Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms

Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms. Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security

KNOWLEDGECUDDLE PUBLICATION
International Journal of Computer Engineering and Science, August- 2014
1
Comparative Analysis of Cryptographic
Algorithms and Advanced Cryptographic
Algorithms
VekariyaMeghna
M.E.(C.E.), student
B.V.M.Engineering College
V V Nagar
________________________________________________________________________________
Abstract –Today is the era of Internet and networks applications. So,Information security is a challenging issue
in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role
of Cryptography is most important in the field of network security. There is a broad range of cryptographic
algorithms that are used for securing networks and presently continuous researches on the new cryptographic
algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES,
RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and
compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
________________________________________________________________________________
I. INTRODUCTION
Cryptography is a word with Greek origins, means“secret writing”. However it is the science andart
totransform the messages to make the secure andimmune against security attacks. It is the technique toprovide secure
communication in presence of adversaries to maintain information securities such asdata confidentiality, data integrity,
authentication,and non-repudiation. The process to convert ordinaryinformation or the plain text into unintelligible text
orthe cipher text in cryptography is called encryption.The cipher text is understandable only to someonewho knows how
to decrypt it. The message orinformation is encrypted using an encryptionalgorithm. This is usually done with the use
ofan encryption key, which specifies how the messageis to be encoded. Any adversary that can see thecipher text should
not be able to determine anythingabout the original message. An authorized party,however, is able to decode the cipher
text usinga decryption algorithm which usually requiresa secret decryption key.There are number of cryptographic
algorithms used for encryption data and most of all fall into two generic categories – Public key system and secret key
system. Symmetric key algorithm is known as secrecy key or shared key algorithm. Because in symmetric key
algorithm a shared key does both the encryption and decryption only one key is used for doing everything.So the
success of algorithm depends on two factors-secrecy of the key and its distribution. Symmetric algorithms are: Data
Encryption Standard (DES), Triple DES (3DES), International Data Encryption algorithm (IDEA), Blowfish,
AdvancedEncryption Standard (AES). Asymmetric key algorithm is also known as public key algorithm. In this
algorithm, there are two keys public and private used for encryption and decryption. Public key is used to encrypt the
message and private key is used to decrypt the message. Asymmetric algorithms are: Diffie-Hellman and RSA Public
Key Encryption.
II. SYMMETRIC KEY ALGORITHMS
Symmetric key algorithms are a class of algorithms for cryptography that use the same cryptographic keys for
both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a simple
transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties
that can be used to maintain a private information link.
A. DES:
DES is a block cipher. It encrypts data in blocks of size 64 bits each. 64 bits of plain text goes as the input to
DES, which produces 64 bits of cipher text. The key length is 64 bits [3]. Cryptanalyst can perform cryptanalysis by
exploiting the characteristic of DES algorithm but no one has succeeded in finding out the weakness. DES results in a
KNOWLEDGECUDDLE PUBLICATION
International Journal of Computer Engineering and Science, August- 2014
2
permutation among the 2^64 possible arrangement of 64 bits, each of which may be either 0 or 1. Each block of 64 bits
is divided into two blocks of 32 bits each, a left half block L and right half R. The DES algorithm turns 64-bit messages
block M into a 64-bit cipher block C. If each 64-bit block is encrypted individually, then the mode of encryption is
called Electronic Code Book (ECB) mode. There are two other modes of DES encryption, namely Chain Block Coding
(CBC) and Cipher Feedback (CFB), which make each cipher block dependent on all the previous messages blocks
through an initial XOR operation.
B. Triple DES:
Triple DES is an alternative to DES. 3DES takes a 64-bit block of data and performs the operations encrypt,
decrypt and encrypt. The key is always presented as a 64-bit block, every 8th bit of which is ignored. Use of multiple
length keys leads us to the Triple-DES algorithm, in which DES is applied three times. we consider a triple length key
to consist of three 56-bit keys K1, K2, K3 then encryption is as follows: [2] Encrypt with K1-> Decrypt with K2 ->
Encrypt with K3 Decryption is the reverse process: Encrypt with K3-> Decrypt with K2 -> Encrypt with K1.
C. AES:
AES is based on a design principle known as a substitution-permutation network. AES has 128-bit block size and a
key size of 128,192 or 256 bits [2]. AES operates on a 4×4 column-major order matrix of bytes, termed the state. Most
AES calculations are done in a special finite field. The AES cipher is specified as a number of repetitions of
transformation rounds that convert the input plaintext into the final output of cipher text. The number of cycles of
repetition are as follows:
 10 cycles of repetition for 128 bit keys.
 12 cycles of repetition for 192 bit keys.
 14 cycles of repetition for 256 bit keys.
Each round of encryption process requires the following four types of operations: Sub-Bytes, ShiftRows, MixColumns,
XorRoundkey. Decryption is the reverse process of encryption and using inverse functions: Inv. SubBytes, Inv.
ShiftRows, Inv. MixColumns.
D. RC4
RC4 is recognized as the most commonly utilized stream cipher in the world of cryptography. RC4 has a use in
both encryption and decryption while the data stream undergoes XOR together with a series of generated keys. It takes
in keys of random lengths and this is known as a producer of pseudo arbitrary numbers.The output is then XORed
together with the stream of data in order to generate a newly-encrypted data.
D. BLOWFISH:
Blowfish is a 64-bit symmetric block cipher with variable length key. The algorithm operates with two parts: a
key expansion part and a data- encryption part. The role of key expansion part is to converts a key of at most 448 bits
into several sub key arrays totaling 4168 bytes [8]. The data encryption occurs via a 16-round Feistelnetwork. It is only
suitable for application where the key does not change often, like communications link or an automatic file encryption.
It is significantly faster than most encryption algorithms when implemented on 32-bit microprocessors with large data
caches.
III. ASYMMETRIC KEY ALGORITHMs
Symmetric key algorithms are a class of algorithms for cryptography that use the same cryptographic keys for both
encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a simple transformation
to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be
used to maintain a private information link.
A. RSA
RSA is a most popular and proven asymmetric cryptography algorithm. RSA is based on the mathematical fact that
is easy to find the private and public keys based on the very large prime numbers. [2] Encryption: compute c = m^e
mod n, where the e and n are the public key, and m is the message block. The c is the encrypted message. Decryption:
KNOWLEDGECUDDLE PUBLICATION
International Journal of Computer Engineering and Science, August- 2014
3
The private key d is used to decrypt messages. Compute: m = c^d mod n, where n is the modulus and d is the private
key. In RSA, compare to encryption process, decryption process takes more time.
IV. ENHANCED CRYPTOGRAPHIC ALGORITHMS
