A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.
|
|
- Giles Maxwell
- 8 years ago
- Views:
Transcription
1 A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi, India Abstract : The world of digital communications is expanding day by day, For secure communications over the unsecure mediums, Cryptography plays a crucial role and Symmetric algorithms do the real part of encoding data before transmission. The deep analysis of their security and speed become the necessity of safe digital communication. In this paper, we study the two popular symmetric cryptographic algorithms BLOWFISH and CAST. We analyze their security issues and then compare their efficiency for encrypting text, image and sound with the official encryption standard AES(Advanced Standard) across different widely used Operating Systems like dows XP, dows and dows 7. The simulation results reveal Which algorithm performs better on Which Operating system for encrypting What kind of data. Keywords: BLOWFISH, CAST, Symmetric. 1 Introduction Cryptography is the art and science of encoding data so that it can travel to any place without threat of being theft in the way. This science is basically categorized in two categories : Symmetric and Asymmetric. Symmetric Cryptography is to encode and decode data with one and the same key whereas Asymmetric Cryptography works with a pair of key, one key is to encode the data and with the other we can decode. Further Symmetric Ciphers are of two kinds : Block and Stream. Block ciphers encrypts a fixed block of bits at a time and Stream ciphers encrypts bit by bit. Block ciphers are one of the fundamental building blocks for cryptographic systems[1]. The life cycle of Symmetric Cryptography mainly starts from the birth of DES(Data Standard). In 1977,IBM s submission LUCIFER (Feistel), adopted as DES[2] by NBS(National Bureau of Standards) now NIST( National Institute of Standards and Technology). Since its evolution, many cryptanalysts have attempted to break it and finally DES encrypted message was cracked in only 22 hours in Then again there was a need of a new encryption standard, NIST put out a call and 15 algorithms were selected as the first round finalists,cast was one of them. In second round out of 5 one was Twofish which is the descendant of Blowfish. Finally, Rijndael won the competition and become AES(Advanced Standard) in 2001[3]. In this paper we do the comparative analysis of Blowfish and CAST with the AES on different latest platforms like dows XP, dows and dows7. This analysis shows which algorithm is best suited in which environment. The rest of the paper is organized as follows: section II gives the brief review of the algorithms and discuss their security issues; section III outlines the related work ; section IV describes the implementation details and shows the simulation results; finally, the conclusions and future work is followed in section V. 2 Overview of Algorithms 2.1 Blowfish Blowfish was designed in 1994 by Bruce Schneier, it works on 64-bit units with key lengths from 32-bits up to 448-bits [4].Each 64-bit block is divided into two 32-bit words, it encrypts every block by performing 16 rounds of encryption. Basically the algorithm consists of two parts: a key-expansion part and a data- encryption part. Key expansion converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. The time-consuming subkeygeneration process adds considerable complexity for a brute-force attack. The subkeys are too long to be
2 stored on a massive tape, so they would have to be generated by a brute-force cracking machine as required. Exhaustive search of the keyspace could be the effective way of breaking it, because designer himself admit the existence of weak keys. But so far no one has succeeded in breaking full strength Blowfish encryption. It is unpatented and licensefree, means Blowfish is a fast, secure and free alternative encryption method. 2.2 CAST CAST is the first round finalist of AES competition. It is developed by Carlisle Adams and Stafford Taveres in canada, it uses 64-bit block for 64-bit and 128-bit key size variants and 128-bit block sizes for the 256-bit key version. The complete specification of CAST algorithm is given in [5]. It uses an f-function that produces a 32-bit output from a 32-bit input, and each round consists of modifying one 32-bit quarter of the block by XORing it with the f-function of another 32-bit quarter of the block. There are 48 rounds in total, which are organized in groups of four, called quadrounds. begins with six forwards quadrounds, and then continues with six reversed quadrounds, which are reversed exactly as would be necessary for decryption. Means, for decrypting data, it is only necessary to change the order in which the subkeys are used. CAST cipher can be broken up to only 5-round. However, if the degree of the round function is lower, the CAST cipher could be broken up to more number of rounds[6]. CAST encryption procedure has been under rigorous analysis among cryptanalysts for the last 10 years. Minor weaknesses have been found like non-surjective attack, HOD attack but nothing extendable beyond 5-6 rounds. 