SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
DOI : 10.5121/ijcnc.2014.6208 89
DIFFERENT DATE BLOCK SIZE USING TO EVALUATE
THE PERFORMANCE BETWEEN DIFFERENT
SYMMETRIC KEY ALGORITHMS
1
Ali M Alshahrani 2
Prof. Stuart Walker
Department of Electronic Systems Engineering, University of Essex,
Wivenhoe Park, Colchester, Essex, UK, C04 3SQ
ABSTRACT
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
KEYWORDS
AES, DES, Blowfish, Encryption and Decryption.
1. INTRODUCTION:
Real time applications (RTA) are a set of technologies that are used to allow multimedia, such as
voice calls, videoconferences to transfer the data from sender to receiver through the Internet
Protocol (IP). There are many reasons that help to appear such services like the low of cost.
Consequently, many companies enroll to this market and develop several of system that are
provide a good quality of service. Recently, the computer and internet network has developing and
that allow to multimedia to be the best choice for most of people to contact.
Sensitive information, financial transactions and political meetings are an example of data
that must have a high level of security. The cryptography system technique has long been
used to ensure this sensitive information can be transmitted in a way that protects them when
they are transported through an unsecured network (e.g. the internet).
To protect the stored data in computing systems, using different security techniques is highly
required such as encryption and decryption technique. By using this security everyone can easily
protect their stored data in computers and during transmission process. For example, data cannot
be read or observed by any other persons with permission. By implementing passwords and data
encryption techniques, many computers will be secured. Translation of data into a form is called as
Data encryption. This is incoherent without a decode mechanism. A password is a secret word or
phrase that gives a user access to a particular program or system [1][2].
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
90
Security techniques are also named as information security. It is able to implement for computers
and networks. Cryptography system is very important to transmit different types of data through
unsecure network such as Internet. Encryption and decryptions are the process that done to move
the data from the sender to receiver but by using a secret key. The procedure of changing the
plain text into cipher text is called as an encryption algorithm. This process is done during the
transfer the data through vulnerable channels and secret key is even used in encryption for the
process of conversion. On the other hand, the process of changing the cipher text into a plain text
is called as decryption algorithm. The procedure accomplished using the secret key. Plain text is
the original text before encryption. After entered a secret key to the plain text, it becomes a cipher
text. The basic aspect of the symmetric algorithm is a secret key, which is used in both decryption
and encryption techniques. But, it needs to maintain secret to avoid the middle attacks to retrieve
the information. The cryptography technique is classified into two types: Asymmetric Algorithm
and Symmetric Algorithm Converting the plaint text into the cipher text by using secret key is
called encryption [3][4][5].
This paper explains the description of symmetric cryptography algorithm survey, performance
analysis and symmetric encryption algorithm between three of the most common algorithms
which are DES, AES and Blowfish. They are implemented in Java to compare the performance
by using different data block size and the standard key length.
2. CRYPTOGRAPHY:
Encryption and decryption systems are defined as a set of algorithms that convert plain text data by
using an agreement key for the cipher text in the sender side (encryption). The decryption process
is done on the receiver side by extracting the key from the data to obtain the plain text again. The
encryption method is considered strong due to several factors: the initialization vectors, the length
and secrecy of the key, the algorithm, and how all of these function simultaneously. Strength, in
terms of encryption, generally signifies the level of difficulty by which it is possible to decipher the
key or algorithm. Thus, decoding a key must involve processing a large number of probable values
in order to attain a value which can be employed so as to decrypt or decode a particular message.
In other words, non-repudiation services, authenticity, confidentiality, and integrity can be
provided by means of a cryptosystem. The basic types of cryptographic systems are symmetric
keys, also called secret keys, or asymmetric keys, also called public keys (see next section) [3][5].
Figure1: Encryption and decryption process.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
91
2.1 The basic types of cryptographic system:
The basic types of cryptographic systems are symmetric keys, also called secret keys, or
asymmetric keys, also called public keys. The idea behind symmetric key systems is for both the
sender and the recipient to have the same key. The sender uses this key in order to encode or
encrypt the information or data, and once more, the recipient utilizes it in order to decrypt the
information or the data[3][6][7]. Figure below shows the Symmetric key:
Figure2: Symmetric technique.
On the other hand, asymmetric cryptographic systems are believed to be far more adaptable and
compliant. Normally, each user holds a public key as well as a private key. Therefore, one key is
used in order to encrypt or encode messages while the other key is utilized to decrypt or decode
the messages [3][6][7]. The figure below shows the asymmetric key procedure.
Figure 3: Asymmetric key
3. BLOCK CIPHER VS. STREAM CIPHER
Block and stream ciphers are considered as symmetric ciphers. In fact, stream ciphers are based
on producing an "unlimited" cryptographic keystream and applying it to encrypt a bit or byte
simultaneously. Conversely, block ciphers operate concurrently on larger pieces of data that is,
blocks, frequently joining blocks in order to provide extra security.
The stream cipher idea is simply to divide the text into relatively unit by unit to allow every block
encoding to be based on numerous preceding blocks. The concept of a block cipher is to divide
