has a secrecy variation very much as a sinusoidal variation with small amplitude, whereas TripleDES
  • 5. T.D.B Weerasinghe| Analysis of a Hybrid Cipher Algorithm for Data Encryption IFRSA’s International Journal Of Computing|Vol2|issue 2|April 2012 401 (ECB mode) has drastic changes of the secrecy (even though it is higher than that of the hybrid) and RC4 has very low level of secrecy, close to zero, as the size of the plain text is increased. Thus the secrecy of the hybrid cipher is more stable than that of TripleDES and RC4. (Refer Fig.4) Conclusion in general: Average secrecy of the hybrid cipher is not drastically changing over the input data size. It is moderately distributed without any drastic changes like that of TripleDES. Hence, it can be considered like an algorithm which has a stable secrecy regardless of input data size. TripleDES has an unpredictable secrecy which deviates quite frequently. It may arouse vulnerabilities to attacks. Average secrecy values of ciphers of RC4 are lying on the lower level as it is a stream cipher. This mixture will confuse the eavesdroppers who aim TripleDES alone and RC4 alone. But when the cost of the algorithms is concerned the hybrid is more expensive than the other two. At the beginning of the research the imagination was the average secrecy value of the hybrid cipher would be far better than that of TripleDES and RC4; but at the end a quite interesting result was obtained to show that it lies in between but more stable than TripleDES as well as not lower than RC4. Thus idea of combining two types of symmetric key algorithms has left a doubt behind in a way that can be solved by a future work of checking the vulnerability of these three algorithms to a common plain text attack or even a brute-force one! As another future work, key size of the two algorithms can be changed and analyzed. Over the variable key length, the average encryption time and average secrecy value can be plotted and studied! REFERENCES [1] Mailewa, D.M.A.B., Weerasinghe T.D.B., Perera S.P.J., Munasinghe C.A., 2008: Types and Modes Combined Algorithm for Data Encryption and Decryption, proceedings, 13th Peradeniya University Research Sessions, Peradeniya, Sri Lanka, 181-182 [2] Sachin Majithia, Kumar Dinesh, 2010: ‘Implementation and Analysis of AES, DES and Triple DES on GSM Network’, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.1, 298-303 [3] Stallings, William, 2005: Cryptography and Network Security, Forth Edition: Principles and Practices, Prentice Hall, 592 [4] http://docs.oracle.com/javase/6/docs/technotes/guides/security/SunProviders.html [5] www.ece.uvic.ca/~itraore/elec567-04/notes/elec6704-6-2.pdf