2.3 AES AES has Non-Feistel structure, based on a sophisticated mathematical design. It s simple structure attracts cryptographers and cryptanalysts. It encrypts 128 bit block size with 128/192/256 bit key for 10/12/14 rounds. The complete specification and the above structure of AES encryption scheme is given in [3]. No one can break it beyond 5-6 rounds with today s computational power. 3 Related Work In research of [7-8] CAST ciphers with random S- boxes are proposed. It is shown that when randomly generated S-boxes are used, the resulting cipher is resistant to both differential and linear attack. A Crypto++ Library [9] analyze some common encryption algorithms. It showed that Blowfish and AES have the best performance compared with other encryption algorithms. Nadeem and Kader, did performance evaluation of few symmetric encryption algorithms like AES, DES, and 3DES, RC6, Blowfish and RC2. They concluded from the simulation results that Blowfish has better performance as compared to other encryption algorithms for different file size, followed by RC6. AES has better performance than RC2, DES, and 3DES. 3DES still has low performance compared to algorithm DES. RC2 is the slowest. However they conducted the experiments on only one platform: dows [10-11]. Krishnamurthy in [12] demonstrated the energy consumption of different common symmetric key encryptions on hand-held devices. Salama and Elminaam have done a comparison between encryption algorithms (AES, DES, and 3DES, RC2,Blowfish, and RC6) at different settings like different sizes of data blocks, different data types, CPU time, and different key size. The algorithms were tested on two different hardware platforms. The results indicated that the Blowfish had more efficient compared to other algorithms. And AES had a better performance than 3DES and DES[13]. The study in[14] tested the encryption algorithms such as RC4, AES and XOR to find out the overall performance of real time video streaming. The results showed that AES has less time ovrhead than the overhead using RC4 and XOR algorithm. So, AES is more efficient to secure real time video transmissions. Most of the above parallel research focus on performance analysis of different symmetric encryption algorithms on different settings for various kinds of input data with different modes. In this paper, we are analyzing Blowfish and CAST on 3 different Operating Systems for encrypting 3 kinds of data :text,image and sound.
3 4 EXPERIMENTAL DESIGN We implemented the algorithms according to their standard specifications in.net environment using C#, and a tool has designed, which calculates the encryption time in ms(milli seconds) of each algorithm.the no. of different types of files like text file, images and audio files have been encrypted with the designed tool and their execution time is calculated. CAST AES Figure 1: Execution speed for encrypting text data: Comparison between different For our experiment, we use three laptops of 32bit configuration: 1. Intel Pentium Dual Core with dows XP. 2. Intel Pentium Dual Core with dows. 3. Intel Pentium Dual Core with dows 7. The tool s front end look like as: Table 2: Speed ( in KB/sec) of BLOWFISH, CAST and AES on different for image data XP 7 BLOWFISH We encrypt 60 text files of size ranges between 500KB to 50MB, 60 images ranges between 20 KB to 200KB, 60 audio files ranges between 2-50MB. First we tabulated their encryption time in ms(milli seconds) and then calculated their mean execution speed in MB/sec (MegaBytes per second). CAST AES Table 1: Speed ( in MB/sec) of BLOWFISH, CAST and AES on different for text data XP 7 BLOWFISH
4 Figure 2: Execution speed for encrypting image data: Comparison between different Figure 3: Execution speed for encrypting audio data: Comparison between different Table 3: Speed ( in KB/sec) of BLOWFISH, CAST and AES on different for audio data do ws XP 7 BLOWFISH CAST AES Conclusion For Text data : All algorithms run faster on dows XP, but Blowfish is the most efficient and CAST runs slower than AES. For Image data : Blowfish encrypts images most efficiently on all 3 platforms, even CAST runs faster on dows XP than AES. But on dows and dows7, AES and CAST perform at the similar speed. For Sound data: CAST performs better than BLOWFISH and AES on dows XP for encrypting audio files, but on dows and dows7, there is no significant difference in performance of CAST and AES, however BLOWFISH encrypts audio filles at less speed. In future, we try to incorporate good features of BLOWFISH and CAST in a single algorithm, which can perform well on all latest platforms for all types of data. References [1] B.Schneier, Practical Cryptography,Wiley, [2] W. Diffie, M. Hellman, Exhaustive cryptanalysis of the NBS data encryption standard, Computer, p , June [3]. J. Daemen and V. Rijmen, AES Proposal: Rijndael,1999.
