SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013




         A NEW APPROACH FOR COMPLEX
       ENCRYPTING AND DECRYPTING DATA
                          Obaida Mohammad Awad Al-Hazaimeh

           Department of Information Technology, Al-balqa Applied University,
                      AL-Huson University College, Irbid, Jordan.
                                     dr_obaidam@yahoo.com

ABSTRACT
During the last decades, information security has become a major issue. Encrypting and decrypting data
have recently been widely investigated and developed because there is a demand for a stronger encryption
and decryption which is very hard to crack. Cryptography plays major roles to fulfilment these demands.
Nowadays, many of researchers have proposed many of encryption and decryption algorithms such as AES,
DES, RSA, and others. But most of the proposed algorithms encountered some problems such as lack of
robustness and significant amount of time added to packet delay to maintain the security on the
communication channel between the terminals. In this paper, the security goals were enhanced via "A New
Approach for Complex Encrypting and Decrypting Data" which maintains the security on the
communication channels by making it difficult for attacker to predicate a pattern as well as speed of the
encryption / decryption scheme.

KEYWORDS
Encryption, Decryption, QoS, RC6, PKI,

1. INTRODUCTION
In network security, cryptography has a long history by provides a way to store sensitive
information or transmit it across insecure networks (i.e. the Internet) so that it cannot be read by
anyone except the intended recipient, where the cryptosystem is a set of algorithms combined
with keys to convert the original message (Plain-text) to encrypted message (Cipher-text) and
convert it back in the intended recipient side to the original message (Plain-text) [1]. The first
model proposed by Shannon on the cryptosystem is shown in figure 1 [2].




                           Figure 1. Shannon model of secret communication
DOI : 10.5121/ijcnc.2013.5208                                                                         95
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013

In computer systems, the algorithm consist of complex mathematical formulas that dictate the
rules of conversion process from plain text to cipher text and vice versa combined with
the key. However, some of encryption and decryption algorithms use the same key (i.e.
sender, and receiver). And in other encryption and decryption algorithms they use
different keys but these keys must be related.

The major issue to design any encryption and decryption algorithm is to improve the security
level. Therefore, this paper aims to propose a new algorithm to improve the security level and
increase the performance by minimizing a significant amount of delay time to maintain the
security and makes comparative study [4]. This paper is structured as follows: comparison
between the most popular encryption algorithms, Advanced Encryption Standard (AES), Public
Key Infrastructure (PKI), proposed technique, performance analysis, security analysis, and
conclusion

1.1. Comparisons of Most Popular Encryption Algorithms

There is quite a number of encryption algorithms used for keeping information secured. Their
complexity and ability to resist attack varies from one algorithm to another. The main component
of encryption process is the algorithms that serve basic purpose in different ways. Popularly used
algorithms include DES, TripleDES, RC2, RC4, Blowfish, Twofish and Rijndael (AES) as we
mentioned in the abstract. The basic information of the most popular ciphers is shown in table 1
[5].

                        Table 1. Comparison of popular encryption algorithms




1.2. Advanced Encryption Standard (AES)

Based on the table 1, the National Institute of Standards and Technology (NIST) in 1997,
announced officially that Rijndael algorithm would become the Advanced Encryption Standard
(AES) to replace the aging Data Encryption Standard (DES). AES algorithm is a block cipher text
the block size can be 128, 192 or 256 bits. 128(AES -128), 192(AES -192) and 256 (AES -256)
bits key lengths [5- 7].

The Rijndael algorithm is based on round function, and different combinations of the algorithm
are structured by repeating these round function different times. Each round function contains
uniform and parallel four steps, byte substitution, row shifting, column mixing 147 and key
addition, the data is passed through Nr rounds (10, 12, and 14), and each step has its own
particular functionality as shown in figure 2 [7].



                                                                                                 96
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013




                          Figure 2: Advanced encryption standard structure

1.3. Public Key Infrastructure (PKI)

PKI provides series of security services such as, authentication, confidentiality, non-repudiation,
and integrity to the messages being exchanged [8- 10]. In this paper, PKI use in connection
establishment phase to exchange the security value between the network terminals i.e
sender, and receiver.

