Enviar pesquisa
Carregar
82 86
•
1 gostou
•
1,016 visualizações
E
Editor IJARCET
Seguir
Tecnologia
Educação
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 5
Baixar agora
Baixar para ler offline
Recomendados
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
H42054550
H42054550
IJERA Editor
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Hardik Manocha
Ch34508510
Ch34508510
IJERA Editor
Recomendados
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
H42054550
H42054550
IJERA Editor
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Hardik Manocha
Ch34508510
Ch34508510
IJERA Editor
Encryption techniques
Encryption techniques
ShrikantSharma86
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
Hybrid AES DES
Hybrid AES DES
Hardik Manocha
AES Abstract
AES Abstract
SathrukaSinha
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha
Ijetcas14 355
Ijetcas14 355
Iasir Journals
Hybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
researchpaperfinal1
researchpaperfinal1
Sumit Bajaj
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
MahmudJion
B03302007012
B03302007012
theijes
D017433134
D017433134
IOSR Journals
White Paper on Cryptography
White Paper on Cryptography
Durgesh Malviya
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
iosrjce
Analysis and comparison of symmetric key
Analysis and comparison of symmetric key
IJNSA Journal
Implementation of hummingbird cryptographic
Implementation of hummingbird cryptographic
eSAT Publishing House
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
IJCNCJournal
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
163 166
163 166
Editor IJARCET
An information system to access contemporary archives of art: Cavalcaselle, V...
An information system to access contemporary archives of art: Cavalcaselle, V...
Andrea Ferracani
Interactive Video Search and Browsing Systems
Interactive Video Search and Browsing Systems
Andrea Ferracani
Mais conteúdo relacionado
Mais procurados
Encryption techniques
Encryption techniques
ShrikantSharma86
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
Hybrid AES DES
Hybrid AES DES
Hardik Manocha
AES Abstract
AES Abstract
SathrukaSinha
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha
Ijetcas14 355
Ijetcas14 355
Iasir Journals
Hybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
researchpaperfinal1
researchpaperfinal1
Sumit Bajaj
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
MahmudJion
B03302007012
B03302007012
theijes
D017433134
D017433134
IOSR Journals
White Paper on Cryptography
White Paper on Cryptography
Durgesh Malviya
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
iosrjce
Analysis and comparison of symmetric key
Analysis and comparison of symmetric key
IJNSA Journal
Implementation of hummingbird cryptographic
Implementation of hummingbird cryptographic
eSAT Publishing House
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
IJCNCJournal
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
Mais procurados
(19)
Encryption techniques
Encryption techniques
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Hybrid AES DES
Hybrid AES DES
AES Abstract
AES Abstract
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Ijetcas14 355
Ijetcas14 355
Hybrid Encryption for Database Security
Hybrid Encryption for Database Security
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
researchpaperfinal1
researchpaperfinal1
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
B03302007012
B03302007012
D017433134
D017433134
White Paper on Cryptography
White Paper on Cryptography
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
Analysis and comparison of symmetric key
Analysis and comparison of symmetric key
Implementation of hummingbird cryptographic
Implementation of hummingbird cryptographic
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
Destaque
163 166
163 166
Editor IJARCET
An information system to access contemporary archives of art: Cavalcaselle, V...
An information system to access contemporary archives of art: Cavalcaselle, V...
Andrea Ferracani
Interactive Video Search and Browsing Systems
Interactive Video Search and Browsing Systems
Andrea Ferracani
1784 1788
1784 1788
Editor IJARCET
Sirio
Sirio
Andrea Ferracani
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
Editor IJARCET
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Shawbak
Shawbak
Andrea Ferracani
Ijetcas14 510
Ijetcas14 510
Iasir Journals
Web search algorithms and user interfaces
Web search algorithms and user interfaces
Stefanos Anastasiadis
Destaque
(11)
163 166
163 166
An information system to access contemporary archives of art: Cavalcaselle, V...
An information system to access contemporary archives of art: Cavalcaselle, V...