5 [4]. B. Schneier, "The blowfish encryption algorithm -one year later," Dr. Dobb 's Journal, [5]. C.M.Adams, The CAST-128 Algorithm," Request for Comments (RFC) 2144, NetworkWorking Group, Internet Engineering Task Force, May, [6]. Shiho Moriai, Takeshi Shimoyama, Higher Order Differential Attack of a CAST Cipher, S. Vaudenay (Ed.): Fast Software FSE'98, LNCS 1372, pp , 1998, Springer-Verlag Berlin Heidelberg [7]. H.M.Heys and S.E.Tavares, On the security of the CAST encryption algorithm",canadian Conference on Electrical and Computer Engineering, pp , [8] J. Lee, H. Heys, and S.Tavers, Resistance of a CAST-like Algorithm to Linear and Differential Cryptanalysis, Designs, Codes, and Cryptography,vol. 12,no.3,pp ,1997. [9]. Results of Comparing Tens of Algorithms Using Different SettingsCrypto++ Benchmark, Retrieved Oct. 1, ( [10]. A. Nadeem and M. Y. Javed, A performance comparison of data encryption algorithms,"information and Communication Technologies, ICICT 2005, pp.84-89, [11]. W.S.Elkilani, "H.m.Abdul-Kader, "Performance of Techniques forreal Time Video Streaming, BIMAConference, Jan 2009, PP [12]. N. Ruangchaijatupon and P. Krishnamurthy, and power consumption in wireless LANs-N,"The Third IEEE Workshop on Wireless LANs, pp ,Newton, Massachusetts, Sep ,2001. [13] D. Salama, A. Elminaam and etal, "Evaluating The Performance of Symmetric Algorithms", International Journal of Network Security, Vo1.10, No.3, PP , May2010. [14] W.S.Elkilani, "H.m.Abdul-Kader, "Performance of Techniques forreal Time Video Streaming, BIMAConference, Jan 2009, PP
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
More informationA PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
More informationEvaluating The Performance of Symmetric Encryption Algorithms
International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,
More informationHow To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
More informationKeywords Web Service, security, DES, cryptography.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Provide the
More informationEnhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
More informationAStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationA Secure Software Implementation of Nonlinear Advanced Encryption Standard
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) ISSN: 2319 4200, ISBN No. : 2319 4197 Volume 1, Issue 5 (Jan. - Feb 2013), PP 44-48 A Secure Software Implementation of Nonlinear Advanced Encryption
More informationCSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
More informationSplit Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
More informationImplementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
More information1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
More informationA PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition
More informationNetwork Security - ISA 656 Introduction to Cryptography
Network Security - ISA 656 Angelos Stavrou September 18, 2007 Codes vs. K = {0, 1} l P = {0, 1} m C = {0, 1} n, C C E : P K C D : C K P p P, k K : D(E(p, k), k) = p It is infeasible to find F : P C K Let
More informationNetwork Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
More informationHow To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
More informationAN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
More information7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
More informationBlock encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015
CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret
More informationThe Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore hongjun@i2r.a-star.edu.sg Abstract. In this report, we point out a serious security flaw in Microsoft
More informationUsing ASP-Based Message Encryption Project To Teach Information Security Concepts
Using ASP-Based Message Encryption Project To Teach Information Security Concepts Qidong Cao College of Business Administration, Winthrop University Rock Hill, SC 29733, USA caoq@winthrop.edu John S. Davis
More informationCryptography and Network Security Block Cipher
Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit
More informationLecture 4 Data Encryption Standard (DES)
Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map n-bit plaintext blocks to n-bit ciphertext blocks (n = block length). For n-bit plaintext and ciphertext blocks and a fixed key, the encryption
More informationEXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
More informationA NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies Alaa_hamami@yahoo.com Dr. Mohammad Alaa Al-
More informationCCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA
Journal of Computer Science Original Research Paper CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA 1 Velayutham, R. and 2 D. Manimegalai
More informationCryptography and Network Security Chapter 3
Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon
More informationThe Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) All of the cryptographic algorithms we have looked at so far have some problem. The earlier ciphers can be broken with ease on modern computation systems. The DES
More informationNetwork Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
More informationThe Advanced Encryption Standard: Four Years On
The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The
More informationGridCrypt: High Performance Symmetric Key Cryptography using Enterprise Grids
GridCrypt: High Performance Symmetric Key Cryptography using Enterprise Grids Agus Setiawan, David Adiutama, Julius Liman, Akshay Luther and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory
More informationCryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
More informationIT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
More informationEncryption VIDEO COMMUNICATION SYSTEM-TECHNICAL DOCUMENTATION
Encryption PCS-1/1P Ver.3.20 or later PCS-11/11P Ver.3.20 or later PCS-HG90 Ver.2.00 or later PCS-G50/G50P Ver.2.21 or later PCS-G70/G70P Ver.2.21 or later PCS-TL30 Ver.1.04 or later PCS-TL33 All PCS-TL50
More information6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure
More informationDeveloping and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
More informationCryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.
Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.edu Overview Cryptanalysis Challenge Encryption: DES AES Message
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationSecret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
More informationKy Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
More informationSECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
More informationELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions
Assignment ELECTENG702 Advanced Embedded Systems Improving AES128 software for Altera Nios II processor using custom instructions October 1. 2005 Professor Zoran Salcic by Kilian Foerster 10-8 Claybrook
More informationLecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We
More informationMulti-Layered Cryptographic Processor for Network Security
International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 Multi-Layered Cryptographic Processor for Network Security Pushp Lata *, V. Anitha ** * M.tech Student,
More informationCIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
More informationA Comparison of the 3DES and AES Encryption Standards
, pp.241-246 http://dx.doi.org/10.14257/ijsia.2015.9.7.21 A Comparison of the 3DES and AES Encryption Standards Noura Aleisa n.aleisa@seu.edu.sa Abstract A comparison of two encryption standards, 3DES
More informationHow To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
More informationThe Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
More information1. INTRODUCTION. Keywords SMS, GSM network, electrical device, encryption, control.
Secure Control of Remote Electrical Devices Using Mobile SMS Services Kishor T. Mane 1, G.A. Patil 2 1. Asst. Professor, 2. Head and Asst. Professor D. Y. Patil college of Engg. & Tech. Kolhapur, Maharashtra,
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationCLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
More information802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
More informationNetwork Security. Omer Rana
Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption
More informationIntroduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.
Introduction Within the last ten years, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has
More informationCloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm
Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish algorithm G.Devi 1, M.Pramod Kumar 2 1 M.Tech(CSE),devi.gujjula9@gmail.com,Sri Vasavi Engineering College, Tadepalligudem
More informationThe 128-bit Blockcipher CLEFIA Design Rationale
The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007 Sony Corporation NOTICE THIS DOCUMENT IS PROVIDED AS IS, WITH NO WARRANTIES WHATSOVER, INCLUDING ANY WARRANTY OF MERCHANTABIL-
More informationIntegrating basic Access Control Models for efficient security along with encryption for the ERP System
Integrating basic Access Control Models for efficient security along with encryption for the ERP System Prof. Swapnaja A. Ubale Research Scholar (Computer Science & Engineering Department) Research Center
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationEncryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
Encryption Quality Analysis and Security Evaluation CAST-128 Algorithm and its Modified Version using Digital s Krishnamurthy G N, Dr. V Ramaswamy Abstract this paper demonstrates analysis well known block
More informationIJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
More informationMessage Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
More informationFile System Encryption in C#
INTEGRATED FILE-LEVEL CRYPTOGRAPHICAL ACCESS CONTROL Abstract Ryan Seifert ryanseifert@earthlink.net T. Andrew Yang Yang@UHCL.edu Division of Computing and Mathematics University of Houston - Clear Lake,
More informationA Novel Approach to combine Public-key encryption with Symmetric-key encryption
Volume 1, No. 4, June 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ A Novel Approach
More informationData Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
More informationSeChat: An AES Encrypted Chat
Name: Luis Miguel Cortés Peña GTID: 901 67 6476 GTG: gtg683t SeChat: An AES Encrypted Chat Abstract With the advancement in computer technology, it is now possible to break DES 56 bit key in a meaningful
More informationlundi 1 octobre 2012 In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal
Symmetric Crypto Pierre-Alain Fouque Birthday Paradox In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal N=365, about 23 people are
More informationImproving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES
Improving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES K Anjaneyulu M.Tech Student, Y.Chalapathi Rao, M.Tech, Ph.D Associate Professor, Mr.M Basha,
More informationHASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
More informationHow encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
More informationAES1. Ultra-Compact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications
General Description The AES core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. Basic core is very small (start at 800 Actel tiles). Enhanced versions
More informationEFFECTIVE AES IMPLEMENTATION
International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-09, Article ID: IJECET_07_01_001 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=7&itype=1