2. PROPOSED TECHNIQUE
The proposed algorithm is an attempt to present a new approach for complex encrypting and
decrypting data based on parallel programming in such a way that the new approach can make
use of multiple-core processor to achieve higher speed with higher level of security.

2.1. Encryption

In term of encryption process, the algorithm consists of combination of public key infrastructure
for hybrid system and RC6 algorithm for confusion and diffusion operations as shown. The
proposed encryption algorithm consists of the following processes as shown in figure 3.




                                                                                                 97
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013




                               Figure 3. Proposed encryption structure

Public position is Hexadecimal numbers arranged in 8*8 matrix announced to all. In this step
RC6 algorithm play major roles to generate a private position based to the secrete value from
public key infrastructure. Plain-text 1024- bits size divided to 2 blocks. One of these blocks used
as key after performed confusion and diffusion operations using RC6 algorithm. The last step is
Insert the key inside the Cipher data based on the private position. RC6 is further described by a
pseudo-code as shown in figure 4.




                                 Figure 4. RC6 algorithm structure



                                                                                                 98
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013

2.2. Decryption

The decryption process involves converting the encrypted data back to its original form for the
receiver’s understanding. The same process is performed at the beginning of the encryption and
decryption process (connection established) as described in the encryption part at the sender side
to generate the same private position at the receiver side to eliminate the key from the cipher text .
. The proposed decryption algorithm consists of the following processes as shown in figure 5.




                                Figure 5. Proposed decryption structure

3. PERFORMANCE ANALYSIS
In order to test the performance analysis for any encryption and decryption algorithms, the
speed play a major roles [4, 11-12]. In this paper, the proposed algorithm compared with Rijndael
algorithm in term of the speed in both encryption and decryption process because the National
Institute of Standards and Technology (NIST) announced officially that Rijndael algorithm
become the Advanced Encryption Standard (AES) as we mentioned in the previous section. Both
algorithms are implemented in the same environment and same conditions using C language.

3.1. Speed analysis for encryption and decryption

The speed of the algorithm can be characterized by measuring the time required for encryption
and decryption. This parameter is measured for both the algorithms: Proposed algorithm and AES
as shown in table 2, and 3.




                                                                                                   99
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013

                        Table 2. Speed for Encryption in different key lengths




                        Table 3. Speed for Decryption in different key lengths




The following column charts showing the relationship between the key lengths and the encryption
and decryption time in both cases in figure 6 and 7.




                     Figure 6. Column chart for Encryption process in both cases

The result in this paper shows that the average time required to encrypt the data is 0.2972729 ms
in 512-bits key length using the proposed solution, and to encrypt the data using AES is
0.8918188 ms in 512-bits key length.




                                                                                                 100
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013




                      Figure 7. Column chart for decryption process in both cases

As well as, the result shows that the average time required to decrypt the data is 0.3187594 ms in
512-bits key length using the proposed solution, and to decrypt the data using AES is 0.6365188
ms in 512-bits key length. In other words, the result in this paper shows the average time needed
to encrypt and decrypt a data using a proposed algorithm is much smaller than AES algorithm.

4. SECURITY ANAYSIS
In order to test the security level of the proposed algorithm, a set of tests and analysis are
performed on the algorithm. Some of these tests are taken from different cryptanalysis papers,
NIST statistical suite, and combination of several other statistical analyses. The following
analysis methods are performed on the algorithm: Information Entropy [13], correlation analysis
between the public and private positions [14-15].

4.1. Correlation Analysis

As we mentioned in section 2.1, RC6 algorithm play major roles to generate a private position
based to the secrete value from public key infrastructure. To analyze the correlations between the
public and the private positions, correlation coefficients test is used. The correlation coefficients
rules are described by a pseudo-code shown in figure 8 [13, 15].




                              Figure 8. Rules of correlation coefficients



                                                                                                 101
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013

In correlation analysis, we randomly choose different values in the public and private positions
(8*8 matrix). The correlation coefficients of the public and the private positions in vertical,
horizontal, and diagonal directions were calculated. The correlation coefficients for the three
dimensions in the private positions are close to zero, and for public positions are close to one.
This indicates that the public and private positions are not correlated.

