SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
The International Journal Of Engineering And Science (IJES)
|| Volume || 2 ||Issue|| 12 || Pages || 92-98 || 2013 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805

Throughput Comparison Results of Proposed Algorithm with
Existing Algorithm
1

Naveen Kolhe, 2Nikhat Raza

1
2

Department of Computer Science, BIST, Bhopal, India
Department of Computer Science, BIST, Bhopal, India

----------------------------------------------------------ABSTRACT---------------------------------------------------------It is known that encryption is one of the strongest security solutions for database, but developing a database
encryption strategy must take many factors into consideration. Basically encryption should be performed
where data is originating. This paper examines the various issues of implementing database encryption and
makes recommendations. This paper is concluding with a benchmark using the proposed design criteria like
proposed encryption/decryption algorithm. Presented results are showing the performance of the proposed
algorithm.

Keywords - Algorithm, Cryptography, Database, Decryption, Encryption,.
-------------------------------------------------------------------------------------------------------------------------------------Date of Submission: 02 December 2013
Date of Publication: 15 December 2013
--------------------------------------------------------------------------------------------------------------------------------------

I. INTRODUCTION
This Paper titled “Throughput Comparison Results of Proposed Algorithm with Existing Algorithm” enhances a
new parameter called throughput results to the other parameters of cryptography algorithm proposed by analyzing the
principle of the encryption/decryption algorithm based on symmetric key cryptography. Moreover, the security and
performance of the proposed algorithm is also estimated [1] . The symmetric key [2] approves the effectiveness of the
proposed method, and it shows advantages of large key space and high-level security. The cipher text generated by this
method can be vary in size as the plaintext and is suitable for practical use in the secure transmission of confident ial
information over the Internet. The objective of proposed research is to propose a general database [3] cryptography
algorithm, without explaining the fixed symmetric or asymmetric encryption algorithms used in that algorithm. The
proposed encryption algorithms affect the performance of execution and security analysis. Proposed research will
investigate each issue in detail. Our proposed algorithm does rely on a specific symmetric encryption algorithm; proposed
symmetric algorithm with the appropriate key size can be used. Also, it is possible to apply different encryption algorithms
on different sides. For example, the user could use algorithm A, the other user could apply algorithm B, and the another
user could do it with algorithm C. This provides a flexible and more secure encrypting environment. The concept of
database security and the word cryptography might be intimidating and complicated. The objective of the report is to
develop a tool that mediates the user and the operations to achieve database security goals. A platform independent tool
with user-friendly graphical user interface, using already existing techniques and algorithms for cryptographic operations
will be resulting product. People need to use the cryptographic operations in order to keep the personal sensitive
information files to avert from foreigners in consideration of the security goals. The operations include bunch of algorithms
to protect the attacks of foreigners to reach and read personal files that is located in personal compu ter or the owner would
like to send somewhere. Cryptographic operations consist of encryption and decryption techniques in computer and
computer networking. In effort to keep information’s in safety such as banking account information’s or to provide file
transaction without any problem such as password sharing caused such a security methods.

II. PROPOSED WORK
“Throughput Comparison Results of Proposed Algorithm with Existing Algorithm” shows
throughput results of proposed symmetric key encryption/decryption algorithm which is improved version of
existing algorithm like AES. The proposed work overcomes the security limitations of existing algorithm by
adding a new level of confusion thus resulting in a strong cryptographic algorithm. The proposed algorithm
also ensures that encryption and decryption time is similar to that of the existing system. The architecture in
the Fig 1 and 2 below shows the process of encryption and decryption:

www.theijes.com

The IJES

Page 92
Throughput Comparison Results of Proposed Algorithm with Existing Algorithm