the text into fairly bulky blocks, for instance, 128 bits, then to encode every block individually.
Normally, each block encoding is based on at the maximum a block of the former ones. The key
remains unchanged when applied with every block [8][9].
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
92
4. MODE OF OPERATION:
Modes of operations are the algorithms used in a cryptography system with a block cipher
technique to provide security requirements, such as confidentiality and authenticity. The modes
identify the way that data will be encrypted. The standard modes are the Electronic Codebook
(ECB) mode, the Cipher Block Chaining (CBC) mode, the Cipher Feedback (CFB) mode, and the
Output Feedback (OFB) mode [10][11][12].
A. Electronic codebook (ECB):
ECB is a raw cipher that was published in 1981; it provides confidentiality and does not use IV.
The main concept of this mode is to split the message into fixed-length blocks and encrypt each
block independently. In this operation mode, the data are divided into 64-bit blocks, which are
encrypted one at a time. For example, if data are transmitted along the network and any
transmission occurs, it will affect only the blocks that contain the error. The blocks should be
rearranged, and then the data sent. The greatest disadvantages of this encryption technique are,
first, problems being encountered when protecting the affected data from the attack, and second,
this mode being less effective when compared to the remaining modes. However, it is fast and easy
to implement compared with the other modes [10][11][12].
Figure 4: ECB mode encryption and decryption process.
B. Cipher-block chaining (CBC)
The main concept of this mode is that IV is X-ORed with plaintext before encryption and for later
blocks, uses the previous ciphertext as the IV. In order to know the plain text for a particular block,
it is also necessary to know the key and cipher text for the previous block. As the first block is
encrypted but has no previous cipher text, a 64-bit block is used to encrypt the block; this is called
an initialization vector. If any problem occurs during the transmission, the error is forwarded to all
the blocks because each is dependent on the other; thus it will affect the subsequent block. So the
data will not be affected. This operation mode is more secure than the ECB operation mode
[10][11][12].
Figure 5: CBC mode encryption and decryption process.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
93
C. Cipher feedback (CFB):
In this operation mode, the input data are considered as the blocks of input, but not is not necessary
to store the 64 bits of data. First, the 64 bits are stored in the one block called the shift register.
Then, this shift register is considered as an input in plaintext. This block is already set to some
arbitrary values. This cipher text is then passed through the extra components, called M-boxes. The
M-boxes select only certain bits for encryption. This output is in plaintext. This cipher text is again
fed into the shift register, and it acts as an input for the next block. This process is the same as the
CBC, but additional functionalities are added to this system. If any error occurs, it will affect the
subsequent blocks only. Compared to CBC, its performance is slower because of some added
complex functionalities [10][11][12].
Figure 6: CFB mode encryption and decryption process.
D. Output feedback (OFB)
This operation mode is the same as the CBC but there are slight changes in the system
performance. This takes the input into the shift register and sets it to an arbitrary initial value, and
this is then passed into the algorithms. From there, it is passed into the M-boxes. This is the final
output cipher text. This value is X-ORed with the real plain text, and this is the final output. In
CBC and CFB, if any error occurs, it will affect all the subsequent blocks but when in OFB and
once the shift register has been initialized, it will continue to affect all the blocks of the shift
registers. Because each block output does not depend on the previous block, it will not affect the
remaining blocks. However, it is less secure than the CBC and CFB because only the cipher text
and DES cipher text values are needed to find the original plain text; the key is not required
[10][11][12].
Figure 7: OFB mode encryption and decryption process.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
94
5. ENCRYPTION ALGORITHMS:
A. Data Encryption Standard (DES)
DES is one of the block cipher techniques developed by the National Bureau of Standards in the
USA in 1976. It is used for security purposes to protect sensitive, unclassified, and commercial
data by using the 56-bit key and 64-bit block size [13][14].
B. Advanced Encryption Standard (AES) :
AES technology (Rijndael) is a block cipher symmetric algorithm published in 1997 by NIST for
use instead of DES. Generally, the AES standard allows a block size of 128-bits and selects one
key out of three keys, such as 192, 265 and 128-bit keys. AES is used to provide security for data
by encrypting the original data to the cipher data [15][16].
C. Blowfish:
This technique has a 64-bit block size and the length ranges from 32-bits to 448-bits. Blowfish is a
16-bit round Feistel cipher and utilizes the large key dependent S-boxes, which are rigid, and each
line allows 32-bits. These S-boxes allow input of up to 8-bits and give an output of up to 32-bits.
Given that the key length of Blowfish can be extended from 38-bits to 448-bits, this provides more
security for data. The 32-bit key input is separated into four 8-bit quarters and uses one-by-one
quarter as inputs[17][18][19].
6. EXPERIMENTAL METHODOLOGY, RESULT AND ANALYSIS:
The Java environment was used to evaluate the run time performance of three different types of
encryption algorithms (DES, AES and blowfish) and four different types of operations modes. The
aim of the experiment is to calculate each algorithm’s run time speed efficiency to encrypt and
decrypt many blocks of different sizes of text in different modes of operation. The key size of
DES, AES and blowfish are 56, 128 and 128 respectively. While the block sizes are 64 for DES
and 128 for AES and blowfish. The below figure shows the GUI of the Java program.
Figure 8: GUI of the Java program.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
95