4.2. Information Entropy

To calculate the entropy H(X), we have:




The entropy H(X) rules are described by a pseudo-code as shown in figure 9. The result shows
the entropy value H (X) for the proposed algorithm is 7.98789 which is very close to the
theoretical value 8. This indicates that the encryption algorithm is secure upon the entropy attack.




                               Figure 9. Rules of Information Entropy

4.3. The Strength of Encryption

The strength of encryption measure by the time required to decode or extract the key [10]. The
calculation of encryption strength of an encryption algorithm the following equation is used [16].




Differential Characteristic = (p1p2) −1 ×Filtering weight. The result shows, the proposed
algorithm needed 1.00E+68 time (Years) to crack.

5. CONCLUSION
This paper introduced a new approach for complex encrypting and decrypting data. Although
there have been many researchers on the cryptography, but most of the existing algorithms have
several weaknesses either caused by low security level or increase the delay time due the design
                                                                                                 102
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013

of the algorithm itself. The proposed algorithm have been tested against different known attacks
and proved to be secure against them. Therefore, it can be consider as a good alternative to some
applications because of the high level of security and average time needed to encrypt and decrypt
a data using a proposed algorithm is much smaller than AES algorithm.

REFERNCES

[1] P. Zimmerman, "An Introduction to Cryptography", Doubleday & Company, Inc., United State of
     America, USA, 1999.
[2] C. Shannon, “Communication Theory of Secrecy Systems”, Bell Systems Technical Journal, MD
     Computing, vol. 15, pp. 57-64, 1998.
[3] I. Nichols, K. Randall (1999), ICSA Guide to Cryptography, McGraw-Hill, Companies Inc, New
     York.
[4] H. Mohan, and R. Raji. "Performance Analysis of AES and MARS Encryption Algorithms".
     International Journal of Computer Science Issues (IJCSI), Vol. 8, issue 4. 2011.
[5] A. Lee, NIST Special Publication 800-21, Guideline for Implementing Cryptography in the Federal
     Government, National Institute of Standards and Technology, November 1999.
[6] J. Nechvatal, Report on the Development of the Advanced Encryption Standard (AES), National
     Institute of Standards and Technology, October 2, 2000.
[7] M. Wali and M. Rehan, “Effective Coding and Performance Evaluation of the Rijndael Algorithm
     (AES)”, in the Proceedings of the Engineering Sciences and Technology Conference, vol. 7, pp. 1-7,
     Karachi, 2005.
 [8] C. Jie, “Design Alternatives and Implementation of PKI Functionality for VoIP”, Master of Science
     dissertation, Telecommunication Systems Laboratory, Royal Institute of Technology (KTH),
     Stockholm, 2006.
 [9] R. Hunt, “PKI and Digital Certification Infrastructure”, in the Proceedings Ninth IEEE International
     Conference on Networks, vol. 4, pp. 234 – 239, Bangkok, Thailand, 2001.
[10] S. Xenitellis, The Open–Source PKI Book: A Guide to PKIs and Open-Source Implementations, Open
     CA Team, 2000.
[11] W. Emm, “Impact of Multiencryption in Data Security”, International Journal of Computer Theory
     and Engineering, vol. 1, pp. 571-567 , 2009.
[12] B.D.C.N.Prasad, P E S N Krishna Prasad, “A Performance Study on AES algorithms”, International Journal of
     Computer Science and Information Security, Vol. 8, No. 6,September 2010,pp 128-132.
[13] S. Tao, W. Ruli, and Y. Yixun, “Clock-Controlled Chaotic Key-Stream Generators”, Institution of
     Engineering and Technology Electronics Letters, vol. 34, pp. 1932-1934, 1998.
[14] A. Masoun, ”Cryptography Primitives Based on Piecewise Nonlinear Chaotic Maps”, Master of
     Science dissertation, Universiti Sains Malaysia (USM), Pineng, Malaysia, 2008.
[15] Obaida. Al-Hazaimeh, " Increase the Security Level for Real-Time Application Using New Key
     Management Solution", International Journal of Computer Science Issues(IJCSI), Vol. 9, Issue 3,
     2012.
[16] L. Chang-Doo, C. Bong-Jun, P. Kyoo- Seok (2004), “Design and evaluation of a block encryption
     Algorithm using dynamic-key mechanism”, Future
     Generation Computer Systems 20, 327–338.