Fig1: Architecture diagram for encryption

Fig2: Architecture diagram for decryption

Proposed Concept: In proposed system, whose basic architecture is shown in Fig 3, apply
encryption/decryption process accumulatively while data moves from/to the database. The purpose of such
design is to implement encrypted storage satisfying data confidentiality, privacy and integrity. In addition, it
makes data usable for the server side, and makes it possible for the database to be joined to other databases by
the coordinator. The encryption operation in proposed system is based on mathematically operation. Such
operation is needed to draw a full map of the encryption process.
Following the convention, E denotes the encryption function, and D denotes the decryption function.
The general approach to encryption is the field level; that is, sensitive fields need to be encrypted to protect the
information from inside or outside attack. Data is encrypted using a symmetric encryption algorithm. After the
process, each side encrypt the data its own. For each database schema S(R1; :::;Rn) , where R1 to Rn are
relations created on the database, RE name is encrypted database using the secret key. For database security
where information which is stored in the database is encrypted by using proposed symmetric cryptography
algorithm which will be based on block cipher concept where each information of database will treat as a block
of equal length and then each block will encrypt using a special mathematical set of functions known as Key
with the help of proposed encryption algorithm.
During encryption or decryption same key will use due to symmetric nature. In the proposed
algorithm 128 bits of key length is used so that security of proposed algorithm will be very high. In Fig 3
databases will execute with proposed encryption algorithm and proposed encryption algorithm will call to
proposed key to produce encrypted database. In reverse encrypted database will execute with proposed
decryption algorithm and this proposed decryption algorithm will call same proposed key to produce original
database.

Fig 3: Proposed System Architecture
www.theijes.com

The IJES

Page 93
Throughput Comparison Results of Proposed Algorithm with Existing Algorithm
Following example is showing work of the proposed research. In the employee example, the database
is encrypted based on the data classification proposed in this research. Table 1 shows an unencrypted employee
database and Table 2 shows the encrypted database.
Table-1: Unencrypted Database of Employee as an input
S. No

Eid

Ename

Edoj

Edob

Esalary

Eaddress

1

101

ram

12-12-2000

12-12-1980

5000

Bhopal

2

102

Raj

18-1-2003

3-5-1983

5000

Indore

3

103

rajesh

1-12-200

13-6-1978

4000

jabalpur

Table-2: encrypted Database of Employee as an output
S. No

Eid

Ename

Edoj

Edob

Esalary

Eaddress

1

@s#

*&”

“:!s3?q

!2sd%$#m

3%!nd*

A|.ls,#@

2

%)!

&)*

!#aw)”|2<’

Nd*&@^>

*Nk3^5

@.3d,%&

3

(*^

*&^%$%

-wl)*>&2s

3!}sk#ms

!&*?|

*34hs>?1

The Size of the encrypted Table 2 can be increase; it will depend upon the encryption algorithm, key size and
other parameters.
Block Diagram of Proposed Encryption: Fig 4 is showing basic block diagram of proposed encryption
algorithm. In this user select 128 bits key length and select database. Then proposed encryption algorithm
executed after completing execution encrypted data one again stored in the same database which is known
encrypted database.

Fig 4: Block Diagram of Proposed Encryption

www.theijes.com

The IJES

Page 94
Throughput Comparison Results of Proposed Algorithm with Existing Algorithm
Proposed Encryption Algorithm:
1. Input Key (KEY) of 16 byte or 128 bits
length.
2. Arrange Key in matrix of 4 X 4.
3. Calculate Key Transpose (KeyT)
4. Select plain text (PT) of 16 byte or 128
bits from data base.
5. Arrange plain text in matrix of 4 X 4.
6. Apply XOR operation between key, plain
text and key transpose. Out put of this
step will be message (M1).
7. Perform permutation function on
message (M1. Out put of this step will be
message (M2).
8. Perform transpose function on message
(M2). Out put of this will be message
(M3).
9. Perform row mixing function on message
on (M3). Out put of this step will be
message (M4).
10. Perform column mixing function on
message (M4). Output of this step will
be message (M5).
11. Apply XOR operation between message
(M5)and key (KEY) value. Out put of
this step will be message (M6).
12. Perform permutation function on
message (M6). Out put of this step will
be message (M7).
13. Message (M7) is the final cipher text.
14. Exit.