RESULT AND ANALYSIS:
The experiment has been done to compare between DES, AES and Blowfish which are consider as
symmetric key cryptography algorithms. Different sizes of data blocks and standards key size used
to evaluate the algorithm's run time speed. 100, 200, 300, 400, 500 and 1000 kb are the data block
size that using in the experiment and the user can choice one of these size or can choice any block
size. The DES key size is 64 and AES and Blowfish are 128 kb.
Figure 9: run time performance speed with ECB mode
0
5
10
15
20
100 200 300 400 500 1000
Time(sec)
Data Block Size (Kb)
DES AES Blowfish
Figure 10: run time performance speed with CBC mode.
CBC requires more processing time than ECB because of its key-chaining feature. However,
compared to ECB, CBC is much better in terms of security.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
96
0
20
40
60
80
100
100 200 300 400 500 1000
Time(Sec)
Data Block Size (Kb)
DES AES Blowfish
Figure 11: run time performance speed with CFP mode.
0
20
40
60
80
100
120
100 200 300 400 500 1000
Time(Sec)
Data Block Size (Kb)
DES AES Blowfish
Figure 12: run time performance speed with OFB mode.
The OFB mode has a different procedure for the security processes because it uses the XOR
operation, and its cipher output is a key stream so it needs more time compared to previous modes.
Finally, as expected, CFB requires less processing time than does OFP.
CONCLUSION:
Performance of the symmetric encryption algorithms DES, AES and Blowfish has been evaluated
for the different modes (ECB, CBC, CFB, and OFB) of encryption and decryption. Key size for
DES algorithm is fixed as 56 bits, AES and Blowfish algorithms have the key size of 128 bits.
Execution time is evaluated by varying different data sizes of 100,200,300,400,500 and 1000 Kb.
The result shows that Blowfish run time is the fastest algorithm compared to AES and DES.
FUTURE WORK:
In future, the work will extend this project to allow the encryption and decryption of all different
types of data, such as image, sound, and video. Then, a new algorithm will be developed that will
fulfil the QoS requirements.
ACKNOWLEDGEMENTS:
I would like to express my very great appreciation to Prof. Walker for his advice and completely
supporting during this paper.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
97
REFERENCES
[1] M. Hil. and G. Zhang, “A Web Services Based Frame work for Voice over IP”, Proceedings of the
30th Euromicro Conference, vol. 10, pp. 258 –264, 2004.
[2] Obaida. Al-Hazaimeh, " Increase the Security Level for Real-Time Application Using New Key
Management Solution", International Journal of Computer Science Issues(IJCSI), Vol. 9, Issue 3,
2012.
[3] D. Stinson," Cryptography Theory and Practice", CRC Press Inc., NY, USA, 1995.
[4] E. Cole, R. Krutz and J. W. Conley," Network Security Bible", Wiley Publishing Inc, 2005.
[5] Katz, Jonathan and Yehuda Lindell (2007).’ Introduction to Modern Cryptography’.
[6] P.C. van Oorschot, A.J. Menezes, and S.A. Vanstone, “Handbook of Applied Cryptography,”CRC
Press, Inc., 1997.
[7] Network Associates, Inc., ‘’ An Introduction to Cryptography.’’, June 2001.
[8] B. Moeller ,‘’Security of CBC Ciphersuites in SSL/TLS: Problems and Countermeasures’’, (May 20,
2004),
[9] William F. Ehrsam, Carl H. W. Meyer, John L. Smith, Walter L. Tuchman, "Message verification and
transmission error detection by block chaining", US Patent 4074066, 1976.
[10] Dworkin M. ‘’ Recommendation for Block Cipher Modes of Operation’, NIST Special Publication
800-38A 2001 Edition.
[11] Biham, Eli and Shamir, Adi, ‘’Differential Cryptanalysis of the Data Encryption Standard’’, Springer
Verlag, 1993. ISBN 0-387-97930-1, ISBN 3-540-97930-1.
[12] Hristof Paar, Jan Pelzl, "Stream Ciphers", Chapter 2 of "Understanding Cryptography, A Textbook
for Students and Practitioners", 2009.
[13] Knudsen, Lars R., The Block Cipher Companion. Springer. ISBN 9783642173417, (2011).
[14] Daemen J, Rijmen V, "The Design of Rijndael: AES – The Advanced Encryption Standard."
Springer, 2002. ISBN 3-540-42580-2.
[15] H Wang ; H Zheng ; B Hu ; H Tang .’’ Improved Lightweight Encryption Algorithm Based on
Optimized S-Box’, Computational and Information Sciences (ICCIS), 2013 Fifth International
Conference.
[16] T Sharma. ; R. Thilagavathy. ‘’ Performance analysis of advanced encryption standard for low power
and area applications’’, Information & Communication Technologies (ICT), 2013 IEEE Conference,
2013 , Page(s): 967 – 972.
[17] B. Schneier, "The blowfish encryption algorithm-one year later," Dr. Dobb 's Journal, 1995.
[18] B Schneier (1993). "Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish).
[19] A. Alabaichi ; F. Ahmad ; R. Mahmod, ‘’ Security analysis of blowfish algorithm’’ Informatics and
Applications (ICIA),2013 Second International Conference.
Authors:
Ali Alshahrani was born in Saudi Arabia in 1982. He received his M.Sc. from University of Essex in 2011.
He is currently PhD student at Essex University, UK, Colchester. His research interests include Network
Security, Image Processing, Mobile Payment and e-learning.
Prof. Stuart D.Walker was born in Dover, U.K., in 1952.He received the B.Sc. (Hons) degree in physics
from Manchester University, Manchester, U.K., in 1973, and the M.Sc. degree in telecommunications
systems and the Ph.D. degree in electronics from Essex University, Essex, U.K., in 1975 and 1981,
respectively. After a period of postdoctoral work at Essex University, he joined the then British Telecom
(BTPlc) Research Laboratories, Martlesham Heath, Ipswich, U.K., in 1982. Initially, he was concerned
with regenerator design issues in submarine optical transmission systems. While at BT Plc, he was jointly
responsible (with Prof. P. Cochrane) for pioneering the unrepeatered-transmission-system concept. In 1987,
he was promoted to head the transatlantic link-repeater group, where he supervised the design and
fabrication of high-reliability integrated circuits. In 1988, he became a Senior Lecturer at Essex University.
There, his research interests included fiber-polarization studies and novel optoelectronic-device
configurations. He then developed an interest in access-network design and construction, where he formed
a specialist research group. In 2003, he was promoted to Reader and to Full Professor in 2004. He has
published over 150 journal and conference papers and has 6 patents granted.