A. A New Approach towards Encryption Schemes:Byte – Rotation Encryption Algorithm
It is necessary to apply effective encryption / decryption methods to enhance data security.The multiple
encryption and multilevel encryption system provides sufficient security. But the performance and speed of these
systems is low. Their complexity is very high. In this research paper, a new encryption algorithm named“Byte –
Rotation Encryption Algorithm (BREA)” is proposed which is applied on different blocks of plaintextand executes in
parallel manner through multithreading concept of single processor system. This paper is an attempt to invent a new
encryption model which is more secure and very fast to others.
The BREA algorithm has the following features…
1. It is a Symmetric Key Block Cipher Algorithm.
2. Each block size is of 16 bytes.
3. Size of Key matrix is 16 bytes.
4. Values of Key matrix are randomly selected and ranging from 1 to 26.
5. Mono alphabetic substitution concept is followed.
6. Byte-Rotation technique is used.
The steps of proposed Byte-Rotation Encryption Algorithm:
1. The letters of alphabet are assigned numerical valuesfrom 1 to 26 in sequence i.e. A, B, C, ......., X, Y, Zassigned
numerical values 1, 2, 3, ........., 24, 25, 26respectively, the digits from 1 to 9 assigned numericalvalues from 27 to 35
respectively and the zero (0)remains as it is.
2. The plaintext is partitioned into fixed-length blocks ofsize 16 bytes (or 128 bits) each. These blocks arerepresented
by a matrix Mp.
3. The values of Key matrix (K) are randomly selectedfrom the range 1 to 26. The size of Key matrix isequivalent to the
block size of plaintext i.e. 16 bytes.
K = [k1, k2, ......................., k16 ]
K = Random (1, 26, 16)
4. Calculate the Transpose matrix of plaintext blockmatrix (Mp), which is denoted by MpT.
5. Calculate encrypted Key matrix Ke using the followingformula:Ke = K mod 2
6. Add both the matrices MpT and Ke and the resultantmatrix is denoted by Cpk.Cpk = MpT + Ke
7. Rotate first three rows horizontally of Cpk matrix suchthat rotate one byte from first row, rotate two bytesfrom
second row, rotate three bytes from third rowand fourth row remains untouched. The resultantmatrix is denoted by Chr .
8. Rotate first three columns vertically of Chr matrix suchthat rotate one byte from first column, rotate two bytes from
second column, rotate threebytes from thirdcolumn and fourth column remains untouched. Theresultant matrix is
denoted by Cvr.
9. Replace numeric values of Cvr matrix by theircorresponding letters and if 36 exist in Cvrmatrix, it isreplaced by the
special character #. The resultantmatrix is denoted by Ce.
Block Wise Parallel Encryption System which is differentand efficient from the existing systems as follows:
1. System is developed in such a way that it is platformindependent. Where, the existing systems are limited toplatform
dependent design.
2. It is developed with the idea of multiple and multilevelencryption system.
3. The number of encryption algorithms is used; hence thesecurity offered is very high.
4. This proposed system is developed in order to support notonly text files but also images and media files. But
stillmany of the existing systems are developed in order to suitbasic text formats.
The input plaintext which is to be fed into our system ischosen at first. Then, a key phrase is entered for
dataauthentication. Then plaintext data is divided into blocks.
Four blocks passed into four threads of BREA at a time.These threads executes simultaneously by usingmultithreading
technique. After encryption, these blockssend to receiver where the blocks are passed into theReverse – BREA in
parallel manner. Then the cipher text I decrypted into plaintext and all the blocks of plaintextscrambled together to get
KNOWLEDGECUDDLE PUBLICATION
International Journal of Computer Engineering and Science, August- 2014
4
the original message. Since thealgorithm executes parallel using multithreading technique,the execution speed and
performance of the model increases.
Multithreading:
It is an ability of OS to support multiplethreads of execution within a single process. A thread is asmall block
of a program / execution unit.
Uses of Multi-Threading:
 Division of work
 Foreground & background work
 Asynchronous processing
 Pipeline/Parallel execution
 Organization of work
 Modular program structure
Benefits of Threads:
 Takes less time to create a new thread than aprocess
 Less time to terminate a thread than a process
 Less time to switch between two threads within thesame process
 Threads within the same process share memory andother resources, they can communicate with eachother
without invoking the kernel. So the modelis very fast to other suggested models.
B. Advanced Encryption Algorithm Using Fuzzy Logic
Today the security is the main issue in data communication. Encryption can provide a fine solution for it. The
encryption algorithm is the mathematical procedure for performing encryption on data. After conducting a research on
currently using encryption algorithms, we have identified that all these algorithms only concern about security. But
consuming a less processing power is also equally important as the security for connections with low bandwidths. The
proposed algorithm supports for user desired security level and processing level. It is a block cipher which is a
derivation on the feistelnetwork architecture. The algorithm provides security levels and their corresponding processing
levels by using various keys for the encryption/decryption process. This facility is achieved by using fuzzy logic. The
results of the proposed encryption algorithm will be analyzed by comparing with other existing encryption algorithms.
Finally the aim of the research is to come up with an encryption algorithm which can provide either low processing or
high security according to user’s requirement which will be more advanced than the existing encryption algorithms.
Implementing fuzzy logic:
Fuzzy logic is a problem-solving control system methodology that presents itself to implementation in systems
ranging from simple, small, embedded micro-controllers to large, networked, multi-channel PC or workstation-based
data acquisition and control systems. Fuzzy logic provides a simple way to arrive at a definite conclusion based upon
vague, ambiguous, imprecise, noisy, or missing input information. Infuzzy logic rules and membership sets are used to
make a decision. To achieve security and low processing, the algorithm uses variable keys. 0th position gives a fully
low processing algorithm and 1st
position gives fully secured algorithm. The fuzzification changes depending on the key
size and the number of mapping tables of the encryption algorithm. Users can input the desired key. One character will
be 8 bit long. The main algorithm structure defines different key sizes up to 128bit. User can enter desired key-
(application defines as the password) and also depending on the number of mapping tables’ algorithm would allocate
weight dynamically. Allocation of the weights will differ from 0.0 to 1.0 range; and the number of security levels would
be vary from 1-16.The number of rounds will be determined by pre-defined mapping tables and the users initial input.
Mapping tables are predefined in the algorithm and consists of mathematically defined values, and then those values
will dynamically choose the relevant algorithm procedure once the user input the key to encryption.
Best case Scenario-Sample user input the key size of 16 Byte value and provides mapping table number which
can be differentiated between 1 and 8. Assume that the user has selected the option of encrypting with the number 8
mapped table. The algorithm will allocate a higher weight to the provided user inputs since the initial key size is 16
Bytes that will resulted in providing the highest number of rounds which is 16. Eventually the highest value of input key
size will derive a higher weight thus making the highest level of rounds and the highest level of security.