Block Diagram of Proposed Decryption: Fig 5 is showing basic block diagram of proposed decryption
algorithm. In this user select 128 bits key length and select encrypted database. Then proposed decryption
algorithm executed after completing execution original data one again stored in the same database which is
known original database.

Fig 5: Block Diagram of Proposed Decryption

www.theijes.com

The IJES

Page 95
Throughput Comparison Results of Proposed Algorithm with Existing Algorithm
Proposed Decryption Algorithm:
1.
2.
3.
4.

Input Key (KEY) of 16 byte or 128 bits length.
Arrange Key in matrix of 4 X 4.
Calculate Key Transpose (KeyT)
Select cipher text (CT) of 16 byte or 128 bits from
data base.
5. Arrange cipher text (CT) in matrix of 4 X 4.
6. Perform reverse permutation function on message
(CT). Out put of this step will be message (M1).
7. Apply XOR operation between message (M1)and key
(KEY) value. Out put of this step will be message
(M2).
8. Perform reverse column mixing function on message
(M2). Output of this step will be message (M3).
9. Perform reverse row mixing function on message on
(M3). Out put of this step will be message (M4).
10. Perform transpose function on message (M4). Out put
of this will be message (M5).
11. Perform reverse permutation function on message
(M5). Out put of this step will be message (M6).
12. Apply XOR operation between key, message (M6)
and key transpose. Out put of this step will be
message (M7).
13. Message (M7) is the original plain text.
14. Exit.

Proposed System Attribute:
Reliability and Fault Tolerance: The Proposed Software source code should be reliable and of enterprise quality.
Availability: The proposed software will be placed in public domain and it will be unpatented in all countries. Anyone
would freely be able to use the proposed software. The specification, source code and test data for the proposed software
would be available to anyone wishing to compare the algorithms, in accordance with country specific export laws.
Security: The proposed software will contain strong cryptographic algorithm, so even if it is created, maintained and
distributed from liberal countries (where it is legal to do this), it falls under certain export/import and/or use restrictions in
some other parts of the world. Please remember that export/import and/or use of strong cryptography software, providing
cryptography hooks or even just communicating technical details about cryptography software is illegal in some parts of the
world. So, when you import the reference implementation to your country, re-distribute it from there or even just email
technical suggestions or even source patches to the author or other people you are strongly advised to pay close attention to
any export/import and/or use laws which apply to you. Anyone associated with this project are not liable for any violations
you make here.
Accessibility: The accessibility of our product is not dependent to any extra license. Propose software is a freeware
product. Thus, every person is able to execute the program
on any platform.
Correctness and Consistency: The specification of proposed software will be correct and consistent.
Portability: The proposed software will be in C# Dot Net programming language (and will execute on any system where
its compiler has been ported to). The portability of other software implementations will depend on portability of chosen
programming language.
Performance: The requirement of the computers is not important for our product. It may be important for big sized files.
Otherwise, performance is expected fast enough. The system shall react the user operations immediately.

III. RESULTS
Dot Net implementation is done to present an evaluation system. For encryption time and decryption
time of the existing algorithm with this proposed algorithm, it is necessary to describe the detailed evaluation
method, as illustrated in Fig 6. Here only one evaluating mode is taken to find whether the key and the plain
text have impact on time consuming of cryptographic algorithms, DDSK (different size of database in the same
key).

www.theijes.com

The IJES

Page 96
Throughput Comparison Results of Proposed Algorithm with Existing Algorithm

