Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers



Similar documents
Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

Evaluating The Performance of Symmetric Encryption Algorithms

Implementation of Full -Parallelism AES Encryption and Decryption

Performance Analysis of Web-browsing Speed in Smart Mobile Devices

The Misuse of RC4 in Microsoft Word and Excel

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

A Study of New Trends in Blowfish Algorithm

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Keywords Web Service, security, DES, cryptography.

ELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

Three attacks in SSL protocol and their solutions

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

GrandView. Web Client Software Requirements and Recommendations. Revision

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

Load Testing on Web Application using Automated Testing Tool: Load Complete

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

Installation and usage of SSL certificates: Your guide to getting it right

Using etoken for SSL Web Authentication. SSL V3.0 Overview

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Cryptography and Network Security

Keywords- Cloud Computing, Android Platform, Encryption, Decryption, NTRU, RSA, DES, throughput.

Browser Performance Tests We put the latest web browsers head-to-head to try to find out which one is best!

Browser Performance Tests We put the latest web browsers head-to-head to try to find out which one is best!

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Network Security Part II: Standards

Contents Overview of RD Web Access What is RD Web Access?... 2 What are the benefits of RD Web Access versus thin client?...

LabStats 5 System Requirements

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Properties of Secure Network Communication

Home Station ADSL. You may also use the following address (regardless of whether you have changed the primary address or not):

Sage MAS 200 ERP Level 3.71 Version 4.30 Supported Platform Matrix

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Split Based Encryption in Secure File Transfer

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

(C) Global Journal of Engineering Science and Research Management

Cleaning Encrypted Traffic

Performance evaluation of wireless networks speed depending on the encryption

Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network

Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach

How To Encrypt With A 64 Bit Block Cipher

Citrix Introduction and FAQs

Chapter 17. Transport-Level Security

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

User Manual Version p BETA III December 23rd, 2015

Integrating basic Access Control Models for efficient security along with encryption for the ERP System

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Wireless LAN Security Mechanisms

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Cryptography and Network Security Chapter 3

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

1. PRODUCT OVERVIEW PRODUCT COMPONENTS... 3

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Data Integrity by Aes Algorithm ISSN

Manual Wireless Extender Setup Instructions. Before you start, there are two things you will need. 1. Laptop computer 2. Router s security key

How To. Simply Connected. XWR-1750 Basic Configuration INTRODUCTION

MultiSite Manager. Setup Guide

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

inforouter V8.0 Server & Client Requirements

WebEx. Remote Support. User s Guide

Minimum Computer System Requirements

Secure Network Communication Based on Text-to-Image Encryption

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

MultiSite Manager. Setup Guide

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

TrustKey Tool User Manual

ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING

How To Use Exchange Reporter Plus On A Microsoft Mailbox On A Windows (Windows) On A Server Or Ipa (Windows 7) On An Ubuntu 7.6 (Windows 8) On Your Pc Or

CSCE 465 Computer & Network Security

How SafeVelocity Improves Network Transfer of Files

Network Projector Operation Guide

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Configuration Guide. Websense Web Security Solutions Version 7.8.1

Transcription:

