Título: Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Autores: Weerasinghe, Tharindu Darshana Bandara; BSc.Eng(Hons), MIEEE, AMIE(SL), MSc.Eng candidate, Department of Electrical and Electronic Engineering, University of Peradeniya, Peradeniya 20400, Sri Lanka
Fecha: 2012-06-16
Publicador: International journal of information and network security
Fuente:
Tipo: info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Tema: No aplica
Descripción: There can be two vital criteria of selecting an algorithm to fulfil one’s encryption requirement. The security level of the cipher (secrecy) and the encryption time (performance). There is less focus on secrecy of ciphers as a security measurement, thus in this research, Shannon’s theories on secrecy of ciphers are used in-order to calculate the average secrecy of each cipher. Depending on the secrecy level and performance of the algorithm, suitable algorithm for encryption can be selected. This paper presents an analysis of some of the widely used symmetric key algorithms which fall under the categories of block and stream ciphers together with the two combined algorithms. [DES, TripleDES, AES, RC2, RC4, Hybrid1 (TripleDES+RC4) and Hybrid2 (AES+RC4) are used]. Analysis is done based on two measurement criteria under two circumstances which is described later in this paper. All the algorithms are implemented in Java using classes available in JAVA package javax.crypto. Separate classes are written to calculate the secrecy of ciphers and the encryption time.   Performances of all stream ciphers are higher than that of block ciphers and the combined algorithms have similar performance level to block ciphers. Secrecy level of block ciphers are comparatively higher than that of stream ciphers but there are drastic changes as the data size increases. Hybrid ones have more stable secrecy level.
Idioma: Inglés

Artículos similares:

Developing a Secure Programming Module to cope with Modern Vulnerabilities por McKelvey, Nigel; Letterkenny Institute of Technology
New GSM, DCS and GSM/DCS Pifa Antennas Designs for Wireless Networks Applications por Mehadji, Abri; Tlemcen university,Belgacem, N; Tlemcen university,Belgacem, W; Tlemcen university
A New Proxy Blind Signature Scheme Based on DLP por VERMA, SWATI; "Pt.Ravishankar Shukla University, Raipur(Chhattisgarh)",Sharma, Birendra Kumar; "Pt.Ravishankar Shukla University, Raipur(Chhattisgarh)"
A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model por Chitrey, Anubhav; Department of Information Security & Cyber Law Indian Institute of Information Technology Allahabad, India,Singh, Dharmendra,Singh, Vrijendra
Synthetic Feature Transformation with RBF neural network to improve the Intrusion Detection System Accuracy and Decrease Computational Costs por Asgari Taghanaki, Saeid; IAU Majlesi,Zamani Dehkordi, Behzad,Hatam, Ahmad,Bahraminejad, Behzad
Fast Mapping Method based on Matrix Approach For Elliptic Curve Cryptography por El Kinani, El Hassan; Groupe algèbre et Applications Département de Mathématiques Faculté des Sciences et Techniques Univesité Moulay Ismaïl Errachidia. Maroc.
10