Fig 6: Results Evolution Model
For this experiment, a laptop Pentium® Dual-Core CPU T4400 @2.20Ghz and 32-bit Operating
System is used, in which performance data is collected. In the experiments, the laptop encrypts a various size
of database and new parameter Throughput is used to calculate performance of the existing algorithm as well
as Proposed Algorithm (PA). The proposed system approximately 100 times has run. In each time, same
database are respectively encrypted by Existing Algorithm and Proposed Algorithm (PA) by copying them.
Finally, the outputs of the proposed system are execution time and decryption time, and calculated in numeric
form.
Throughput: Throughput of the any algorithm can be calculated by the equation (1). It is the ratio of total size
of database divide by total execution time during encryption/decryption.
Throughput = Total Size of Encrypted Database / Total Execution Time in Encryption
…………………………..(1)
Table 1 is showing throughput comparison between AES and Proposed algorithm (PA). In this Table there are
different size (21437/22080/28230) Bytes of dataset have used to calculate throughput.
Throughput of the AES Algorithm is 22.39kBps for 21437 Bytes of Database.
Throughput of the AES Algorithm is 20.82kBps for 22080 Bytes of Database.
Throughput of the AES Algorithm is 20.23kBps for 28230 Bytes of Database.
Throughput of the Proposed Algorithm (PA) is 27.72kBps for 21437 Bytes of Database.
Throughput of the Proposed Algorithm (PA) is 26.55kBps for 22080 Bytes of Database.
Throughput of the Proposed Algorithm (PA) is 25.51kBps for 28230 Bytes of Database.
Table 3: Throughput Comparisons between Proposed and Existing Algorithm.
Database

Size(in Bytes)

AES

Proposed Algorithm

21437
22080

20.82

26.55

28230

www.theijes.com

22.39

Throughput in kBps (Approx.)
27.72

20.23

25.51

The IJES

Page 97
Throughput Comparison Results of Proposed Algorithm with Existing Algorithm
The graph 1 is drawn from the Table 3 to reveal it. In this graph the key length of existing encryption
algorithm like AES is 128-bit, which is equal as compare the proposed algorithm (PA).

Graph 1: Throughput Comparison between AES and Proposed Algorithm
Experimental result is shown in Table 3. Presented result shows the superiority of Proposed
Algorithm (PA) as compare existing algorithms in terms of the execution time and new parameter i.e.
Throughput comparison which is the objective of the research. Another point can be noticed here that Proposed
Algorithm has good performance in terms of power consumption.

IV. CONCLUSION
In this section, throughput performance of the proposed encryption scheme is analyzed in detail. We
discuss the security analysis of the proposed encryption scheme including some important ones like the
complexity of time and space. However, it is a difficult problem to evaluate the specific algorithm, they must
consider many factors: security, the features of algorithm, the complexity of time and space, etc, so research on
the time-consuming of algorithm is one of the important aspects. In the past evaluating time-consuming of
algorithm usually through comparing its time complexity, while in this research we are proposing a new
evaluation model and two evaluation modes to measure the time-consuming of these cryptographic algorithms
and our proposed algorithm.

REFERENCES
[1]
[2]
[3]

Naveen Kolhe, Nikhat Raza and P. S. Patheja, A New Approach of Cryptography for Database Security , International Journal of
Emerging Technology and Advance Engineering, (ISSN 2250-2459), Issue 2, February 2013.
Stallings.W, Cryptography and Network Security, Prentice Hall, 4th Ed, 2005.
Hasan Kadhem, Toshiyuki Amagasa and Hiroyuki Kitagawa “A Novel Framework for Database Security based on Mixed
Cryptography” published in Fourth International Conference on Internet and Web Applications and Services 2009 IEEE.

www.theijes.com

The IJES

Page 98

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...IJERA Editor
 
REU Group 2 - Paper
REU Group 2 - PaperREU Group 2 - Paper
REU Group 2 - PaperScott Payne
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET Journal
 
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption SchemeIRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption SchemeIRJET Journal
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...ijsrd.com
 
Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paperHemanth
 
The Architecture of Cloud Storage Model Based On Confusion Theory
The Architecture of Cloud Storage Model Based On Confusion TheoryThe Architecture of Cloud Storage Model Based On Confusion Theory
The Architecture of Cloud Storage Model Based On Confusion Theoryinventionjournals
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imageseSAT Journals
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelIRJET Journal
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptZiadAlqady
 
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET Journal
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsAM Publications
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 

