Preview

Feasibility Evaluation of Symmetric Key Encryption Technique for Wireless Channel and Disk Storage

Powerful Essays
Open Document
Open Document
1796 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Feasibility Evaluation of Symmetric Key Encryption Technique for Wireless Channel and Disk Storage
www.ijraset.com

Vol. 2 Issue V, May 2014
ISSN: 2321-9653

I N T E R N A T I O N A L J O U R N A L F O R RE S E A R C H I N A P P L I E D S C I E N C E
AN D E N G I N E E R I N G T E C H N O L O G Y (I J R A S E T)

Feasibility Evaluation of Symmetric Key Encryption
Techniques for Wireless Channel and Disk Storage
Md Asif Mushtaque1, Mr. Khushal Singh2
School of Computing Science and Engineering, Galgotias University
Abstract— Network security has become very important and challenging issue in this world. Cryptography is a technique that

provides security for the sender and receiver to exchange their information over a network. There are basically two types of cryptography technique- Symmetric and Asymmetric. Symmetric key algorithm is also categorized into two parts Stream
Cipher and Block Cipher. In this paper, we analyzed feasibility of Symmetric Key Block Cipher Encryption techniques for storage space with their advantages and disadvantages and also presented the possible attacks on these algorithms. The main objective of analyzing the feasibility for Storage space, because to increase the transmission speed over wireless channel it is necessary to reduce the size of the encrypted data.
Keywords— Space complexity, Encryption Algorithm, AES, Serpent,, RC5, Rijndael, Symmetric Key, Cryptography, Private

Key, Blowfish. Wireless sensor network.
I. INTRODUCTION
In this era of information technology, network security is very important to secure our data from unauthorized user; the information should be secure while transmitting from sender to receiver. Cryptography is a technique or method that provides security for data while we transfer our data over the network. Cryptography converts the information into another format that is not understood by anyone, unauthorized user can receives that format and try to convert in the original format but it is difficult for unauthorized user.

A. Some basic terms of cryptography:
Plain Text -

You May Also Find These Documents Helpful

  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    A f t e r y o u h a v e r e a d a n d s t u d i e d t h i s c h a p t e r, y o u s h o u l d b e a b l e t o…

    • 4970 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Paper

    • 13852 Words
    • 56 Pages

    a l t h o u g h c a s e s t u d i e s c a n a l s o b e u s e d a s a re s e a r c h m e t h o d o l o g y ( E a s t o n ,…

    • 13852 Words
    • 56 Pages
    Powerful Essays
  • Powerful Essays

    Cryptography

    • 2044 Words
    • 9 Pages

    Information security plays a pivotal role during internet communication in today’s era of technology. It is tremendously important for people committing etransactions. For naïve people it may seem to be not that necessary orincreased security may provide comfort to paranoid people but the truth is that it is absolutely essential when communication is carried between tens of millions of people daily. There are various cryptography methods that provide a means for secure commerce and payment to private communications and protecting passwords. Cryptography is necessary for secure communications; it is not by itself sufficient. The reader of this paper will find variants of cryptography and their applications. This paper has two major purposes. The first is to provide some real examples of cryptography in use today. The second is to provide tabular summarization and conclusion. Curious readers should check out some of the web pages and pdf in the bibliography below for further detailed — and interesting! — background information.…

    • 2044 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Electronic storage of an organisation’s information can take various forms depending upon the size and specific industry. The benefit of electronic information storage systems is the lack of physical space that they require. Information stored electronically is also very easily backed up by a central server.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Teaching Zach to Think

    • 1677 Words
    • 7 Pages

    E x PA N d I N G T H E B O U N dA R I E S O F L E A R N I N G…

    • 1677 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    12. According to the notes and lecture, what is the most secure and efficient way to back-up data? –a storage device.…

    • 741 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    it255

    • 721 Words
    • 3 Pages

    Security in today’s world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this seminar work, we discuss the applications of encryption techniques in database security. This is an area of substantial interest in database because we know that, the use of database is becoming very important in today’s enterprise and databases contains information that is major enterprise asset. This research work discuses the application of various encryption techniques in database security, and how encryption is used at different levels to provide the security.…

    • 721 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    PYC3705 Assignment 1

    • 26042 Words
    • 81 Pages

    u n d e rs t a n d i n g o f t h e f o l l o w i n g :…

    • 26042 Words
    • 81 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In upcoming days income had decided to change it infrastructure system with more reliable and powerful system for security reason and future information they are planning to set storage system…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cellulite Dclinic

    • 4786 Words
    • 22 Pages

    Tre a t m e n t o f C e l l u l i t e…

    • 4786 Words
    • 22 Pages
    Good Essays
  • Satisfactory Essays

    A n u m e r i c a l m e a s u r e m e n t (e g M e a n ) c a l c u l a t e d f r o m a s a m p l e…

    • 4260 Words
    • 47 Pages
    Satisfactory Essays
  • Powerful Essays

    In this tram paper we try to focus on wireless security and threats. Now a day wireless networking is get fame day by day and mostly user prefer or like wireless network because it easy to use. WLAN wireless local area network popularity gained is due to many reasons such as ease of installation flexibility mobility reduced cost of ownership and scalability.…

    • 948 Words
    • 4 Pages
    Powerful Essays