Worst case Scenario-Sample user input the key size of 1 Byte value and provides mapping table numberwhich
can be differentiated between 1 and 8. Assume that the user has selected the option of encrypting with the number 1
mapped table. The algorithm will allocate a lower weight to the provided user inputs since the initial key size is 1 Bytes,
KNOWLEDGECUDDLE PUBLICATION
International Journal of Computer Engineering and Science, August- 2014
5
eventually the lowest value of input key size will derive a lower weight. Then it will be reflected in the security rounds
of the algorithm and which will be resulted in lowest level of security.
Normal day Scenario-Sample user input the key size of 8 Byte value and provides mapping table number
which can be differentiated between 1 and 8. Assume that the user has selected the option of encrypting with the
number 4 mapped table. The algorithm will allocate a higher weight than the worst case scenario but lower weight that
the best case scenario to the provided user inputs since the initial key size is 8 Bytes, eventually the modest value of
input key size will derive a middle weight value. Then it will be derived the number of security rounds which in this
case is 8 and then the modest level of security will be enforced in the algorithm. Following are some of fuzzy logic
rules.
• If Key length is 1 byte and the Level is 0 : number of Cycles is 0
• If Key length is 2 byte and the Level is 0 : number of Cycles is 1
• If Key length is 3 byte and the Level is 0 : number of Cycles is 1
• If Key length is 4 byte and the Level is 0 : number of Cycles is 2
Like this there are 144 fuzzy rules.
C. Advance cryptography algorithm for improving data security
The proposed algorithm has the batter speed compared with the comparing encryption algorithm. Nevertheless,
the algorithm improves encryption security by inserting the symmetric layer. The algorithm will be useful to the
applications which require the same procedure of encryption and decryption.
Proposed Key Generation Steps:
1. Select or create any private key of Size 256 X 2 bits or 64 characters.
2. Size of selected key will be varying from 128 bits to 512 bits or 16 to 64 characters.
3. We can choose any character from 0 to 255 ASCII code.
4. Use of 64 * 8 key that means 512 bits in length.
5. Divide 64 bytes into 4 blocks of 16 bytes likes Key_Block1, Key_Block2, Key_Block3, and Key_Block4.
6. Apply XOR operation between Block1 and Block3. Results will store in new Key_Block13.
7. Apply XOR operation between Block2 and Block13. Results will store in new Key_Block213.
8. Apply XOR operation between Key_Block213 and Key_Block4. Results will store in new Key_Block4213.
9. Repeat Step 7, 8, 9 till (random number / 4).
10. Exit
Steps of proposed Algorithm:
1. Initially select plane text of 16 bytes (or we can vary from 16 to 64 depend on requirement).
2. Initially insert key of size 16 bytes ( depend on plane text value)
3. Apply XOR operation between key (Key_Block4213) and plain text block (Text_Block). Result will store in Cipher
Block1.
4. Apply right circular shift with 3 values. Result will store in new Cipher_Block2.
5. Apply XOR operation between Cipher_Block2 and Key_Block2. Result will store in new Cipher_Block3.
6. Apply XOR operation between Cipher_Block3 and Key_Block4. Result will store in Cipher_Block4.
7. Cipher_Block4 is the input of the next round as a plane text block.
8. Repeat step 1 to 7 till (Encryption Number / 4).
9. Exit.
The important thing of our proposed method is that it is almost impossible to break the encryption algorithm without
knowing the exact key value.
V. EXPERIMENTAL RESULTS
AES and Blowfish algorithms can be implemented to different audio files. Comparison of encryption time has
been given in the following table 1, and it shows the Average time of AES and BLOWFISH algorithm for different
audio files encryption. Next, Comparison of decryption time has been given in the following table 2, and it shows the
Average time of AES and BLOWFISH algorithm for different audio files decryption. Table 3, shows comparison of
various cryptographic algorithms based on different factors.
KNOWLEDGECUDDLE PUBLICATION
International Journal of Computer Engineering and Science, August- 2014
6
Table 1: Average time of Encryption
Table 2: Average time of decryption
Table 3: Comparison of different cryptographic algorithms
KNOWLEDGECUDDLE PUBLICATION
International Journal of Computer Engineering and Science, August- 2014
7
Here, The Advanced cryptographic Algorithm (with 265bit block size in this thesis) and “A new
Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm”
algorithm (with 128-bit block size) and “Effect of Security Increment to Symmetric Data Encryption through AES
Methodology” algorithm (with 128-bit block size) have been implemented on a number of different data files like text,
pdf and image varying types of content and sizes of a wide range. But here we are only showing result of text file.
Encryption and Decryption time of Various Text files comparisons shown in table 4 and table 5 respectively.
Table 4: Encryption time comparison of text files
Table 5: Decryption time comparison of text files
KNOWLEDGECUDDLE PUBLICATION
International Journal of Computer Engineering and Science, August- 2014
8
VI. CONCLUSION
Cryptography algorithm is the science in secret code. Rapidly rising cybercrime and the growing prospect of the
internet being used as a medium for attacks create a major challenge for network security. Some well-known
cryptographicalgorithms have been analyzed in this paper to demonstrate the basic differences between the existing
encryption techniques.It was concluded that Blowfish has better performance than AES in terms of Average time.“Byte
– Rotation Encryption Algorithm (BREA)” allows all the blocks to processparallel in CPU. Because of parallel
execution, theprocessing speed of the system will enhance. Encryption algorithm using fuzzy logic which can
provideeither low processing or high security according to user’s requirement which will be more advanced than
theexisting encryption algorithms. From the result it is clear that our “Advanced technique” is batter result producing as
compared “DJSA symmetric key algorithm” and “Effect of Security Increment to Symmetric Data Encryption through
AES Methodology”. If any user emphasis on security then he can use our proposed algorithm. No one can guarantee
100% security. But we can work toward 100% risk acceptance. A good cryptographic system strikes a balance between
what is possible and what is acceptable. Thus considerable research effort is still required for secured communication.
REFERENCES
[1] AtulKahate “cryptography and network security”, Tata McGraw-Hill publishing company, New Delhi, 2008.
[2] William Stallings, “Network Security Essentials(Applications and Standards)”, Pearson Education,2004.
[3] W. Stallings, “Cryptography and Network Security”, Prentice Hall, 1995.
[4] National Bureau of Standards, “Data EncryptionStandard, ” FIPS Publication 46, 1977.
[5] DriptoChatterjee, JoyshreeNath, SuvadeepDasgupta, AsokeNath “A new Symmetric key Cryptography Algorithm
using extended MSA method: DJSA symmetric key algorithm” published in 2011 International Conference on
Communication Systems and Network Technologies, 978-0-7695-4437-3/11 $26.00 © 2011 IEEE.
[6] B. Schneier, Applied Cryptography, John Wiley & Sons, New York, 1994
[7] SairamNatarajan #1,“A Novel Approachfor Data Security Enhancement Using MultiLevel Encryption scheme”,
Researchpaper, IJCSIT, Vol. 2 (1), 2011, 469-473.
[8] Symmetric key cryptography using random key generator, A.Nath, S.Ghosh, M.A.Mallik, Proceedings of
International conference on SAM-2010 held at Las Vegas(USA) 12-15 July,2010, Vol-2,P-239-244.
[9] Neal Koblitz “A Course in Number Theory and Cryptography” Second Edition Published by Springer-Verlag.
[10] By Klaus Felten “An Algorithm for Symmetric Cryptography with a wide range of scalability” published by 2nd
International Workshop on Embedded Systems, Internet Programming and Industial IT.