Was ist angesagt? (17)

IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
 
REU Group 2 - Paper
REU Group 2 - PaperREU Group 2 - Paper
REU Group 2 - Paper
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
 
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption SchemeIRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
IRJET-Efficient Revocation and Secure Attribute-Based Proxy Re-Encryption Scheme
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
 
Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paper
 
The Architecture of Cloud Storage Model Based On Confusion Theory
The Architecture of Cloud Storage Model Based On Confusion TheoryThe Architecture of Cloud Storage Model Based On Confusion Theory
The Architecture of Cloud Storage Model Based On Confusion Theory
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
 
Image encryption
Image encryptionImage encryption
Image encryption
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 

Andere mochten auch

The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...Brian Solis
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016Andrew Chen
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 

Andere mochten auch (6)

The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Ähnlich wie M021201092098

Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of commonIJNSA Journal
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databasesijircee
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...Nexgen Technology
 
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...CSCJournals
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...IJECEIAES
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET Journal
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysisijcisjournal
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data StorageIRJET Journal
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing IJMER
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 

Ähnlich wie M021201092098 (20)

Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
 
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ... KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD ...
 
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...
 
59
5959
59
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
 
Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 

Kürzlich hochgeladen

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

M021201092098

  • 1. The International Journal Of Engineering And Science (IJES) || Volume || 2 ||Issue|| 12 || Pages || 92-98 || 2013 || ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 Throughput Comparison Results of Proposed Algorithm with Existing Algorithm 1 Naveen Kolhe, 2Nikhat Raza 1 2 Department of Computer Science, BIST, Bhopal, India Department of Computer Science, BIST, Bhopal, India ----------------------------------------------------------ABSTRACT---------------------------------------------------------It is known that encryption is one of the strongest security solutions for database, but developing a database encryption strategy must take many factors into consideration. Basically encryption should be performed where data is originating. This paper examines the various issues of implementing database encryption and makes recommendations. This paper is concluding with a benchmark using the proposed design criteria like proposed encryption/decryption algorithm. Presented results are showing the performance of the proposed algorithm. Keywords - Algorithm, Cryptography, Database, Decryption, Encryption,. -------------------------------------------------------------------------------------------------------------------------------------Date of Submission: 02 December 2013 Date of Publication: 15 December 2013 -------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION This Paper titled “Throughput Comparison Results of Proposed Algorithm with Existing Algorithm” enhances a new parameter called throughput results to the other parameters of cryptography algorithm proposed by analyzing the principle of the encryption/decryption algorithm based on symmetric key cryptography. Moreover, the security and performance of the proposed algorithm is also estimated [1] . The symmetric key [2] approves the effectiveness of the proposed method, and it shows advantages of large key space and high-level security. The cipher text generated by this method can be vary in size as the plaintext and is suitable for practical use in the secure transmission of confident ial information over the Internet. The objective of proposed research is to propose a general database [3] cryptography algorithm, without explaining the fixed symmetric or asymmetric encryption algorithms used in that algorithm. The proposed encryption algorithms affect the performance of execution and security analysis. Proposed research will investigate each issue in detail. Our proposed algorithm does rely