I.J. Information Technology and Computer Science, 12, 12, 60-66 Published Online November 12 in MECS (http://www.mecs-press.org/) DOI:.5815/ijitcs.12.12.06 Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers G. Ramesh Research Scholar, Research and Development Centre, Bharathiyar University, Coimbatore mgrameshmca@yahoo.com R. Umarani, Dr. Associate Professor in Computer Science, Sri Saradha college for women, Salem -16 umainweb@gmail.com Abstract The hacking is the greatest problem in the wireless local area network (WLAN). Many algorithms like,,,, and have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user correctly. We have proposed a Web programming language to be analyzed with five Web browsers in term of their performances to process the encryption of the programming language s script with the Web browsers. This is followed by conducting tests simulation in order to obtain the best encryption algorithm versus Web browser. The results of the experimental analysis are presented in the form of graphs. We finally conclude on the findings that different algorithms perform differently to different Web browsers like Internet Explorer, Mozilla Firefox, Opera and Netscape Navigator. Hence, we now determine which algorithm works best and most compatible with which Web browser. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as encryption/decryption speed in the different web Browsers. Experimental results are given to demonstrate the effectiveness of each algorithm. Index Terms Ur5, Encryption, Algorithms, Web Browsers, Data Security I. Introduction Encryption is the process of converting plain text unhidden to a cryptic text hidden to secure it against data thieves. This process has another part where cryptic text needs to be decrypted on the other end to be understood. Fig.1 shows the simple flow of commonly used encryption algorithms [1]. Fig. 1: Encryption-Decryption Flow Wireless Local Area Network (WLAN) is one of the fastest-growing technologies. The demand for connecting devices without the use of cables is increasing everywhere. WLAN is found in the office buildings, and in many other public areas. The security in WLAN is based on cryptography, the science and art of transforming messages to make them secure and immune to attacks by authenticating the sender to receiver within the WLAN. The cryptography algorithms are divided into two groups: symmetric-encryption algorithms and asymmetric-encryption algorithms. There are a lot of symmetric-encryption algorithms used in WLAN, such as [2], T [3], [4], and [5],[7], and [8]. In all these algorithms, both sender and receiver have used the same key for encryption and decryption processes respectively. The outside attackers use the fixed plaintext and encrypted text to obtain the key used in the WLAN. II. Conceptual Framework In this study, we have proposed only one Web programming language script to be analyzed with five

Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers 61 Web browsers in order to determine which type of algorithm is suitable to which type of Web browser in terms of their performance and compatibility. Active Server Pages (ASP), has been selected and six different types of encryption algorithms have been chosen to be analyzed to observe their performance. The encryption algorithms selected are,,,, and. These encryption algorithms are known to be able to support 128-bit key size. Furthermore, the six types of algorithms will be co-analyzed with the five selected Web browsers that are able to process its scripts effectively and in an efficient manner. Fig. 2: Different web browsers available in the market. There are quite a number of Web browsers that are available in the market, but these five are known to be among the top and most popular. They are Internet Explorer, Mozilla Firefox, Opera, Netscape Navigator and Google Chrome. From the analysis, we hope to find out the most perfect web browsers that can match in the best possible way with the encryption algorithms for ASP scripts[9]. III. Methodology Before implementing an encryption algorithm, we need to understand the principle behind the encryption i.e. to secure data held within a message or file and to ensure that the data is unreadable to others. The unencrypted message or file is often referred to as Plaintext, and the encrypted message or file is referred as Cipher text. In encryption, it consists of key length in number of bits. A key is a long sequence of bits used by encryption algorithms. Thus, the length of the key determines the probabilities if one ought to figure it out all its possible key values. The commencement of the encryption process begins after the authorization to use the system has been obtained, only then that the information inputted be submitted. In order not to be intercepted by offender along the way, the text must first be encrypted prior to storage using the encryption secret codes along with its key known only to the sender and the receiver. For the receiver to be able to read it, the data has to be decrypted simply by reversing the process using the given key. Asymmetric encryption techniques are almost 00 times slower than Symmetric techniques, because they require more computational processing power. The most common encryption algorithms are listed below: : is a block cipher.it has variable key length of 128, 192, or 256 bits; default 256. It encrypts data blocks of 128 bits in, 12 and 14 round depending on the key size. encryption is fast and flexible; it can be implemented on various platforms especially in small devices. Also, has been carefully tested for many security applications[4]. : The Data Encryption Standard was the first encryption standard to be recommended by NIST (National Institute of Standards and Technology). is (64 bits key size with 64 bits block size). Since that time, many attacks and methods recorded the weaknesses of, which made it an insecure block cipher [2]. Fig. 3: Overview of the field of Cryptography