Authors
Obaida Mohammad Awad Al-Hazaimeh received the B.S. degree in Computer Science from Applied
Science University (ASU), Jordan in 2004, the MSc in Computer Science/ Distributed system from
University Science Malaysia (USM), 2005, and PhD in Computer Science/ Network security
(Cryptography) for Real-Time Application (VoIP), 2010.




                                                                                                          103

More Related Content

What's hot

Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015Ashish Gupta
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
IJNSA Journal
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
IOSR Journals
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
Yekini Nureni
 
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image TransferA Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
ijcnac
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
IAEME Publication
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
chovatiyabhautik
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET Journal
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
IJNSA Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
IJERA Editor
 
B03302007012
B03302007012B03302007012
B03302007012
theijes
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
IRJET Journal
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
IJCNCJournal
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
eSAT Journals
 

What's hot (20)

82 86
82 8682 86
82 86
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image TransferA Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
B03302007012
B03302007012B03302007012
B03302007012
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 

Viewers also liked

Ijcnc050214
Ijcnc050214Ijcnc050214
Ijcnc050214
IJCNCJournal
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
IJCNCJournal
 
A novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performanceA novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performance
IJCNCJournal
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptography
IJCNCJournal
 
Ijcnc050211
Ijcnc050211Ijcnc050211
Ijcnc050211
IJCNCJournal
 
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEOPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
IJCNCJournal
 
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
IJCNCJournal
 
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
IJCNCJournal
 
Ijcnc050201
Ijcnc050201Ijcnc050201
Ijcnc050201
IJCNCJournal
 
Ijcnc050206
Ijcnc050206Ijcnc050206
Ijcnc050206
IJCNCJournal
 
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
IJCNCJournal
 
A fuzzy logic controllerfora two link functional manipulator
A fuzzy logic controllerfora two link functional manipulatorA fuzzy logic controllerfora two link functional manipulator
A fuzzy logic controllerfora two link functional manipulator
IJCNCJournal
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networking
IJCNCJournal
 
Dcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkDcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless network
IJCNCJournal
 
On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...
IJCNCJournal
 
Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...
IJCNCJournal
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
IJCNCJournal
 
ETOR-Efficient Token based Opportunistic Routing
ETOR-Efficient Token based Opportunistic RoutingETOR-Efficient Token based Opportunistic Routing
ETOR-Efficient Token based Opportunistic Routing
IJCNCJournal
 

Viewers also liked (18)

Ijcnc050214
Ijcnc050214Ijcnc050214
Ijcnc050214
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
 
A novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performanceA novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performance
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptography
 
Ijcnc050211
Ijcnc050211Ijcnc050211
Ijcnc050211
 
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEOPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
 
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
 
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
 
Ijcnc050201
Ijcnc050201Ijcnc050201
Ijcnc050201
 
Ijcnc050206
Ijcnc050206Ijcnc050206
Ijcnc050206
 
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
 
A fuzzy logic controllerfora two link functional manipulator
A fuzzy logic controllerfora two link functional manipulatorA fuzzy logic controllerfora two link functional manipulator
A fuzzy logic controllerfora two link functional manipulator
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networking
 
Dcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkDcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless network
 
On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...
 
Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
 
ETOR-Efficient Token based Opportunistic Routing
ETOR-Efficient Token based Opportunistic RoutingETOR-Efficient Token based Opportunistic Routing
ETOR-Efficient Token based Opportunistic Routing
 

Similar to Ijcnc050208

Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...
IJECEIAES
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
IJTET Journal
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
18. 23367.pdf
18. 23367.pdf18. 23367.pdf
18. 23367.pdf
TELKOMNIKA JOURNAL
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
IJECEIAES
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
C0281010016
C0281010016C0281010016
C0281010016
inventionjournals
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
ijtsrd
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
IJNSA Journal
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
IJMER
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
IJECEIAES
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
 

Similar to Ijcnc050208 (20)

Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
18. 23367.pdf
18. 23367.pdf18. 23367.pdf
18. 23367.pdf
 
40520130101005
4052013010100540520130101005
40520130101005
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
C0281010016
C0281010016C0281010016
C0281010016
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 

More from IJCNCJournal

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 

More from IJCNCJournal (20)

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

Ijcnc050208

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013 A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA Obaida Mohammad Awad Al-Hazaimeh Department of Information Technology, Al-balqa Applied University, AL-Huson University College, Irbid, Jordan. dr_obaidam@yahoo.com ABSTRACT During the last decades, information security has become a major issue. Encrypting and decrypting data have recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very hard to crack. Cryptography plays major roles to fulfilment these demands. Nowadays, many of researchers have proposed many of encryption and decryption algorithms such as AES, DES, RSA, and others. But most of the proposed algorithms encountered some problems such as lack of robustness and significant amount of time added to packet delay to maintain the security on the communication channel between the terminals. In this paper, the security goals were enhanced via "A New Approach for Complex Encrypting and Decrypting Data" which maintains the security on the communication channels by making it difficult for attacker to predicate a pattern as well as speed of the encryption / decryption scheme. KEYWORDS Encryption, Decryption, QoS, RC6, PKI, 1. INTRODUCTION In network security, cryptography has a long history by provides a way to store sensitive information or transmit it across insecure networks (i.e. the Internet) so that it cannot be read by anyone except the intended recipient, where the cryptosystem is a set of algorithms combined with keys to convert the original message (Plain-text) to encrypted message (Cipher-text) and convert it back in the intended recipient side to the original message (Plain-text) [1]. The first model proposed by Shannon on the cryptosystem is shown in figure 1 [2]. Figure 1. Shannon model of secret communication DOI : 10.5121/ijcnc.2013.5208 95
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013 In computer systems, the algorithm consist of complex mathematical formulas that dictate the rules of conversion process from plain text to cipher text and vice versa combined with the key. However, some of encryption and decryption algorithms use the same key (i.e. sender, and receiver). And in other encryption and decryption algorithms they use different keys but these keys must be related. The major issue to design any encryption and decryption algorithm is to improve the security level. Therefore, this paper aims to propose a new algorithm to improve the security level and increase the performance by minimizing a significant amount of delay time to maintain the security and makes comparative study [4]. This paper is structured as follows: comparison between the most popular encryption algorithms, Advanced Encryption Standard (AES), Public Key Infrastructure (PKI), proposed technique, performance analysis, security analysis, and conclusion 1.1. Comparisons of Most Popular Encryption Algorithms There is quite a number of encryption algorithms used for keeping information secured. Their complexity and ability to resist attack varies from one algorithm to another. The main component of encryption process is the algorithms that serve basic purpose in different ways. Popularly used algorithms include DES, TripleDES, RC2, RC4, Blowfish, Twofish and Rijndael (AES) as we mentioned in the abstract. The basic information of the most popular ciphers is shown in table 1 [5]. Table 1. Comparison of popular encryption algorithms 1.2. Advanced Encryption Standard (AES) Based on the table 1, the National Institute of Standards and Technology (NIST) in 1997, announced officially that Rijndael algorithm would become the Advanced Encryption Standard (AES) to replace the aging Data Encryption Standard (DES). AES algorithm is a block cipher text the block size can be 128, 192 or 256 bits. 128(AES -128), 192(AES -192) and 256 (AES -256) bits key lengths [5- 7]. The Rijndael algorithm is based on round function, and different combinations of the algorithm are structured by repeating these round function different times. Each round function contains uniform and parallel four steps, byte substitution, row shifting, column mixing 147 and key addition, the data is passed through Nr rounds (10, 12, and 14), and each step has its own particular functionality as shown in figure 2 [7]. 96