More informationDesign and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,
More informationPerformance Analysis of Most Common Encryption Algorithms on Different Web Browsers
I.J. Information Technology and Computer Science, 12, 12, 60-66 Published Online November 12 in MECS (http://www.mecs-press.org/) DOI:.5815/ijitcs.12.12.06 Performance Analysis of Most Common Encryption
More informationA Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam (f.fatemi@ieee.org) Omidreza Karimi (omid@medicatak.com.my) Dr. Ma en T. Alrashdan (dr.maen@apu.edu.my)
More informationPerformance differences in encryption software versus storage devices
Examensarbete Performance differences in encryption software versus storage devices Author: Robin Olsson Email: ro222ae@student.lnu.se Supervisor: Martin Fredriksson Semester: VT12 Course code: 1DV41E
More information6 Data Encryption Standard (DES)
6 Data Encryption Standard (DES) Objectives In this chapter, we discuss the Data Encryption Standard (DES), the modern symmetric-key block cipher. The following are our main objectives for this chapter:
More informationDesign and Implementation of Asymmetric Cryptography Using AES Algorithm
Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,
More informationEvaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
More informationSecure Data Transmission using Blowfish Algorithm
Secure Data Transmission using Blowfish lgorithm Panem.Charan rur 1, M. Sai Chandrasekhar 2, S.Sai Sreeram 3, K.RamKishore 4, S.Venu gopal 5, 1 ssistant professor, 2 UG Students[ B.Tech] Dept. of ECE,
More informationKeywords : complexity, dictionary, compression, frequency, retrieval, occurrence, coded file. GJCST-C Classification : E.3
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 4 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationModern Block Cipher Standards (AES) Debdeep Mukhopadhyay
Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -721302 Objectives Introduction
More informationCRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
More informationA New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 2, February 2015, PP 18-27 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org A
More informationNovel Approach to Ensure Data Security in Cloud Computing
Volume-8, Number-2 Jan-Jun 2015 pp. 99-114 Novel Approach to Ensure Data Security in Cloud Computing Sonia Bassi 1, Anjali Chaudhary 2 1 M.Tech Student, Department Of Computer Science, KITM, Kurukshetra
More informationSecuring Data at Rest ViSolve IT Security Team
Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1
More informationBattery Power-aware Encryption
Abstract 1 Minimizing power consumption is crucial in battery power limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption
More informationEffective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India sd_patil057@rediffmail.com Modern College of Engineering,
More informationRC6. Marcel Felipe Weschenfelder
RC6 Marcel Felipe Weschenfelder Introduction Operations Algorithm Performance Crypto analyse Highlight/lowlight Conclusion References Agenda RC6 Introduction Designed by: Ron Rivest, Matt Robshaw, Ray
More informationPassword-based encryption in ZIP files
Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of
More informationHardware Implementation of AES Encryption and Decryption System Based on FPGA
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based
More informationCommon Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting shayz@comsecglobal.com Copyright 2006 - The OWASP
More informationA NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA
A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA ABSTRACT Obaida Mohammad Awad Al-Hazaimeh Department of Information Technology, Al-balqa Applied University, AL-Huson University College, Irbid,
More informationSandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology s.mahapatra15101987@gmail.com
Computing For Nation Development, March 10 11, 2011 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi A Comparative Evaluation of Various Encryptions Techniques Committing
More informationEfficient Parallel Data Processing For Resource Sharing In Cloud Computing
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 2, Issue 3 (July-Aug. 2012), PP 01-05 Efficient Parallel Data Processing For Resource Sharing In Cloud Computing R.Balasubramanian
More information2. Securing Transactions
INVESTIGATING THE EFFICIENCY OF CRYPTOGRAPHIC ALGORITHMS IN ONLINE TRANSACTIONS C. Lamprecht 1 A. van Moorsel P. Tomlinson N. Thomas School of Computing Science, University of Newcastle upon Tyne, UK Abstract
More informationENERGY EFFICIENT SECURITY FRAMEWORK FOR WIRELESS LOCAL AREA NETWORKS
ENERGY EFFICIENT SECURITY FRAMEWORK FOR WIRELESS LOCAL AREA NETWORKS by Phongsak Kiratiwintakorn B.Eng. of Electrical Engineering, King Mongkut s Institute of Technology, Ladkrabang, 1996. M.S. of Electrical
More informationAES Cipher Modes with EFM32
AES Cipher Modes with EFM32 AN0033 - Application Note Introduction This application note describes how to implement several cryptographic cipher modes with the Advanced ion Standard (AES) on the EFM32
More informationSalsa20/8 and Salsa20/12
Salsa20/8 and Salsa20/12 Daniel J. Bernstein Department of Mathematics, Statistics, and Computer Science (M/C 249) The University of Illinois at Chicago Chicago, IL 60607 7045 snuffle@box.cr.yp.to Introduction.
More information