on a specific symmetric encryption algorithm; proposed symmetric algorithm with the appropriate key size can be used. Also, it is possible to apply different encryption algorithms on different sides. For example, the user could use algorithm A, the other user could apply algorithm B, and the another user could do it with algorithm C. This provides a flexible and more secure encrypting environment. The concept of database security and the word cryptography might be intimidating and complicated. The objective of the report is to develop a tool that mediates the user and the operations to achieve database security goals. A platform independent tool with user-friendly graphical user interface, using already existing techniques and algorithms for cryptographic operations will be resulting product. People need to use the cryptographic operations in order to keep the personal sensitive information files to avert from foreigners in consideration of the security goals. The operations include bunch of algorithms to protect the attacks of foreigners to reach and read personal files that is located in personal compu ter or the owner would like to send somewhere. Cryptographic operations consist of encryption and decryption techniques in computer and computer networking. In effort to keep information’s in safety such as banking account information’s or to provide file transaction without any problem such as password sharing caused such a security methods. II. PROPOSED WORK “Throughput Comparison Results of Proposed Algorithm with Existing Algorithm” shows throughput results of proposed symmetric key encryption/decryption algorithm which is improved version of existing algorithm like AES. The proposed work overcomes the security limitations of existing algorithm by adding a new level of confusion thus resulting in a strong cryptographic algorithm. The proposed algorithm also ensures that encryption and decryption time is similar to that of the existing system. The architecture in the Fig 1 and 2 below shows the process of encryption and decryption: www.theijes.com The IJES Page 92
  • 2. Throughput Comparison Results of Proposed Algorithm with Existing Algorithm Fig1: Architecture diagram for encryption Fig2: Architecture diagram for decryption Proposed Concept: In proposed system, whose basic architecture is shown in Fig 3, apply encryption/decryption process accumulatively while data moves from/to the database. The purpose of such design is to implement encrypted storage satisfying data confidentiality, privacy and integrity. In addition, it makes data usable for the server side, and makes it possible for the database to be joined to other databases by the coordinator. The encryption operation in proposed system is based on mathematically operation. Such operation is needed to draw a full map of the encryption process. Following the convention, E denotes the encryption function, and D denotes the decryption function. The general approach to encryption is the field level; that is, sensitive fields need to be encrypted to protect the information from inside or outside attack. Data is encrypted using a symmetric encryption algorithm. After the process, each side encrypt the data its own. For each database schema S(R1; :::;Rn) , where R1 to Rn are relations created on the database, RE name is encrypted database using the secret key. For database security where information which is stored in the database is encrypted by using proposed symmetric cryptography algorithm which will be based on block cipher concept where each information of database will treat as a block of equal length and then each block will encrypt using a special mathematical set of functions known as Key with the help of proposed encryption algorithm. During encryption or decryption same key will use due to symmetric nature. In the proposed algorithm 128 bits of key length is used so that security of proposed algorithm will be very high. In Fig 3 databases will execute with proposed encryption algorithm and proposed encryption algorithm will call to proposed key to produce encrypted database. In reverse encrypted database will execute with proposed decryption algorithm and this proposed decryption algorithm will call same proposed key to produce original database. Fig 3: Proposed System Architecture www.theijes.com The IJES Page 93