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013 Figure 2: Advanced encryption standard structure 1.3. Public Key Infrastructure (PKI) PKI provides series of security services such as, authentication, confidentiality, non-repudiation, and integrity to the messages being exchanged [8- 10]. In this paper, PKI use in connection establishment phase to exchange the security value between the network terminals i.e sender, and receiver. 2. PROPOSED TECHNIQUE The proposed algorithm is an attempt to present a new approach for complex encrypting and decrypting data based on parallel programming in such a way that the new approach can make use of multiple-core processor to achieve higher speed with higher level of security. 2.1. Encryption In term of encryption process, the algorithm consists of combination of public key infrastructure for hybrid system and RC6 algorithm for confusion and diffusion operations as shown. The proposed encryption algorithm consists of the following processes as shown in figure 3. 97
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013 Figure 3. Proposed encryption structure Public position is Hexadecimal numbers arranged in 8*8 matrix announced to all. In this step RC6 algorithm play major roles to generate a private position based to the secrete value from public key infrastructure. Plain-text 1024- bits size divided to 2 blocks. One of these blocks used as key after performed confusion and diffusion operations using RC6 algorithm. The last step is Insert the key inside the Cipher data based on the private position. RC6 is further described by a pseudo-code as shown in figure 4. Figure 4. RC6 algorithm structure 98
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013 2.2. Decryption The decryption process involves converting the encrypted data back to its original form for the receiver’s understanding. The same process is performed at the beginning of the encryption and decryption process (connection established) as described in the encryption part at the sender side to generate the same private position at the receiver side to eliminate the key from the cipher text . . The proposed decryption algorithm consists of the following processes as shown in figure 5. Figure 5. Proposed decryption structure 3. PERFORMANCE ANALYSIS In order to test the performance analysis for any encryption and decryption algorithms, the speed play a major roles [4, 11-12]. In this paper, the proposed algorithm compared with Rijndael algorithm in term of the speed in both encryption and decryption process because the National Institute of Standards and Technology (NIST) announced officially that Rijndael algorithm become the Advanced Encryption Standard (AES) as we mentioned in the previous section. Both algorithms are implemented in the same environment and same conditions using C language. 3.1. Speed analysis for encryption and decryption The speed of the algorithm can be characterized by measuring the time required for encryption and decryption. This parameter is measured for both the algorithms: Proposed algorithm and AES as shown in table 2, and 3. 99
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013 Table 2. Speed for Encryption in different key lengths Table 3. Speed for Decryption in different key lengths The following column charts showing the relationship between the key lengths and the encryption and decryption time in both cases in figure 6 and 7. Figure 6. Column chart for Encryption process in both cases The result in this paper shows that the average time required to encrypt the data is 0.2972729 ms in 512-bits key length using the proposed solution, and to encrypt the data using AES is 0.8918188 ms in 512-bits key length. 100
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013 Figure 7. Column chart for decryption process in both cases As well as, the result shows that the average time required to decrypt the data is 0.3187594 ms in 512-bits key length using the proposed solution, and to decrypt the data using AES is 0.6365188 ms in 512-bits key length. In other words, the result in this paper shows the average time needed to encrypt and decrypt a data using a proposed algorithm is much smaller than AES algorithm. 4. SECURITY ANAYSIS In order to test the security level of the proposed algorithm, a set of tests and analysis are performed on the algorithm. Some of these tests are taken from different cryptanalysis papers, NIST statistical suite, and combination of several other statistical analyses. The following analysis methods are performed on the algorithm: Information Entropy [13], correlation analysis between the public and private positions [14-15]. 4.1. Correlation Analysis As we mentioned in section 2.1, RC6 algorithm play major roles to generate a private position based to the secrete value from public key infrastructure. To analyze the correlations between the public and the private positions, correlation coefficients test is used. The correlation coefficients rules are described by a pseudo-code shown in figure 8 [13, 15]. Figure 8. Rules of correlation coefficients 101