Interactive Video Search and Browsing Systems
Interactive Video Search and Browsing Systems
1784 1788
1784 1788
Sirio
Sirio
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Shawbak
Shawbak
Ijetcas14 510
Ijetcas14 510
Web search algorithms and user interfaces
Web search algorithms and user interfaces
Semelhante a 82 86
Seminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
Hardik Manocha
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
DhamuKing1
Cryptography
Cryptography
Shankar Ghorpade
Cryptography
Cryptography
Shankar Ghorpade
Encryption
Encryption
IGZ Software house
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
Cryptography
Cryptography
Shivanand Arur
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
SecurityTube.Net
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communication
ijsrd.com
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
phanleson
Day5
Day5
Jai4uk
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
Tharindu Weerasinghe
Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
International Journal of Science and Research (IJSR)
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
Cryptography
Cryptography
Vishalya Dulam
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
6. cryptography
6. cryptography
7wounders
Semelhante a 82 86
(20)
Seminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
Cryptography
Cryptography
Cryptography
Cryptography
Encryption
Encryption
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
Cryptography
Cryptography
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communication
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
Day5
Day5
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
Cryptography
Cryptography
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
6. cryptography
6. cryptography
Mais de Editor IJARCET
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
Mais de Editor IJARCET
(20)
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Último
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
apidays
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Zilliz
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
The Digital Insurer
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Último
(20)
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
82 86
1.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 STUDY AND PERFORMANCE ANALYSIS OF CRYPTOGRAPHY ALGORITHMS S. Pavithra Research Scholar, Department of Computer Science, NGM College, Pollachi, India. Email: Pavisou010@gmail.com Mrs. E. Ramadevi Assistant Professor, Department of Computer Science, NGM College, Pollachi, India. Email: ramajus@hotmail.com Abstract - Today’s world, for secure data transmission II. SYMMETRIC KEY ALGORITHMS via Internet or any public network, there is no alternative to cryptography. The role of Cryptography is most important in the field of network security. The Symmetric key algorithms are a class of algorithms main goal of cryptography is Confidentiality, Integrity, for cryptography that use the same cryptographic Authentication, Nonrepudiation. Cryptography is keys for both encryption of plaintext and decryption widely used by governmental and intelligence agencies of ciphertext. The keys may be identical or there may around the world to safe transmission of any format of be a simple transformation to go between the two messages online or offline. In this study is made for the keys. The keys, in practice, represent a shared secret cryptography algorithms, particularly algorithms are between two or more parties that can be used to compared and performance is evaluated. maintain a private information link. Keywords - AES, BLOWFISH, Cryptography, Sender Decryption, Encryption, Security I. INTRODUCTION Encryption P C algorithm There are number of cryptographic algorithms used for encryption data and most of all fall into two generic categories – Public key system and secret key system. Symmetric key algorithm is known as secrecy key or shared key algorithm. Because in Secret Key symmetric key algorithm a shared key does both the encryption and decryption. Only one key is used for doing everything, so the success of algorithm Receiver depends on two factors-secrecy of the key and its distribution. Symmeric algorithms are: Data Decryption Encryption Standard (DES), Triple DES (3DES), C P algorithm International Data Encryption algorithm (IDEA), Blowfish, Advanced Encryption Standard (AES). Asymmetric key algorithm is also known as public key algorithm. In this algorithm, there are two keys public and private used for encryption and decryption. Public key is used to encrypt the message Secret Key and private key is used to decrypt the message. Asymmetric algorithms are: Diffe-Hellman and RSA Public Key Encryption. 82 All Rights Reserved © 2012 IJARCET