  • 3. Throughput Comparison Results of Proposed Algorithm with Existing Algorithm Following example is showing work of the proposed research. In the employee example, the database is encrypted based on the data classification proposed in this research. Table 1 shows an unencrypted employee database and Table 2 shows the encrypted database. Table-1: Unencrypted Database of Employee as an input S. No Eid Ename Edoj Edob Esalary Eaddress 1 101 ram 12-12-2000 12-12-1980 5000 Bhopal 2 102 Raj 18-1-2003 3-5-1983 5000 Indore 3 103 rajesh 1-12-200 13-6-1978 4000 jabalpur Table-2: encrypted Database of Employee as an output S. No Eid Ename Edoj Edob Esalary Eaddress 1 @s# *&” “:!s3?q !2sd%$#m 3%!nd* A|.ls,#@ 2 %)! &)* !#aw)”|2<’ Nd*&@^> *Nk3^5 @.3d,%& 3 (*^ *&^%$% -wl)*>&2s 3!}sk#ms !&*?| *34hs>?1 The Size of the encrypted Table 2 can be increase; it will depend upon the encryption algorithm, key size and other parameters. Block Diagram of Proposed Encryption: Fig 4 is showing basic block diagram of proposed encryption algorithm. In this user select 128 bits key length and select database. Then proposed encryption algorithm executed after completing execution encrypted data one again stored in the same database which is known encrypted database. Fig 4: Block Diagram of Proposed Encryption www.theijes.com The IJES Page 94
  • 4. Throughput Comparison Results of Proposed Algorithm with Existing Algorithm Proposed Encryption Algorithm: 1. Input Key (KEY) of 16 byte or 128 bits length. 2. Arrange Key in matrix of 4 X 4. 3. Calculate Key Transpose (KeyT) 4. Select plain text (PT) of 16 byte or 128 bits from data base. 5. Arrange plain text in matrix of 4 X 4. 6. Apply XOR operation between key, plain text and key transpose. Out put of this step will be message (M1). 7. Perform permutation function on message (M1. Out put of this step will be message (M2). 8. Perform transpose function on message (M2). Out put of this will be message (M3). 9. Perform row mixing function on message on (M3). Out put of this step will be message (M4). 10. Perform column mixing function on message (M4). Output of this step will be message (M5). 11. Apply XOR operation between message (M5)and key (KEY) value. Out put of this step will be message (M6). 12. Perform permutation function on message (M6). Out put of this step will be message (M7). 13. Message (M7) is the final cipher text. 14. Exit. Block Diagram of Proposed Decryption: Fig 5 is showing basic block diagram of proposed decryption algorithm. In this user select 128 bits key length and select encrypted database. Then proposed decryption algorithm executed after completing execution original data one again stored in the same database which is known original database. Fig 5: Block Diagram of Proposed Decryption www.theijes.com The IJES Page 95
  • 5. Throughput Comparison Results of Proposed Algorithm with Existing Algorithm Proposed Decryption Algorithm: 1. 2. 3. 4. Input Key (KEY) of 16 byte or 128 bits length. Arrange Key in matrix of 4 X 4. Calculate Key Transpose (KeyT) Select cipher text (CT) of 16 byte or 128 bits from data base. 5. Arrange cipher text (CT) in matrix of 4 X 4. 6. Perform reverse permutation function on message (CT). Out put of this step will be message (M1). 7. Apply XOR operation between message (M1)and key (KEY) value. Out put of this step will be message (M2). 8. Perform reverse column mixing function on message (M2). Output of this step will be message (M3). 9. Perform reverse row mixing function on message on (M3). Out put of this step will be message (M4). 10. Perform transpose function on message (M4). Out put of this will be message (M5). 11. Perform reverse permutation function on message (M5). Out put of this step will be message (M6). 12. Apply XOR operation between key, message (M6) and key transpose. Out put of this step will be message (M7). 13. Message (M7) is the original plain text. 14. Exit. Proposed System Attribute: Reliability and Fault Tolerance: The Proposed Software source code should be reliable and of enterprise quality. Availability: The proposed software will be placed in public domain and it will be unpatented in all countries. Anyone would freely be able to use the proposed software. The specification, source code and test data for the proposed software would be available to anyone wishing to compare the algorithms, in accordance with country specific export laws. Security: The proposed software will contain strong cryptographic algorithm, so even if it is created, maintained and distributed from liberal countries (where it is legal to do this), it falls under certain export/import and/or use restrictions in some other parts of the world. Please remember that export/import and/or use of strong cryptography software, providing cryptography hooks or even just communicating technical details about cryptography software is illegal in some parts of the world. So, when you import the reference implementation to your country, re-distribute it from there or even just email technical suggestions or even source patches to the author or other people you are strongly advised to pay close attention to any export/import and/or use laws which apply to you. Anyone associated with this project are not liable for any violations you make here. Accessibility: The accessibility of our product is not dependent to any extra license. Propose software is a freeware product. Thus, every person is able to execute the program on any platform. Correctness and Consistency: The specification of proposed software will be correct