Recomendados

82 86 von
82 8682 86
82 86Editor IJARCET
1K views5 Folien
Comparative Study of Cryptography Algorithms and Its’ Applications von
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
63 views8 Folien
researchpaperfinal1 von
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
140 views5 Folien
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA... von
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
50 views16 Folien
Simulated Analysis and Enhancement of Blowfish Algorithm von
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithmiosrjce
807 views7 Folien
Overview on Symmetric Key Encryption Algorithms von
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
1K views4 Folien

Más contenido relacionado

Was ist angesagt?

B03302007012 von
B03302007012B03302007012
B03302007012theijes
328 views6 Folien
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers von
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersIJNSA Journal
801 views20 Folien
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w... von
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...International Journal of Science and Research (IJSR)
788 views5 Folien
Different date block size using to evaluate the performance between different... von
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
379 views9 Folien
Implementation of-hybrid-cryptography-algorithm von
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmIjcem Journal
1.2K views17 Folien
Cs8792 cns - unit iv von
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit ivArthyR3
570 views153 Folien

Was ist angesagt?(20)

B03302007012 von theijes
B03302007012B03302007012
B03302007012
theijes328 views
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers von IJNSA Journal
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
IJNSA Journal801 views
Different date block size using to evaluate the performance between different... von IJCNCJournal
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
IJCNCJournal379 views
Implementation of-hybrid-cryptography-algorithm von Ijcem Journal
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal1.2K views
Cs8792 cns - unit iv von ArthyR3
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
ArthyR3570 views
Hybrid Encryption for Database Security von IRJET Journal
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal46 views
Advanced Encryption Standard (AES) with Dynamic Substitution Box von Hardik Manocha
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Hardik Manocha1.3K views
Advanced Encryption Standard (AES) von Hardik Manocha
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha8K views
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe... von IOSR Journals
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals517 views
IRJET- Comparative Analysis of Encryption Techniques von IRJET Journal
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal15 views
A Review on Various Most Common Symmetric Encryptions Algorithms von ijsrd.com
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com492 views
Hash von Tazo Al
HashHash
Hash
Tazo Al882 views
A performance evaluation of common von IJNSA Journal
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
IJNSA Journal209 views

Destacado

GLOBAL BROCHURE von
GLOBAL BROCHUREGLOBAL BROCHURE
GLOBAL BROCHUREHannah Steer
247 views11 Folien
Crowdsourcing Freddy Krueger: The Creepypasta Cultural Phenomena von
Crowdsourcing Freddy Krueger: The Creepypasta Cultural PhenomenaCrowdsourcing Freddy Krueger: The Creepypasta Cultural Phenomena
Crowdsourcing Freddy Krueger: The Creepypasta Cultural PhenomenaPatrick Sauriol
916 views18 Folien
Escrs londres recalde jose ignacio von
Escrs londres recalde jose ignacio Escrs londres recalde jose ignacio
Escrs londres recalde jose ignacio Jose Ignacio Recalde Yurrita
224 views6 Folien
Bulletin municipal 2016 de Bazoges en Pareds von
Bulletin municipal 2016 de Bazoges en Pareds  Bulletin municipal 2016 de Bazoges en Pareds
Bulletin municipal 2016 de Bazoges en Pareds Commune de Bazoges en Pareds
2.2K views64 Folien
Partnering for transformation: Freeformers & Barclays – Emma Cerrone, CEO & C... von
Partnering for transformation: Freeformers & Barclays – Emma Cerrone, CEO & C...Partnering for transformation: Freeformers & Barclays – Emma Cerrone, CEO & C...
Partnering for transformation: Freeformers & Barclays – Emma Cerrone, CEO & C...Kariel Parian
963 views6 Folien
Umfrage Flirten im Ulraub von
Umfrage Flirten im UlraubUmfrage Flirten im Ulraub
Umfrage Flirten im UlraubLTUR_Presse
386 views6 Folien