Mais conteúdo relacionado

Mais procurados

Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesJayanth Dwijesh H P
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Jayanth Dwijesh H P
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersIJNSA Journal
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAchovatiyabhautik
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Jayanth Dwijesh H P
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric keyRajat Tripathi
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMINGijwmn
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
 

Mais procurados (19)

Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 

Destaque

On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...IJCNCJournal
 
A fuzzy logic controllerfora two link functional manipulator
A fuzzy logic controllerfora two link functional manipulatorA fuzzy logic controllerfora two link functional manipulator
A fuzzy logic controllerfora two link functional manipulatorIJCNCJournal
 
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...IJCNCJournal
 
Dcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkDcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkIJCNCJournal
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
 
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...IJCNCJournal
 
Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...IJCNCJournal
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networkingIJCNCJournal
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyIJCNCJournal
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ipIJCNCJournal
 
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEOPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEIJCNCJournal
 
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...IJCNCJournal
 
A novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performanceA novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performanceIJCNCJournal
 
ETOR-Efficient Token based Opportunistic Routing
ETOR-Efficient Token based Opportunistic RoutingETOR-Efficient Token based Opportunistic Routing
ETOR-Efficient Token based Opportunistic RoutingIJCNCJournal
 

Destaque (18)

Ijcnc050206
Ijcnc050206Ijcnc050206
Ijcnc050206
 
Ijcnc050201
Ijcnc050201Ijcnc050201
Ijcnc050201
 
On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...
 