2.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 A. DES: C. IDEA: DES is a block cipher. It encrypts data in blocks of IDEA is one of the strongest cryptographic size 64 bits each. 64 bits of plain text goes as the algorithms. Idea is a block cipher. It works on 64-bit input to DES, which produces 64 bits of cipher text. plain text blocks. The key is longer and consists of The key length is 64 bits [3]. Cryptanalyst can 128 bits. IDEA is reversible of DES.[2] perform cryptanalysis by exploiting the characteristic of DES algorithm but no one has succeeded in The 64-bit plaintext block is partitioned into four 16- finding out the weakness. bit sub blocks. Four 16-bit key sub-blocks are required for the subsequent output transformation, DES results in a permutation among the 2^64 and its generated from the 128-bit key. The key sub- possible arrangement of 64 bits, each of which may blocks are used for the encryption and the be either 0 or 1. Each block of 64 bits is divided into decryption.[10] IDEA was used in Pretty Good two blocks of 32 bits each, a left half block L and Privacy (PGP). right half R. D. BLOWFISH: The DES algorithm turns 64-bit messages block M into a 64-bit cipher block C. If each 64-bit block is Blowfish is a 64-bit symmetric block cipher with encrypted individually, then the mode of encryption variable length key. The algorithm operates with two is called Electronic Code Book (ECB) mode. There parts: a key expansion part and a data- encryption are two other modes of DES encryption, namely part. The role of key expansion part is to converts a Chain Block Coding (CBC) and Cipher Feedback key of at most 448 bits into several sub key arrays (CFB), which make each cipher block dependent on totaling 4168 bytes [8]. all the previous messages blocks through an initial XOR operation. The data encryption occurs via a 16-round Feistel network . It is only suitable for application where the B. AES: key does not change often, like communications link or an automatic file encryption. It is significantly AES is based on a design principle known as a faster than most encryption algorithms when substitution-permutation network. AES has 128-bit implemented on 32-bit microprocessors with large block size and a key size of 128,192 or 256 bits [2]. data caches. AES operates on a 4×4 column-major order matrix of bytes, termed the state. Most AES calculations are E. Triple DES: done in a special finite field. Triple DES is an alternative to DES. 3DES takes a The AES cipher is specified as a number of 64-bit block of data and performs the operations repetitions of transformation rounds that convert the encrypt, decrypt and encrypt. The key is always input plaintext into the final output of cipher text. presented as a 64-bit block, every 8th bit of which is The number of cycles of repetition are as follows: ignored. Use of multiple length keys leads us to the Triple-DES algorithm, in which DES is applied three 10 cycles of repetition for 128 bit keys. times. 12 cycles of repetition for 192 bit keys. 14 cycles of repetition for 256 bit keys. we consider a triple length key to consist of three 56- bit keys K1, K2, K3 then encryption is as follows: [2] Each round of encryption process requires the Encrypt with K1-> Decrypt with K2 -> Encrypt with following four types of operations: SubBytes, K3 Decryption is the reverse ShiftRows, MixColumns, XorRoundkey. Decryption process: Encrypt with K3-> Decrypt with K2 -> is the reverse process of encryption and using inverse Encrypt with K1 functions: InvSubBytes, InvShiftRows, InvMixColumns. III. ASYMMETRIC KEY ALGORITHM Asymmetric key algorithm uses private key and public key. It is used to easily encrypt and decrypt the message when the relevant key is known. In crypto 83 All Rights Reserved © 2012 IJARCET
3.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 system one key to encrypt and different key to is used by several protocols, including Secure decrypt. Sockets Layer (SSl), Secure Shell (SSH) and Internet protocol security (IPSec). Sender IV. RELATED WORK P Encryption C algorithm This section discusses the performance of the compared algorithms. In this paper [6] consider the performance of encryption algorithm for text files, it uses AES, DES Receiver’s and RSA algorithm and is evaluated from the Public Key following parameters like Computation time, Memory usage, Output bytes. First, the encryption time is computed. The Receiver time is taken to convert plain text to cipher text is known as encryption time. Comparing these three Decryption algorithms, RSA takes more time for computation C algorithm P process. The memory usage of each algorithm is considered as memory byte level. RSA takes larger memory than AES and DES. Finally, the output byte is calculated by the size of output byte of each algorithm. The level of output byte is equal for AES and DES, but RSA algorithm produces low level of Receiver’s output byte. Private Key In this paper [7], the selected algorithms are AES, 3DES, Blowfish and DES. By using these algorithms A. RSA the performance of encryption and decryption process of text files is calculated through the RSA is a most popular and proven asymmetric throughput parameter. cryptography algorithm. RSA is based on the mathematical fact that is easy to find the private and Encryption time is calculated as the total public keys based on the very large prime numbers. plaintext in bytes encrypted divided by the encryption [2] time. Decryption time is calculated as the total plaintext in bytes decrypted divided by the decryption Encryption: compute c = m^e mod n, where the e time. and n are the public key, and m is the message block. The c is the encrypted message. As a result mentioned in the paper [7], it is said that Blowfish algorithm gives the better Decryption: The private key d is used to decrypt performance than all other algorithms in terms of messages. Compute: m = c^d mod n, where n is the throughput. The least efficient algorithm is 3DES. modulus and d is the private key. In this paper [9], discuss the performance evaluation In RSA, compare to encryption process, decryption of AES and BLOWFISH algorithms, and the process takes more time. parameters are Time consumption of packet size for 64 bit encodings and hexadecimal encodings, B. Diffe-Hellman Key Exchange encryption performance of text files and images are compared with these two algorithms and calculate the Diffie-Hellman key agreement is not based on throughput level, encryption and decryption. Diffe-Hellman (DH) is a method for securely exchanging a shared secret Throughput of encryption = Tp/Et between two parties in real time untrusted network. It 84 All Rights Reserved © 2012 IJARCET