and consistent. Portability: The proposed software will be in C# Dot Net programming language (and will execute on any system where its compiler has been ported to). The portability of other software implementations will depend on portability of chosen programming language. Performance: The requirement of the computers is not important for our product. It may be important for big sized files. Otherwise, performance is expected fast enough. The system shall react the user operations immediately. III. RESULTS Dot Net implementation is done to present an evaluation system. For encryption time and decryption time of the existing algorithm with this proposed algorithm, it is necessary to describe the detailed evaluation method, as illustrated in Fig 6. Here only one evaluating mode is taken to find whether the key and the plain text have impact on time consuming of cryptographic algorithms, DDSK (different size of database in the same key). www.theijes.com The IJES Page 96
  • 6. Throughput Comparison Results of Proposed Algorithm with Existing Algorithm Fig 6: Results Evolution Model For this experiment, a laptop Pentium® Dual-Core CPU T4400 @2.20Ghz and 32-bit Operating System is used, in which performance data is collected. In the experiments, the laptop encrypts a various size of database and new parameter Throughput is used to calculate performance of the existing algorithm as well as Proposed Algorithm (PA). The proposed system approximately 100 times has run. In each time, same database are respectively encrypted by Existing Algorithm and Proposed Algorithm (PA) by copying them. Finally, the outputs of the proposed system are execution time and decryption time, and calculated in numeric form. Throughput: Throughput of the any algorithm can be calculated by the equation (1). It is the ratio of total size of database divide by total execution time during encryption/decryption. Throughput = Total Size of Encrypted Database / Total Execution Time in Encryption …………………………..(1) Table 1 is showing throughput comparison between AES and Proposed algorithm (PA). In this Table there are different size (21437/22080/28230) Bytes of dataset have used to calculate throughput. Throughput of the AES Algorithm is 22.39kBps for 21437 Bytes of Database. Throughput of the AES Algorithm is 20.82kBps for 22080 Bytes of Database. Throughput of the AES Algorithm is 20.23kBps for 28230 Bytes of Database. Throughput of the Proposed Algorithm (PA) is 27.72kBps for 21437 Bytes of Database. Throughput of the Proposed Algorithm (PA) is 26.55kBps for 22080 Bytes of Database. Throughput of the Proposed Algorithm (PA) is 25.51kBps for 28230 Bytes of Database. Table 3: Throughput Comparisons between Proposed and Existing Algorithm. Database Size(in Bytes) AES Proposed Algorithm 21437 22080 20.82 26.55 28230 www.theijes.com 22.39 Throughput in kBps (Approx.) 27.72 20.23 25.51 The IJES Page 97
  • 7. Throughput Comparison Results of Proposed Algorithm with Existing Algorithm The graph 1 is drawn from the Table 3 to reveal it. In this graph the key length of existing encryption algorithm like AES is 128-bit, which is equal as compare the proposed algorithm (PA). Graph 1: Throughput Comparison between AES and Proposed Algorithm Experimental result is shown in Table 3. Presented result shows the superiority of Proposed Algorithm (PA) as compare existing algorithms in terms of the execution time and new parameter i.e. Throughput comparison which is the objective of the research. Another point can be noticed here that Proposed Algorithm has good performance in terms of power consumption. IV. CONCLUSION In this section, throughput performance of the proposed encryption scheme is analyzed in detail. We discuss the security analysis of the proposed encryption scheme including some important ones like the complexity of time and space. However, it is a difficult problem to evaluate the specific algorithm, they must consider many factors: security, the features of algorithm, the complexity of time and space, etc, so research on the time-consuming of algorithm is one of the important aspects. In the past evaluating time-consuming of algorithm usually through comparing its time complexity, while in this research we are proposing a new evaluation model and two evaluation modes to measure the time-consuming of these cryptographic algorithms and our proposed algorithm. REFERENCES [1] [2] [3] Naveen Kolhe, Nikhat Raza and P. S. Patheja, A New Approach of Cryptography for Database Security , International Journal of Emerging Technology and Advance Engineering, (ISSN 2250-2459), Issue 2, February 2013. Stallings.W, Cryptography and Network Security, Prentice Hall, 4th Ed, 2005. Hasan Kadhem, Toshiyuki Amagasa and Hiroyuki Kitagawa “A Novel Framework for Database Security based on Mixed Cryptography” published in Fourth International Conference on Internet and Web Applications and Services 2009 IEEE. www.theijes.com The IJES Page 98