Destacado(10)

Crowdsourcing Freddy Krueger: The Creepypasta Cultural Phenomena von Patrick Sauriol
Crowdsourcing Freddy Krueger: The Creepypasta Cultural PhenomenaCrowdsourcing Freddy Krueger: The Creepypasta Cultural Phenomena
Crowdsourcing Freddy Krueger: The Creepypasta Cultural Phenomena
Patrick Sauriol916 views
Partnering for transformation: Freeformers & Barclays – Emma Cerrone, CEO & C... von Kariel Parian
Partnering for transformation: Freeformers & Barclays – Emma Cerrone, CEO & C...Partnering for transformation: Freeformers & Barclays – Emma Cerrone, CEO & C...
Partnering for transformation: Freeformers & Barclays – Emma Cerrone, CEO & C...
Kariel Parian963 views
Umfrage Flirten im Ulraub von LTUR_Presse
Umfrage Flirten im UlraubUmfrage Flirten im Ulraub
Umfrage Flirten im Ulraub
LTUR_Presse386 views
quy trinh quyet dinh mua - hanh vi khach hang-COLOR GROUP von MyLan2014
quy trinh quyet dinh mua - hanh vi khach hang-COLOR GROUPquy trinh quyet dinh mua - hanh vi khach hang-COLOR GROUP
quy trinh quyet dinh mua - hanh vi khach hang-COLOR GROUP
MyLan2014181 views
The Art of Twitter von hwoo
The Art of TwitterThe Art of Twitter
The Art of Twitter
hwoo262 views

Similar a Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms

82 86 von
82 8682 86
82 86Editor IJARCET
425 views5 Folien
A Survey On Cryptography Algorithms von
A Survey On Cryptography AlgorithmsA Survey On Cryptography Algorithms
A Survey On Cryptography AlgorithmsBryce Nelson
2 views5 Folien
Implementation of aes and blowfish algorithm von
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
1.3K views4 Folien
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-... von
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...ams1ams11
6 views33 Folien
Unit 2 von
Unit 2Unit 2
Unit 2Vinod Kumar Gorrepati
1K views13 Folien
Computer Cryptography and Encryption [by: Magoiga].pptx von
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxmagoigamtatiro1
10 views43 Folien

Similar a Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms(20)

A Survey On Cryptography Algorithms von Bryce Nelson
A Survey On Cryptography AlgorithmsA Survey On Cryptography Algorithms
A Survey On Cryptography Algorithms
Bryce Nelson2 views
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-... von ams1ams11
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
ams1ams116 views
Computer Cryptography and Encryption [by: Magoiga].pptx von magoigamtatiro1
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
magoigamtatiro110 views
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a... von IJCNCJournal
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal94 views
Design and Implementation of New Encryption algorithm to Enhance Performance... von IOSR Journals
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals531 views
Aes 128 192_256_bits_project_report von sakhi rehman
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman3.5K views
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS von IJNSA Journal
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
IJNSA Journal37 views
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ... von IJEACS
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
IJEACS62 views
Day5 von Jai4uk
Day5Day5
Day5
Jai4uk1.2K views
Seminar on Encryption and Authenticity von Hardik Manocha
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha1.1K views
New Technique Using Multiple Symmetric keys for Multilevel Encryption von IJERA Editor
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor41 views
Improving Network Security by Modifying RSA Algorithm von paperpublications3
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
paperpublications3200 views
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES von Valerie Felton
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton20 views

Último

START Newsletter 3 von
START Newsletter 3START Newsletter 3
START Newsletter 3Start Project
6 views25 Folien
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... von
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...csegroupvn
6 views210 Folien
Pitchbook Repowerlab.pdf von
Pitchbook Repowerlab.pdfPitchbook Repowerlab.pdf
Pitchbook Repowerlab.pdfVictoriaGaleano
5 views12 Folien
REACTJS.pdf von
REACTJS.pdfREACTJS.pdf
REACTJS.pdfArthyR3
35 views16 Folien
sam_software_eng_cv.pdf von
sam_software_eng_cv.pdfsam_software_eng_cv.pdf
sam_software_eng_cv.pdfsammyigbinovia
9 views5 Folien
_MAKRIADI-FOTEINI_diploma thesis.pptx von
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptxfotinimakriadi
10 views32 Folien

Último(20)

Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... von csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn6 views
REACTJS.pdf von ArthyR3
REACTJS.pdfREACTJS.pdf
REACTJS.pdf
ArthyR335 views
_MAKRIADI-FOTEINI_diploma thesis.pptx von fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi10 views
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf von AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure6 views
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) von Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx von lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78165 views
SUMIT SQL PROJECT SUPERSTORE 1.pptx von Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 22 views
Design_Discover_Develop_Campaign.pptx von ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth645 views
Design of machine elements-UNIT 3.pptx von gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy34 views
Web Dev Session 1.pptx von VedVekhande
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptx
VedVekhande13 views
Ansari: Practical experiences with an LLM-based Islamic Assistant von M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous7 views
fakenews_DBDA_Mar23.pptx von deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra816 views

Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms

  • 1. KNOWLEDGECUDDLE PUBLICATION International Journal of Computer Engineering and Science, August- 2014 1 Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms VekariyaMeghna M.E.(C.E.), student B.V.M.Engineering College V V Nagar ________________________________________________________________________________ Abstract –Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms. Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security ________________________________________________________________________________ I. INTRODUCTION Cryptography is a word with Greek origins, means“secret writing”. However it is the science andart totransform the messages to make the secure andimmune against security attacks. It is the technique toprovide secure communication in presence of adversaries to maintain information securities such asdata confidentiality, data integrity, authentication,and non-repudiation. The process to convert ordinaryinformation or the plain text into unintelligible text orthe cipher text in cryptography is called encryption.The cipher text is understandable only to someonewho knows how to decrypt it. The message orinformation is encrypted using an encryptionalgorithm. This is usually done with the use ofan encryption key, which specifies how the messageis to be encoded. Any adversary that can see thecipher text should not be able to determine anythingabout the original message. An authorized party,however, is able to decode the cipher text usinga decryption algorithm which usually requiresa secret decryption key.There are number of cryptographic algorithms used for encryption data and most of all fall into two generic categories – Public key system and secret key system. Symmetric key algorithm is known as secrecy key or shared key algorithm. Because in symmetric key algorithm a shared key does both the encryption and decryption only one key is used for doing everything.So the success of algorithm depends on two factors-secrecy of the key and its distribution. Symmetric algorithms are: Data Encryption Standard (DES), Triple DES (3DES), International Data Encryption algorithm (IDEA), Blowfish, AdvancedEncryption Standard (AES). Asymmetric key algorithm is also known as public key algorithm. In this algorithm, there are two keys public and private used for encryption and decryption. Public key is used to encrypt the message and private key is used to decrypt the message. Asymmetric algorithms are: Diffie-Hellman and RSA Public Key Encryption. II. SYMMETRIC KEY ALGORITHMS Symmetric key algorithms are a class of algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. A. DES: DES is a block cipher. It encrypts data in blocks of size 64 bits each. 64 bits of plain text goes as the input to DES, which produces 64 bits of cipher text. The key length is 64 bits [3]. Cryptanalyst can perform cryptanalysis by exploiting the characteristic of DES algorithm but no one has succeeded in finding out the weakness. DES results in a
  • 2. KNOWLEDGECUDDLE PUBLICATION International Journal of Computer Engineering and Science, August- 2014 2 permutation among the 2^64 possible arrangement of 64 bits, each of which may be either 0 or 1. Each block of 64 bits is divided into two blocks of 32 bits each, a left half block L and right half R. The DES algorithm turns 64-bit messages block M into a 64-bit cipher block C. If each 64-bit block is encrypted individually, then the mode of encryption is called Electronic Code Book (ECB) mode. There are two other modes of DES encryption, namely Chain Block Coding (CBC) and Cipher Feedback (CFB), which make each cipher block dependent on all the previous messages blocks through an initial XOR operation. B. Triple DES: Triple DES is an alternative to DES. 3DES takes a 64-bit block of data and performs the operations encrypt, decrypt and encrypt. The key is always presented as a 64-bit block, every 8th bit of which is ignored. Use of multiple length keys leads us to the Triple-DES algorithm, in which DES is applied three times. we consider a triple length key to consist of three 56-bit keys K1, K2, K3 then encryption is as follows: [2] Encrypt with K1-> Decrypt with K2 -> Encrypt with K3 Decryption is the reverse process: Encrypt with K3-> Decrypt with K2 -> Encrypt with K1. C. AES: AES is based on a design principle known as a substitution-permutation network. AES has 128-bit block size and a key size of 128,192 or 256 bits [2]. AES operates on a 4×4 column-major order matrix of bytes, termed the state. Most AES calculations are done in a special finite field. The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of cipher text. The number of cycles of repetition are as follows:  10 cycles of repetition for 128 bit keys.  12 cycles of repetition for 192 bit keys.  14 cycles of repetition for 256 bit keys. Each round of encryption process requires the following four types of operations: Sub-Bytes, ShiftRows, MixColumns, XorRoundkey. Decryption is the reverse process of encryption and using inverse functions: Inv. SubBytes, Inv. ShiftRows, Inv. MixColumns. D. RC4 RC4 is recognized as the most commonly utilized stream cipher in the world of cryptography. RC4 has a use in both encryption and decryption while the data stream undergoes XOR together with a series of generated keys. It takes in keys of random lengths and this is known as a producer of pseudo arbitrary numbers.The output is then XORed together with the stream of data in order to generate a newly-encrypted data. D. BLOWFISH: Blowfish is a 64-bit symmetric block cipher with variable length key. The algorithm operates with two parts: a key expansion part and a data- encryption part. The role of key expansion part is to converts a key of at most 448 bits into several sub key arrays totaling 4168 bytes [8]. The data encryption occurs via a 16-round Feistelnetwork. It is only suitable for application where the key does not change often, like communications link or an automatic file encryption. It is significantly faster than most encryption algorithms when implemented on 32-bit microprocessors with large data caches. III. ASYMMETRIC KEY ALGORITHMs Symmetric key algorithms are a class of algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. A. RSA RSA is a most popular and proven asymmetric cryptography algorithm. RSA is based on the mathematical fact that is easy to find the private and public keys based on the very large prime numbers. [2] Encryption: compute c = m^e mod n, where the e and n are the public key, and m is the message block. The c is the encrypted message. Decryption:
  • 3. KNOWLEDGECUDDLE PUBLICATION International Journal of Computer Engineering and Science, August- 2014 3 The private key d is used to decrypt messages. Compute: m = c^d mod n, where n is the modulus and d is the private key. In RSA, compare to encryption process, decryption process takes more time. IV. ENHANCED CRYPTOGRAPHIC ALGORITHMS A. A New Approach towards Encryption Schemes:Byte – Rotation Encryption Algorithm It is necessary to apply effective encryption / decryption methods to enhance data security.The multiple encryption and multilevel encryption system provides sufficient security. But the performance and speed of these systems is low. Their complexity is very high. In this research paper, a new encryption algorithm named“Byte – Rotation Encryption Algorithm (BREA)” is proposed which is applied on different blocks of plaintextand executes in parallel manner through multithreading concept of single processor system. This paper is an attempt to invent a new encryption model which is more secure and very fast to others. The BREA algorithm has the following features… 1. It is a Symmetric Key Block Cipher Algorithm. 2. Each block size is of 16 bytes. 3. Size of Key matrix is 16 bytes. 4. Values of Key matrix are randomly selected and ranging from 1 to 26. 5. Mono alphabetic substitution concept is followed. 6. Byte-Rotation technique is used. The steps of proposed Byte-Rotation Encryption Algorithm: 1. The letters of alphabet are assigned numerical valuesfrom 1 to 26 in sequence i.e. A, B, C, ......., X, Y, Zassigned numerical values 1, 2, 3, ........., 24, 25, 26respectively, the digits from 1 to 9 assigned numericalvalues from 27 to 35 respectively and the zero (0)remains as it is. 2. The plaintext is partitioned into fixed-length blocks ofsize 16 bytes (or 128 bits) each. These blocks arerepresented by a matrix Mp. 3. The values of Key matrix (K) are randomly selectedfrom the range 1 to 26. The size of Key matrix isequivalent to the block size of plaintext i.e. 16 bytes. K = [k1, k2, ......................., k16 ] K = Random (1, 26, 16) 4. Calculate the Transpose matrix of plaintext blockmatrix (Mp), which is denoted by MpT. 5. Calculate encrypted Key matrix Ke using the followingformula:Ke = K mod 2 6. Add both the matrices MpT and Ke and the resultantmatrix is denoted by Cpk.Cpk = MpT + Ke 7. Rotate first three rows horizontally of Cpk matrix suchthat rotate one byte from first row, rotate two bytesfrom second row, rotate three bytes from third rowand fourth row remains untouched. The resultantmatrix is denoted by Chr . 8. Rotate first three columns vertically of Chr matrix suchthat rotate one byte from first column, rotate two bytes from second column, rotate threebytes from thirdcolumn and fourth column remains untouched. Theresultant matrix is denoted by Cvr. 9. Replace numeric values of Cvr matrix by theircorresponding letters and if 36 exist in Cvrmatrix, it isreplaced by the special character #. The resultantmatrix is denoted by Ce. Block Wise Parallel Encryption System which is differentand efficient from the existing systems as follows: 1. System is developed in such a way that it is platformindependent. Where, the existing systems are limited toplatform dependent design. 2. It is developed with the idea of multiple and multilevelencryption system. 3. The number of encryption algorithms is used; hence thesecurity offered is very high. 4. This proposed system is developed in order to support notonly text files but also images and media files. But stillmany of the existing systems are developed in order to suitbasic text formats. The input plaintext which is to be fed into our system ischosen at first. Then, a key phrase is entered for dataauthentication. Then plaintext data is divided into blocks. Four blocks passed into four threads of BREA at a time.These threads executes simultaneously by usingmultithreading technique. After encryption, these blockssend to receiver where the blocks are passed into theReverse – BREA in parallel manner. Then the cipher text I decrypted into plaintext and all the blocks of plaintextscrambled together to get
  • 4. KNOWLEDGECUDDLE PUBLICATION International Journal of Computer Engineering and Science, August- 2014 4 the original message. Since thealgorithm executes parallel using multithreading technique,the execution speed and performance of the model increases. Multithreading: It is an ability of OS to support multiplethreads of execution within a single process. A thread is asmall block of a program / execution unit. Uses of Multi-Threading:  Division of work  Foreground & background work  Asynchronous processing  Pipeline/Parallel execution  Organization of work  Modular program structure Benefits of Threads:  Takes less time to create a new thread than aprocess  Less time to terminate a thread than a process  Less time to switch between two threads within thesame process  Threads within the same process share memory andother resources, they can communicate with eachother without invoking the kernel. So the modelis very fast to other suggested models. B. Advanced Encryption Algorithm Using Fuzzy Logic Today the security is the main issue in data communication. Encryption can provide a fine solution for it. The encryption algorithm is the mathematical procedure for performing encryption on data. After conducting a research on currently using encryption algorithms, we have identified that all these algorithms only concern about security. But consuming a less processing power is also equally important as the security for connections with low bandwidths. The proposed algorithm supports for user desired security level and processing level. It is a block cipher which is a derivation on the feistelnetwork architecture. The algorithm provides security levels and their corresponding processing levels by using various keys for the encryption/decryption process. This facility is achieved by using fuzzy logic. The results of the proposed encryption algorithm will be analyzed by comparing with other existing encryption algorithms. Finally the aim of the research is to come up with an encryption algorithm which can provide either low processing or high security according to user’s requirement which will be more advanced than the existing encryption algorithms. Implementing fuzzy logic: Fuzzy logic is a problem-solving control system methodology that presents itself to implementation in systems ranging from simple, small, embedded micro-controllers to large, networked, multi-channel PC or workstation-based data acquisition and control systems. Fuzzy logic provides a simple way to arrive at a definite conclusion based upon vague, ambiguous, imprecise, noisy, or missing input information. Infuzzy logic rules and membership sets are used to make a decision. To achieve security and low processing, the algorithm uses variable keys. 0th position gives a fully low processing algorithm and 1st position gives fully secured algorithm. The fuzzification changes depending on the key size and the number of mapping tables of the encryption algorithm. Users can input the desired key. One character will be 8 bit long. The main algorithm structure defines different key sizes up to 128bit. User can enter desired key- (application defines as the password) and also depending on the number of mapping tables’ algorithm would allocate weight dynamically. Allocation of the weights will differ from 0.0 to 1.0 range; and the number of security levels would be vary from 1-16.The number of rounds will be determined by pre-defined mapping tables and the users initial input. Mapping tables are predefined in the algorithm and consists of mathematically defined values, and then those values will dynamically choose the relevant algorithm procedure once the user input the key to encryption. Best case Scenario-Sample user input the key size of 16 Byte value and provides mapping table number which can be differentiated between 1 and 8. Assume that the user has selected the option of encrypting with the number 8 mapped table. The algorithm will allocate a higher weight to the provided user inputs since the initial key size is 16 Bytes that will resulted in providing the highest number of rounds which is 16. Eventually the highest value of input key size will derive a higher weight thus making the highest level of rounds and the highest level of security. Worst case Scenario-Sample user input the key size of 1 Byte value and provides mapping table numberwhich can be differentiated between 1 and 8. Assume that the user has selected the option of encrypting with the number 1 mapped table. The algorithm will allocate a lower weight to the provided user inputs since the initial key size is 1 Bytes,