A fuzzy logic controllerfora two link functional manipulator
A fuzzy logic controllerfora two link functional manipulatorA fuzzy logic controllerfora two link functional manipulator
A fuzzy logic controllerfora two link functional manipulator
 
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
 
Dcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless networkDcf learn and performance analysis of 802.11 b wireless network
Dcf learn and performance analysis of 802.11 b wireless network
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
 
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
PAPR REDUCTION OF OFDM SIGNAL BY USING COMBINED HADAMARD AND MODIFIED MEU-LAW...
 
Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...Further results on the joint time delay and frequency estimation without eige...
Further results on the joint time delay and frequency estimation without eige...
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networking
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptography
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
 
Ijcnc050211
Ijcnc050211Ijcnc050211
Ijcnc050211
 
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEOPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
 
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
 
Ijcnc050214
Ijcnc050214Ijcnc050214
Ijcnc050214
 
A novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performanceA novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performance
 
ETOR-Efficient Token based Opportunistic Routing
ETOR-Efficient Token based Opportunistic RoutingETOR-Efficient Token based Opportunistic Routing
ETOR-Efficient Token based Opportunistic Routing
 

Semelhante a Different date block size using to evaluate the performance between different symmetric key algorithms

Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSIJNSA Journal
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSacijjournal
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 

Semelhante a Different date block size using to evaluate the performance between different symmetric key algorithms (20)

Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
 
N45028390
N45028390N45028390
N45028390
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
O017128591
O017128591O017128591
O017128591
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 

Mais de IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 

Mais de IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Different date block size using to evaluate the performance between different symmetric key algorithms