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013 In correlation analysis, we randomly choose different values in the public and private positions (8*8 matrix). The correlation coefficients of the public and the private positions in vertical, horizontal, and diagonal directions were calculated. The correlation coefficients for the three dimensions in the private positions are close to zero, and for public positions are close to one. This indicates that the public and private positions are not correlated. 4.2. Information Entropy To calculate the entropy H(X), we have: The entropy H(X) rules are described by a pseudo-code as shown in figure 9. The result shows the entropy value H (X) for the proposed algorithm is 7.98789 which is very close to the theoretical value 8. This indicates that the encryption algorithm is secure upon the entropy attack. Figure 9. Rules of Information Entropy 4.3. The Strength of Encryption The strength of encryption measure by the time required to decode or extract the key [10]. The calculation of encryption strength of an encryption algorithm the following equation is used [16]. Differential Characteristic = (p1p2) −1 ×Filtering weight. The result shows, the proposed algorithm needed 1.00E+68 time (Years) to crack. 5. CONCLUSION This paper introduced a new approach for complex encrypting and decrypting data. Although there have been many researchers on the cryptography, but most of the existing algorithms have several weaknesses either caused by low security level or increase the delay time due the design 102
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013 of the algorithm itself. The proposed algorithm have been tested against different known attacks and proved to be secure against them. Therefore, it can be consider as a good alternative to some applications because of the high level of security and average time needed to encrypt and decrypt a data using a proposed algorithm is much smaller than AES algorithm. REFERNCES [1] P. Zimmerman, "An Introduction to Cryptography", Doubleday & Company, Inc., United State of America, USA, 1999. [2] C. Shannon, “Communication Theory of Secrecy Systems”, Bell Systems Technical Journal, MD Computing, vol. 15, pp. 57-64, 1998. [3] I. Nichols, K. Randall (1999), ICSA Guide to Cryptography, McGraw-Hill, Companies Inc, New York. [4] H. Mohan, and R. Raji. "Performance Analysis of AES and MARS Encryption Algorithms". International Journal of Computer Science Issues (IJCSI), Vol. 8, issue 4. 2011. [5] A. Lee, NIST Special Publication 800-21, Guideline for Implementing Cryptography in the Federal Government, National Institute of Standards and Technology, November 1999. [6] J. Nechvatal, Report on the Development of the Advanced Encryption Standard (AES), National Institute of Standards and Technology, October 2, 2000. [7] M. Wali and M. Rehan, “Effective Coding and Performance Evaluation of the Rijndael Algorithm (AES)”, in the Proceedings of the Engineering Sciences and Technology Conference, vol. 7, pp. 1-7, Karachi, 2005. [8] C. Jie, “Design Alternatives and Implementation of PKI Functionality for VoIP”, Master of Science dissertation, Telecommunication Systems Laboratory, Royal Institute of Technology (KTH), Stockholm, 2006. [9] R. Hunt, “PKI and Digital Certification Infrastructure”, in the Proceedings Ninth IEEE International Conference on Networks, vol. 4, pp. 234 – 239, Bangkok, Thailand, 2001. [10] S. Xenitellis, The Open–Source PKI Book: A Guide to PKIs and Open-Source Implementations, Open CA Team, 2000. [11] W. Emm, “Impact of Multiencryption in Data Security”, International Journal of Computer Theory and Engineering, vol. 1, pp. 571-567 , 2009. [12] B.D.C.N.Prasad, P E S N Krishna Prasad, “A Performance Study on AES algorithms”, International Journal of Computer Science and Information Security, Vol. 8, No. 6,September 2010,pp 128-132. [13] S. Tao, W. Ruli, and Y. Yixun, “Clock-Controlled Chaotic Key-Stream Generators”, Institution of Engineering and Technology Electronics Letters, vol. 34, pp. 1932-1934, 1998. [14] A. Masoun, ”Cryptography Primitives Based on Piecewise Nonlinear Chaotic Maps”, Master of Science dissertation, Universiti Sains Malaysia (USM), Pineng, Malaysia, 2008. [15] Obaida. Al-Hazaimeh, " Increase the Security Level for Real-Time Application Using New Key Management Solution", International Journal of Computer Science Issues(IJCSI), Vol. 9, Issue 3, 2012. [16] L. Chang-Doo, C. Bong-Jun, P. Kyoo- Seok (2004), “Design and evaluation of a block encryption Algorithm using dynamic-key mechanism”, Future Generation Computer Systems 20, 327–338. Authors Obaida Mohammad Awad Al-Hazaimeh received the B.S. degree in Computer Science from Applied Science University (ASU), Jordan in 2004, the MSc in Computer Science/ Distributed system from University Science Malaysia (USM), 2005, and PhD in Computer Science/ Network security (Cryptography) for Real-Time Application (VoIP), 2010. 103