62 Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers is an enhancement of ; it is 64 bit block size with 192 bits key size. In this standard the encryption method is similar to the one in the original but applied 3 times to increase the encryption level and the average safe time. It is a known fact that is slower than other block cipher methods [3]. : The was designed by Ramesh G and R.Umarani in the year. This algorithm uses a key size of 512-bits to encrypt a plaintext of 512-bits during the 16-rounds. In this Algorithm, a series of transformations have been used depending on S-BOX, different shift processes, XOR-Gate, and AND-Gate. The S-Box is used to map the input code to another code at the output. It is a matrix of 16 X 16 X 16. The S-Box consists of 16-slides, and each slide having 2-D of 16 x16. The numbers from 0 to 255 are arranged in random positions in each slide[7]. :This algorithm was designed by G.Ramesh and Dr. R. Umarani in the end of the year. A block encryption algorithm is proposed in this approach. In this Algorithm, a series of transformations have been used depending on S-BOX, XOR Gate, and AND Gate. The algorithm encrypts a plaintext of size 64-bits by a key size of 64-bits. It uses eight rounds for encryption or decryption process. It overcomes some drawbacks of the other algorithms. It is more efficient and useable for the Wireless Local Area Network because it avoids the using of the same key with other packets within a message. The algorithm is simple and helpful in avoiding the hackers. S-BOX generation is the backbone of this algorithm. It has eight columns and 256 rows; each element consists of 8-bits. It replaces the input by another code to the output.[8]. IV. Comparison of Desktop Web Browser Speed Test We tend to find that different browsers (like different and latest versions like Chrome 17 vs Firefox vs IE9 vs Opera 11 and Netscape Navigator) have different strong advantages and disadvantages over one another, but as with a lot of things in life; one of the key characteristics of a good browser is pure unadulterated speed. Different latest version of web browsers used in this research. Google Chrome 17 has recently been released which features a new pre-rendering feature for faster page loading as well as integrating increased malware detection which checks every file downloaded to our machine for pestilence. The Firefox and Opera browsers have also recently launched new versions which have dramatically increased page loading times with Firefox being publicly released and then version 11 entering beta not long after. The first test focuses on how long it takes each browser to launch from the time the user decides to open it until it appears on our display, ready for action. The test had been slightly changed from previous versions, and is only timed up until it is ready for user communication. The graphics show that Chrome was unquestionably faster with Internet Explorer in second place followed by Opera and finally Firefox which lagged behind by approximately one second. Fig. (3a): Browsers Cold Start time comparison The second test was all about how quickly each browser could open up with ten tabs enabled with each tab containing a different URL with varying content ranging from the LifeHacker website to Facebook and Hulu. Having nine tabs open from the beginning will obviously place an increased load on the browser but Opera seemed to have no problems at all as it finished the processing task miles ahead of the competition with IE and Firefox achieving the objective at the same rate and Chrome surprisingly being a distant fifth place[13].

Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers 63 Fig. (3b): Browser tab Loading Comparison This paper is organized as follows. Related work is described in Section 4. The proposed experimental design is described in section 5. Performance analysis are shown in section 6. Results are shown in 7.Finally the conclusions are in section 8. V. Experimental Design For our experiment, we use two Desktop system IV 2.4 GHz CPU, in which performance data is collected. The two Desktop computers (sender and receiver) had windows XP professional installed on it. The two Desktop Computer (sender and receiver) is connected to a router. See fig 3c. In this study, we have proposed only one Web programming language script to be analyzed with five Web browsers in order to determine which type of algorithm is suitable to which type of Web browser in terms of their performance and compatibility. Active Server Pages (ASP), has been selected and six different types of encryption algorithms have been chosen to be analyzed to observe their performance. There are quite a number of Web browsers that are available in the market, but these five are known to be among the top and most popular. They are Internet Explorer, Mozilla Firebox, Opera and Netscape Navigator and Google Chrome. From analysis, we hope to find out the most perfect web browsers that can match in the best possible way with the encryption algorithms for ASP scripts [9]. PC1: Intel(R) Pentium(R) 4 CPU 2.8GHz, and 1GB of RAM with a 54M Wireless USB Adapter of BELKIN PC2: Intel(R) Pentium(R) 4 CPU 2GHz, and 128MB of RAM with a 54M Wireless USB Adapter of BELKIN Fig. (3c): Wireless LAN (infrastructure mode) In the experiments, the laptop encrypts a different file size ranges from K byte to 0.06 Mega Byte. The encryption time is considered the time that an encryption algorithm takes to produce a cipher text from a plaintext. Encryption time is used to calculate the throughput of an encryption scheme. It indicates the speed of encryption. VI. Performance Analysis In order to verify which of the six encryption algorithms perform better to the five Web browsers mentioned earlier, a test have been conducted using two desktop computers that have been setup and dedicated as Client and Server via a router. Encryption testing is to test the performance of six encryption algorithms in encrypting a set of text and key via Web browsers for ASP scripts. Thus, the text length starting at will be increasing five times its initial characters, whereas the key length for each text length remains unchanged. VII. Experimental Results The outcome of the testing will project the response time i.e. the encryption process and the time taken of the five Web browsers namely Internet Explorer, Mozilla Firefox, Opera and Netscape Navigator and Google Chrome after performing the encrypting scripts

Encryption Algorithms Encryption Algorithms Encryption Algorithms 64 Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers timed in millisecond onto the computer screen. Fig. 4 to Fig. 8 were the test results after having increased the text length for each encryption algorithms for the five Web browsers by characters, where it had been observed and noted of their performance results. Fig. 4 illustrates the result of Internet Explorer and its Text Length versus Response Time. From the analysis, performs better compared to others and sustain almost lower response time. The is better than algorithm. Internet Explorer 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 Response Time in ms Fig. 4 Internet Explorer s Text Length vs. Response Time Fig. 5 illustrates the result of Mozilla Firefox and its Text Length versus Response Time. From the analysis, yet again performs better compared to others and just about sustaining lower response time. It does however perform less at and Text Length with a couple of algorithm namely and. Mozilla FireFox 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 Response Time in ms Fig. 5: Mozilla Firefox s Text Length vs. Response Time Fig. 6 illustrates the result of Opera and its Text Length versus Response Time. From the analysis, performs slightly less than at the start. But nonetheless, it performs better for the remaining text lengths compared to others in its response time. Opera 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 Response Time in ms Fig. 6: Opera s Text Length vs. Response Time

Encryption Algorithms Encryption Algorithms Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers 65 Fig. 7 illustrates the result of Netscape Navigator and its Text Length versus Response Time. From the analysis, had a good start and performs better compared to others up until Text Length. Unfortunately, it failed to sustain its lower response time, whereby and had outperform in the last two text lengths. Netscape Navigator 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 Respose Time in ms Fig. 7: Netscape Navigator s Text Length vs. Response Time Google Crome Browser 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 Response Time(ms) Fig. 8: Google Chrome s Text Length vs. Response Time Fig. 8 illustrates the result of Google Chrome and its Text Length versus Response Time. From the analysis, had a good start and performs better compared to others up until Text Length. Unfortunately, it failed to sustain its lower response time, whereby and had outperform in the last two text lengths. The following factors are affected the response time of web browsers. 1. Web Browser s version. 2. Depends the operating system installed in the computer. 3. Depends the Computer configuration. VIII. Conclusion In an actual observation, the response time sometimes fluctuates when we ought to run the test twice with an encryption algorithm on the same Web browser using the same text length. This could be due to the network traffic or even the heavy usage of the Server. But in this case, there is only one Client and a Server, hence there should not be any traffic at all as only one Client accessing the Server. Thus, we can safely conclude that it must been caused by the time it takes for the Server to process the ASP script of an algorithm on the Web browser, along with many other processes running at the same time within the Server. This can cause the Central Processing Unit (CPU) usage amounting high, hence slows down the encryption process.