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 DOI : 10.5121/ijcnc.2014.6208 89 DIFFERENT DATE BLOCK SIZE USING TO EVALUATE THE PERFORMANCE BETWEEN DIFFERENT SYMMETRIC KEY ALGORITHMS 1 Ali M Alshahrani 2 Prof. Stuart Walker Department of Electronic Systems Engineering, University of Essex, Wivenhoe Park, Colchester, Essex, UK, C04 3SQ ABSTRACT The different computer networks whether wired or wireless are becoming more popular with its high security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks. One of these technique is a cryptography technique that makes the data as unreadable during the transfer hence; there is no chance to reclaim the information. Presently, most of the users are using various media types and internet to transfer the data but, it has the chance to retrieve the data by using these media types. The perfect solution for this problem is to provide security on time-to-time basis; this stage is always significant to the security related community discussions. This paper explains the comparison between the run time of three different encryption algorithms which are DES, AES and Blowfish The compression includes using different modes, data block size and different operation modes. As a result, Blowfish algorithm followed by AES take less time for running compared to DES. KEYWORDS AES, DES, Blowfish, Encryption and Decryption. 1. INTRODUCTION: Real time applications (RTA) are a set of technologies that are used to allow multimedia, such as voice calls, videoconferences to transfer the data from sender to receiver through the Internet Protocol (IP). There are many reasons that help to appear such services like the low of cost. Consequently, many companies enroll to this market and develop several of system that are provide a good quality of service. Recently, the computer and internet network has developing and that allow to multimedia to be the best choice for most of people to contact. Sensitive information, financial transactions and political meetings are an example of data that must have a high level of security. The cryptography system technique has long been used to ensure this sensitive information can be transmitted in a way that protects them when they are transported through an unsecured network (e.g. the internet). To protect the stored data in computing systems, using different security techniques is highly required such as encryption and decryption technique. By using this security everyone can easily protect their stored data in computers and during transmission process. For example, data cannot be read or observed by any other persons with permission. By implementing passwords and data encryption techniques, many computers will be secured. Translation of data into a form is called as Data encryption. This is incoherent without a decode mechanism. A password is a secret word or phrase that gives a user access to a particular program or system [1][2].
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 90 Security techniques are also named as information security. It is able to implement for computers and networks. Cryptography system is very important to transmit different types of data through unsecure network such as Internet. Encryption and decryptions are the process that done to move the data from the sender to receiver but by using a secret key. The procedure of changing the plain text into cipher text is called as an encryption algorithm. This process is done during the transfer the data through vulnerable channels and secret key is even used in encryption for the process of conversion. On the other hand, the process of changing the cipher text into a plain text is called as decryption algorithm. The procedure accomplished using the secret key. Plain text is the original text before encryption. After entered a secret key to the plain text, it becomes a cipher text. The basic aspect of the symmetric algorithm is a secret key, which is used in both decryption and encryption techniques. But, it needs to maintain secret to avoid the middle attacks to retrieve the information. The cryptography technique is classified into two types: Asymmetric Algorithm and Symmetric Algorithm Converting the plaint text into the cipher text by using secret key is called encryption [3][4][5]. This paper explains the description of symmetric cryptography algorithm survey, performance analysis and symmetric encryption algorithm between three of the most common algorithms which are DES, AES and Blowfish. They are implemented in Java to compare the performance by using different data block size and the standard key length. 2. CRYPTOGRAPHY: Encryption and decryption systems are defined as a set of algorithms that convert plain text data by using an agreement key for the cipher text in the sender side (encryption). The decryption process is done on the receiver side by extracting the key from the data to obtain the plain text again. The encryption method is considered strong due to several factors: the initialization vectors, the length and secrecy of the key, the algorithm, and how all of these function simultaneously. Strength, in terms of encryption, generally signifies the level of difficulty by which it is possible to decipher the key or algorithm. Thus, decoding a key must involve processing a large number of probable values in order to attain a value which can be employed so as to decrypt or decode a particular message. In other words, non-repudiation services, authenticity, confidentiality, and integrity can be provided by means of a cryptosystem. The basic types of cryptographic systems are symmetric keys, also called secret keys, or asymmetric keys, also called public keys (see next section) [3][5]. Figure1: Encryption and decryption process.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 91 2.1 The basic types of cryptographic system: The basic types of cryptographic systems are symmetric keys, also called secret keys, or asymmetric keys, also called public keys. The idea behind symmetric key systems is for both the sender and the recipient to have the same key. The sender uses this key in order to encode or encrypt the information or data, and once more, the recipient utilizes it in order to decrypt the information or the data[3][6][7]. Figure below shows the Symmetric key: Figure2: Symmetric technique. On the other hand, asymmetric cryptographic systems are believed to be far more adaptable and compliant. Normally, each user holds a public key as well as a private key. Therefore, one key is used in order to encrypt or encode messages while the other key is utilized to decrypt or decode the messages [3][6][7]. The figure below shows the asymmetric key procedure. Figure 3: Asymmetric key 3. BLOCK CIPHER VS. STREAM CIPHER Block and stream ciphers are considered as symmetric ciphers. In fact, stream ciphers are based on producing an "unlimited" cryptographic keystream and applying it to encrypt a bit or byte simultaneously. Conversely, block ciphers operate concurrently on larger pieces of data that is, blocks, frequently joining blocks in order to provide extra security. The stream cipher idea is simply to divide the text into relatively unit by unit to allow every block encoding to be based on numerous preceding blocks. The concept of a block cipher is to divide the text into fairly bulky blocks, for instance, 128 bits, then to encode every block individually. Normally, each block encoding is based on at the maximum a block of the former ones. The key remains unchanged when applied with every block [8][9].