4.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 where algorithm consumes less time for encrypting the audio than that of AES. Tp: total plain text (bytes) Next, Comparison of decryption time has been given Et: encryption time (second) in the following table 2, and it shows the Average time of AES and BLOWFISH algorithm for different The simulation results shows that Blowfish has better audio files decryption. performance than AES in almost all the test cases. Table 2: Average time of decryption V. EXPERIMENTAL RESULTS Audio Files Encryption Encryption time of In this section, the AES and Blowfish algorithms can (KB) time of AES (MS) be implemented to different audio files. Comparison BLOWFISH of encryption time has been given in the following (MS) table 1, and it shows the Average time of AES and 8,282 300 433 BLOWFISH algorithm for different audio files 387 120 220 encryption. 33 21 28 2,826 55 97 Table 1: Average time of encryption Average 124 194.5 Time Audio Files Encryption Encryption time of (KB) time of AES (MS) DECRYPTION PROCESS BLOWFISH (MS) 250 8,282 970 1025 200 387 38 55 Average Time 150 33 16 20 2,826 348 370 100 Average 343 367.5 50 Time 0 BLOWFISH AES ENCRYPTION PROCESS Algorithms 400 350 300 Figure 2: Average Time of decryption Average Time 250 200 Figure 2 shows the result based on the average time 150 of the decryption with different size of audio files. It 100 shows that the average time is minimum for Blowfish 50 when compared to that of AES. So from the 0 experiment it proves that blowfish decryption BLOWFISH AES algorithm consumes less time for decrypting the Algorithms audio than that of AES. Figure 1 : Average Time of encryption VI. CONCLUSION Figure 1 shows the result based on the average time Cryptography algorithm is the science in secret code. of the encryption with different size of audio files. It Rapidly rising cyber crime and the growing prospect shows that the average time is minimum for Blowfish of the internet being used as a medium for attacks when compared to that of AES. So from the create a major challenge for network security. In this experiment it proves that blowfish encryption paper 85 All Rights Reserved © 2012 IJARCET
5.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 We studied the various cryptographic algorithms and Coimbatore. Her research interest lies in the area of majorly deals the encryption and decryption process Networking and Data Security. for protecting the text files and images using some of the cryptographic algorithms. Mrs. E. Ramadevi - Mrs. E. Ramadevi received M.Phil degree in Computer Science from Bharathiar The presented simulation results of audio files show University, Coimbatore. Currently she is an Assistant the points. It was concluded that Blowfish has better Professor in Computer Science at NGM College, performance than AES in terms of Average time. Pollachi, India. She has got 10 years of research experience and she has more than 15 years of teaching experience . Her research interest includes REFERENCES areas like Data Mining, Knowledge base System, Intelligent and Control Systems and Fuzzy Logic, [1] Atul Kahate, “cryptography and network presented various papers in National and security”, Tata McGraw-Hill publishing International conferences. Published 2 research company, New Delhi, 2008. papers. [2] B. Schneier, ” Description of a New Variable- Length Key, 64-Bit Block Cipher (Blowfish) Fast Software Encryption”, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, 1994, pp. 191-204. [3] “BLOWFISHalgorithm” http://pocketbrief.net/related/BlowfishEncryptio n.pdf [4] “DES algorithm” http://orlingrabbe.com/des.htm [5] Gurjeevan Singh, Ashwani Kumar Singla, K.S.Sandha, “Through Put Analysis of Various Encryption Algorithms”, IJCST Vol.2, Issue3, September 2011. [6] How-Shen Chang, “International Data Encryption Algorithms”, 2004. [7] “Performance Analysis of AES and BLOWFISH Algorithms “, National Conference on Computer Communication & Informatics”, School of computer science, RVS college of arts and science, March 07, 2012. [8] Shashi Mehrotra Seth, Rajan Mishra, “Comparitive Analysis of Encryption Algorithms For Data Communication”, IJCST Vol.2, Issue 2, June 2011 [9] Tingyuan Nie Teng Zhang, ” A study of DES and Blowfish encryption algorithm”, Tencon IEEE Conference, 2009. [10] William Stallings, “cryptography and network security”, pearson prentice hall, 2006, 4th edition. Authors: S. Pavithra – S.Pavithra received M.Sc degree in Computer Science from Karpagam University, Coimbatore. Currently she is doing M.Phil Degree in Computer Science at Bharathiar University, 86 All Rights Reserved © 2012 IJARCET
Baixar agora