  • 5. KNOWLEDGECUDDLE PUBLICATION International Journal of Computer Engineering and Science, August- 2014 5 eventually the lowest value of input key size will derive a lower weight. Then it will be reflected in the security rounds of the algorithm and which will be resulted in lowest level of security. Normal day Scenario-Sample user input the key size of 8 Byte value and provides mapping table number which can be differentiated between 1 and 8. Assume that the user has selected the option of encrypting with the number 4 mapped table. The algorithm will allocate a higher weight than the worst case scenario but lower weight that the best case scenario to the provided user inputs since the initial key size is 8 Bytes, eventually the modest value of input key size will derive a middle weight value. Then it will be derived the number of security rounds which in this case is 8 and then the modest level of security will be enforced in the algorithm. Following are some of fuzzy logic rules. • If Key length is 1 byte and the Level is 0 : number of Cycles is 0 • If Key length is 2 byte and the Level is 0 : number of Cycles is 1 • If Key length is 3 byte and the Level is 0 : number of Cycles is 1 • If Key length is 4 byte and the Level is 0 : number of Cycles is 2 Like this there are 144 fuzzy rules. C. Advance cryptography algorithm for improving data security The proposed algorithm has the batter speed compared with the comparing encryption algorithm. Nevertheless, the algorithm improves encryption security by inserting the symmetric layer. The algorithm will be useful to the applications which require the same procedure of encryption and decryption. Proposed Key Generation Steps: 1. Select or create any private key of Size 256 X 2 bits or 64 characters. 2. Size of selected key will be varying from 128 bits to 512 bits or 16 to 64 characters. 3. We can choose any character from 0 to 255 ASCII code. 4. Use of 64 * 8 key that means 512 bits in length. 5. Divide 64 bytes into 4 blocks of 16 bytes likes Key_Block1, Key_Block2, Key_Block3, and Key_Block4. 6. Apply XOR operation between Block1 and Block3. Results will store in new Key_Block13. 7. Apply XOR operation between Block2 and Block13. Results will store in new Key_Block213. 8. Apply XOR operation between Key_Block213 and Key_Block4. Results will store in new Key_Block4213. 9. Repeat Step 7, 8, 9 till (random number / 4). 10. Exit Steps of proposed Algorithm: 1. Initially select plane text of 16 bytes (or we can vary from 16 to 64 depend on requirement). 2. Initially insert key of size 16 bytes ( depend on plane text value) 3. Apply XOR operation between key (Key_Block4213) and plain text block (Text_Block). Result will store in Cipher Block1. 4. Apply right circular shift with 3 values. Result will store in new Cipher_Block2. 5. Apply XOR operation between Cipher_Block2 and Key_Block2. Result will store in new Cipher_Block3. 6. Apply XOR operation between Cipher_Block3 and Key_Block4. Result will store in Cipher_Block4. 7. Cipher_Block4 is the input of the next round as a plane text block. 8. Repeat step 1 to 7 till (Encryption Number / 4). 9. Exit. The important thing of our proposed method is that it is almost impossible to break the encryption algorithm without knowing the exact key value. V. EXPERIMENTAL RESULTS AES and Blowfish algorithms can be implemented to different audio files. Comparison of encryption time has been given in the following table 1, and it shows the Average time of AES and BLOWFISH algorithm for different audio files encryption. Next, Comparison of decryption time has been given in the following table 2, and it shows the Average time of AES and BLOWFISH algorithm for different audio files decryption. Table 3, shows comparison of various cryptographic algorithms based on different factors.
  • 6. KNOWLEDGECUDDLE PUBLICATION International Journal of Computer Engineering and Science, August- 2014 6 Table 1: Average time of Encryption Table 2: Average time of decryption Table 3: Comparison of different cryptographic algorithms
  • 7. KNOWLEDGECUDDLE PUBLICATION International Journal of Computer Engineering and Science, August- 2014 7 Here, The Advanced cryptographic Algorithm (with 265bit block size in this thesis) and “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm” algorithm (with 128-bit block size) and “Effect of Security Increment to Symmetric Data Encryption through AES Methodology” algorithm (with 128-bit block size) have been implemented on a number of different data files like text, pdf and image varying types of content and sizes of a wide range. But here we are only showing result of text file. Encryption and Decryption time of Various Text files comparisons shown in table 4 and table 5 respectively. Table 4: Encryption time comparison of text files Table 5: Decryption time comparison of text files
  • 8. KNOWLEDGECUDDLE PUBLICATION International Journal of Computer Engineering and Science, August- 2014 8 VI. CONCLUSION Cryptography algorithm is the science in secret code. Rapidly rising cybercrime and the growing prospect of the internet being used as a medium for attacks create a major challenge for network security. Some well-known cryptographicalgorithms have been analyzed in this paper to demonstrate the basic differences between the existing encryption techniques.It was concluded that Blowfish has better performance than AES in terms of Average time.“Byte – Rotation Encryption Algorithm (BREA)” allows all the blocks to processparallel in CPU. Because of parallel execution, theprocessing speed of the system will enhance. Encryption algorithm using fuzzy logic which can provideeither low processing or high security according to user’s requirement which will be more advanced than theexisting encryption algorithms. From the result it is clear that our “Advanced technique” is batter result producing as compared “DJSA symmetric key algorithm” and “Effect of Security Increment to Symmetric Data Encryption through AES Methodology”. If any user emphasis on security then he can use our proposed algorithm. No one can guarantee 100% security. But we can work toward 100% risk acceptance. A good cryptographic system strikes a balance between what is possible and what is acceptable. Thus considerable research effort is still required for secured communication. REFERENCES [1] AtulKahate “cryptography and network security”, Tata McGraw-Hill publishing company, New Delhi, 2008. [2] William Stallings, “Network Security Essentials(Applications and Standards)”, Pearson Education,2004. [3] W. Stallings, “Cryptography and Network Security”, Prentice Hall, 1995. [4] National Bureau of Standards, “Data EncryptionStandard, ” FIPS Publication 46, 1977. [5] DriptoChatterjee, JoyshreeNath, SuvadeepDasgupta, AsokeNath “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm” published in 2011 International Conference on Communication Systems and Network Technologies, 978-0-7695-4437-3/11 $26.00 © 2011 IEEE. [6] B. Schneier, Applied Cryptography, John Wiley & Sons, New York, 1994 [7] SairamNatarajan #1,“A Novel Approachfor Data Security Enhancement Using MultiLevel Encryption scheme”, Researchpaper, IJCSIT, Vol. 2 (1), 2011, 469-473. [8] Symmetric key cryptography using random key generator, A.Nath, S.Ghosh, M.A.Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12-15 July,2010, Vol-2,P-239-244. [9] Neal Koblitz “A Course in Number Theory and Cryptography” Second Edition Published by Springer-Verlag. [10] By Klaus Felten “An Algorithm for Symmetric Cryptography with a wide range of scalability” published by 2nd International Workshop on Embedded Systems, Internet Programming and Industial IT.