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 92 4. MODE OF OPERATION: Modes of operations are the algorithms used in a cryptography system with a block cipher technique to provide security requirements, such as confidentiality and authenticity. The modes identify the way that data will be encrypted. The standard modes are the Electronic Codebook (ECB) mode, the Cipher Block Chaining (CBC) mode, the Cipher Feedback (CFB) mode, and the Output Feedback (OFB) mode [10][11][12]. A. Electronic codebook (ECB): ECB is a raw cipher that was published in 1981; it provides confidentiality and does not use IV. The main concept of this mode is to split the message into fixed-length blocks and encrypt each block independently. In this operation mode, the data are divided into 64-bit blocks, which are encrypted one at a time. For example, if data are transmitted along the network and any transmission occurs, it will affect only the blocks that contain the error. The blocks should be rearranged, and then the data sent. The greatest disadvantages of this encryption technique are, first, problems being encountered when protecting the affected data from the attack, and second, this mode being less effective when compared to the remaining modes. However, it is fast and easy to implement compared with the other modes [10][11][12]. Figure 4: ECB mode encryption and decryption process. B. Cipher-block chaining (CBC) The main concept of this mode is that IV is X-ORed with plaintext before encryption and for later blocks, uses the previous ciphertext as the IV. In order to know the plain text for a particular block, it is also necessary to know the key and cipher text for the previous block. As the first block is encrypted but has no previous cipher text, a 64-bit block is used to encrypt the block; this is called an initialization vector. If any problem occurs during the transmission, the error is forwarded to all the blocks because each is dependent on the other; thus it will affect the subsequent block. So the data will not be affected. This operation mode is more secure than the ECB operation mode [10][11][12]. Figure 5: CBC mode encryption and decryption process.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 93 C. Cipher feedback (CFB): In this operation mode, the input data are considered as the blocks of input, but not is not necessary to store the 64 bits of data. First, the 64 bits are stored in the one block called the shift register. Then, this shift register is considered as an input in plaintext. This block is already set to some arbitrary values. This cipher text is then passed through the extra components, called M-boxes. The M-boxes select only certain bits for encryption. This output is in plaintext. This cipher text is again fed into the shift register, and it acts as an input for the next block. This process is the same as the CBC, but additional functionalities are added to this system. If any error occurs, it will affect the subsequent blocks only. Compared to CBC, its performance is slower because of some added complex functionalities [10][11][12]. Figure 6: CFB mode encryption and decryption process. D. Output feedback (OFB) This operation mode is the same as the CBC but there are slight changes in the system performance. This takes the input into the shift register and sets it to an arbitrary initial value, and this is then passed into the algorithms. From there, it is passed into the M-boxes. This is the final output cipher text. This value is X-ORed with the real plain text, and this is the final output. In CBC and CFB, if any error occurs, it will affect all the subsequent blocks but when in OFB and once the shift register has been initialized, it will continue to affect all the blocks of the shift registers. Because each block output does not depend on the previous block, it will not affect the remaining blocks. However, it is less secure than the CBC and CFB because only the cipher text and DES cipher text values are needed to find the original plain text; the key is not required [10][11][12]. Figure 7: OFB mode encryption and decryption process.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 94 5. ENCRYPTION ALGORITHMS: A. Data Encryption Standard (DES) DES is one of the block cipher techniques developed by the National Bureau of Standards in the USA in 1976. It is used for security purposes to protect sensitive, unclassified, and commercial data by using the 56-bit key and 64-bit block size [13][14]. B. Advanced Encryption Standard (AES) : AES technology (Rijndael) is a block cipher symmetric algorithm published in 1997 by NIST for use instead of DES. Generally, the AES standard allows a block size of 128-bits and selects one key out of three keys, such as 192, 265 and 128-bit keys. AES is used to provide security for data by encrypting the original data to the cipher data [15][16]. C. Blowfish: This technique has a 64-bit block size and the length ranges from 32-bits to 448-bits. Blowfish is a 16-bit round Feistel cipher and utilizes the large key dependent S-boxes, which are rigid, and each line allows 32-bits. These S-boxes allow input of up to 8-bits and give an output of up to 32-bits. Given that the key length of Blowfish can be extended from 38-bits to 448-bits, this provides more security for data. The 32-bit key input is separated into four 8-bit quarters and uses one-by-one quarter as inputs[17][18][19]. 6. EXPERIMENTAL METHODOLOGY, RESULT AND ANALYSIS: The Java environment was used to evaluate the run time performance of three different types of encryption algorithms (DES, AES and blowfish) and four different types of operations modes. The aim of the experiment is to calculate each algorithm’s run time speed efficiency to encrypt and decrypt many blocks of different sizes of text in different modes of operation. The key size of DES, AES and blowfish are 56, 128 and 128 respectively. While the block sizes are 64 for DES and 128 for AES and blowfish. The below figure shows the GUI of the Java program. Figure 8: GUI of the Java program.