66 Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers Therefore, apart from the network conditions that we are aware of from using Local Area Network (LAN), Wide Area Network (WAN) and Internet, Server also plays an important role for better performance. From our findings, we came to the conclusion that for a onetime run simulation test of an algorithm that performs best on Web browser are as follows: - (i) Internet Explorer Web browser suited for encryption algorithms. (ii) Mozilla Firefox Web browser suited for encryption algorithms. (iii) Opera Web browser suited for encryption algorithms. (iv) Netscape Navigator Web browser suited for encryption algorithms. References [1] William Stallings Network Security Essentials (Applications and Standards), Pearson Education, 04. [2] National Bureau of Standards, Data Encryption Standard, FIPS Publication 46, 1977. [3] ANSI3.6, American National Standard for Information Systems Data Encryption Algorithm Modes of Operation, American National Standards Institute, 1983. [4] Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard." Dr. Dobb's Journal, March 01. [5] S. Contini, R.L. Rivest, M.J.B. Robshaw and Y.L. Yin. The Security of the Block Cipher. Version 1.0. August, 1998. [6] Syed Zulkarnain Syed Idrus1, Syed Alwee Aljunid, Salina Mohd Asi, Suhizaz Sudin, and R. Badlishah Ahmad Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 08 pp.22-25. [7] Ramesh, G. Umarani, R.,: A novel fast encryption algorithm for data security in local area network http://ieeexplore.ieee.org /xpl/ freeabs_all.jsp? arnumber=56707 [8] Ramesh, G. Umarani, R, : A Novel Symmetrical Encryption Algorithm with Fast Flexible and High Security Based on Key Updation, European Journal of Scientific Research ISSN 14-216X Vol.77 No.2 (12), pp.275-292. [9] Paul Morris Desktop Web Browser Speed Test: Chrome 17 vs Firefox vs IE9 vs Opera 11 February 15th, 12 http://www.redmondpie.com/ desktop-web-browser-speed-test-chrome-17-vsfirefox--vs-ie9-vs-opera-11/ [] Ramesh G, Umarani. R, Data Security In Local Area Network Based On Fast Encryption Algorithm,International Journal of Computing Communication and Information System(JCCIS) Journal Page 85-90.. [11] G. Ramesh, Dr. R. Umarani A Novel Symmetrical Encryption Algorithm with High Security Based on Key Updating gopalax Journals, International Journal of Computer Network and Security (IJCNS) Vol. 3 No. 1 pp 57-69, http://www.ijcns.com/pdf/7.pdf [12] G. Ramesh and R. Umarani, Data Security in Local Area Network Based on Fast Encryption Algorithm, Communications in Computer and Information Science,, Volume 89, Part 1, 11-26,http://www.springerlink.com/content/m31 8219h7g66/ [13] Paul Morris,Desktop Web Browser Speed Test: Chrome 17 vs Firefox vs IE9 vs Opera 11, http://www.redmondpie.com/desktop-webbrowser-speed-test-chrome-17-vs-firefox--vsie9-vs-opera-11/ Dr. R. Umarani:- Received her Ph.D., Degree from Periyar University, Salem in the year 06. She is a rank holder in M.C.A., from NIT, Trichy. She has published around papers in reputed journals and national and international conferences. She has received the best paper award from VIT, Vellore, Tamil Nadu in an international conference. She has done one MRP funded by UGC. She has acted as resource person in various national and international conferences. Her areas of interest include information security, data mining, fuzzy logic and mobile computing. G. Ramesh:- He is working as Scholar in Research and development Centre, Bharathiyar University, Coimbatore,India. He has 12 years of experience in both Industrial and academic fields. He has published 21 Papers in International and national journals and 23 papers presented in national and international conferences. His area of Interest includes information security and Wireless Networks.