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 95 RESULT AND ANALYSIS: The experiment has been done to compare between DES, AES and Blowfish which are consider as symmetric key cryptography algorithms. Different sizes of data blocks and standards key size used to evaluate the algorithm's run time speed. 100, 200, 300, 400, 500 and 1000 kb are the data block size that using in the experiment and the user can choice one of these size or can choice any block size. The DES key size is 64 and AES and Blowfish are 128 kb. Figure 9: run time performance speed with ECB mode 0 5 10 15 20 100 200 300 400 500 1000 Time(sec) Data Block Size (Kb) DES AES Blowfish Figure 10: run time performance speed with CBC mode. CBC requires more processing time than ECB because of its key-chaining feature. However, compared to ECB, CBC is much better in terms of security.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 96 0 20 40 60 80 100 100 200 300 400 500 1000 Time(Sec) Data Block Size (Kb) DES AES Blowfish Figure 11: run time performance speed with CFP mode. 0 20 40 60 80 100 120 100 200 300 400 500 1000 Time(Sec) Data Block Size (Kb) DES AES Blowfish Figure 12: run time performance speed with OFB mode. The OFB mode has a different procedure for the security processes because it uses the XOR operation, and its cipher output is a key stream so it needs more time compared to previous modes. Finally, as expected, CFB requires less processing time than does OFP. CONCLUSION: Performance of the symmetric encryption algorithms DES, AES and Blowfish has been evaluated for the different modes (ECB, CBC, CFB, and OFB) of encryption and decryption. Key size for DES algorithm is fixed as 56 bits, AES and Blowfish algorithms have the key size of 128 bits. Execution time is evaluated by varying different data sizes of 100,200,300,400,500 and 1000 Kb. The result shows that Blowfish run time is the fastest algorithm compared to AES and DES. FUTURE WORK: In future, the work will extend this project to allow the encryption and decryption of all different types of data, such as image, sound, and video. Then, a new algorithm will be developed that will fulfil the QoS requirements. ACKNOWLEDGEMENTS: I would like to express my very great appreciation to Prof. Walker for his advice and completely supporting during this paper.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 97 REFERENCES [1] M. Hil. and G. Zhang, “A Web Services Based Frame work for Voice over IP”, Proceedings of the 30th Euromicro Conference, vol. 10, pp. 258 –264, 2004. [2] Obaida. Al-Hazaimeh, " Increase the Security Level for Real-Time Application Using New Key Management Solution", International Journal of Computer Science Issues(IJCSI), Vol. 9, Issue 3, 2012. [3] D. Stinson," Cryptography Theory and Practice", CRC Press Inc., NY, USA, 1995. [4] E. Cole, R. Krutz and J. W. Conley," Network Security Bible", Wiley Publishing Inc, 2005. [5] Katz, Jonathan and Yehuda Lindell (2007).’ Introduction to Modern Cryptography’. [6] P.C. van Oorschot, A.J. Menezes, and S.A. Vanstone, “Handbook of Applied Cryptography,”CRC Press, Inc., 1997. [7] Network Associates, Inc., ‘’ An Introduction to Cryptography.’’, June 2001. [8] B. Moeller ,‘’Security of CBC Ciphersuites in SSL/TLS: Problems and Countermeasures’’, (May 20, 2004), [9] William F. Ehrsam, Carl H. W. Meyer, John L. Smith, Walter L. Tuchman, "Message verification and transmission error detection by block chaining", US Patent 4074066, 1976. [10] Dworkin M. ‘’ Recommendation for Block Cipher Modes of Operation’, NIST Special Publication 800-38A 2001 Edition. [11] Biham, Eli and Shamir, Adi, ‘’Differential Cryptanalysis of the Data Encryption Standard’’, Springer Verlag, 1993. ISBN 0-387-97930-1, ISBN 3-540-97930-1. [12] Hristof Paar, Jan Pelzl, "Stream Ciphers", Chapter 2 of "Understanding Cryptography, A Textbook for Students and Practitioners", 2009. [13] Knudsen, Lars R., The Block Cipher Companion. Springer. ISBN 9783642173417, (2011). [14] Daemen J, Rijmen V, "The Design of Rijndael: AES – The Advanced Encryption Standard." Springer, 2002. ISBN 3-540-42580-2. [15] H Wang ; H Zheng ; B Hu ; H Tang .’’ Improved Lightweight Encryption Algorithm Based on Optimized S-Box’, Computational and Information Sciences (ICCIS), 2013 Fifth International Conference. [16] T Sharma. ; R. Thilagavathy. ‘’ Performance analysis of advanced encryption standard for low power and area applications’’, Information & Communication Technologies (ICT), 2013 IEEE Conference, 2013 , Page(s): 967 – 972. [17] B. Schneier, "The blowfish encryption algorithm-one year later," Dr. Dobb 's Journal, 1995. [18] B Schneier (1993). "Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). [19] A. Alabaichi ; F. Ahmad ; R. Mahmod, ‘’ Security analysis of blowfish algorithm’’ Informatics and Applications (ICIA),2013 Second International Conference. Authors: Ali Alshahrani was born in Saudi Arabia in 1982. He received his M.Sc. from University of Essex in 2011. He is currently PhD student at Essex University, UK, Colchester. His research interests include Network Security, Image Processing, Mobile Payment and e-learning. Prof. Stuart D.Walker was born in Dover, U.K., in 1952.He received the B.Sc. (Hons) degree in physics from Manchester University, Manchester, U.K., in 1973, and the M.Sc. degree in telecommunications systems and the Ph.D. degree in electronics from Essex University, Essex, U.K., in 1975 and 1981, respectively. After a period of postdoctoral work at Essex University, he joined the then British Telecom (BTPlc) Research Laboratories, Martlesham Heath, Ipswich, U.K., in 1982. Initially, he was concerned with regenerator design issues in submarine optical transmission systems. While at BT Plc, he was jointly responsible (with Prof. P. Cochrane) for pioneering the unrepeatered-transmission-system concept. In 1987, he was promoted to head the transatlantic link-repeater group, where he supervised the design and fabrication of high-reliability integrated circuits. In 1988, he became a Senior Lecturer at Essex University. There, his research interests included fiber-polarization studies and novel optoelectronic-device configurations. He then developed an interest in access-network design and construction, where he formed a specialist research group. In 2003, he was promoted to Reader and to Full Professor in 2004. He has published over 150 journal and conference papers and has 6 patents granted.