Preview

Evaluation of DES, TDES, AES, Blowfish, and Twofish Encryption Algorithm Based on Space Complexity

Good Essays
Open Document
Open Document
2278 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Evaluation of DES, TDES, AES, Blowfish, and Twofish Encryption Algorithm Based on Space Complexity
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 3 Issue 4, April - 2014

Evaluation of DES, TDES, AES, Blowfish and
Two fish Encryption Algorithm: Based on
Space Complexity
MD Asif Mushtaque

Harsh Dhiman

M.Tech(CS&E)
School of Computing Science and Engineering
Galgotias University, Greater Noida, U.P .

M.Tech(CS&E)
School of Computing Science and Engineering
Galgotias University, Greater Noida, U.P.

Shahnawaz Hussain

Shivangi Maheshwari

M.Tech(CS&E)
School of Computing Science and Engineering
Galgotias University, Greater Noida, U.P.

M.Tech(CS&E)
School of Computing Science and Engineering
Galgotias University, Greater Noida, U.P.

(ii)

IJE
RT

Abstract--Due to fast growing of telecommunication technology and limitation for information transmission there is a need to use an efficient cryptography algorithm which takes less space after encryption for the ciphertext. Some performance matrics (such as time, speed and throughput) make the algorithm better. In this paper, we analyze and find an efficient encryption algorithm which takes less space among these encryption algorithms such as DES, TDES, AES,
Blowfish and Twofish.

Keywords— Space complexity, Encryption, Decryption,
Symmetric Key, Private Key, DES, TDES, AES, Blwofish,
Twofish.

I.

INTRODUCTION

Cryptography is a technique or method to secure our personal data from unauthorized user. In cryptography two types of operation are performed. (i) Encryption and (ii)
Decryption. To encrypt and decrypt data a secret key is used. After encryption original data is converted into another format known as cyphertext, which is not easy to understand. Plaintext- Original message that can be understood by anyone. Secret Key- A key that is used to change the format of the original message.
Ciphertext- Another format of the original message that cannot be understood by anyone.
Steps of Cryptography:(i)
Encrypt



References: AES”, IEEE Student’s Conference on Electrical, Electronics and Computer Science, IEEE, 2012. Fei Shao, Zinan Chang and Yi Zhang, “AES Encryption Algorithm Based on the High Performance Computing of GPU”, 2010 Second International Conference on Communication Software and Networks DOI 10.1109/ICCSN.2010.124, IEEE, 2010. Effect on Real Running in PLC Networks”, IEEE, 2012. A. Mousa, “Data encryption performance based on Blowfish”, 47th International Symposium, IEEE, 2005.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IF You Want To Purchase A+ Work Then Click The Link Below , Instant Download…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    IF You Want To Purchase A+ Work Then Click The Link Below , Instant Download…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Exam on Algorithms

    • 1238 Words
    • 5 Pages

    If you replaced the line LET Y = X/3 by the line LET Y = X/5, how would this change the outcome of the above?…

    • 1238 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    References: Calloway, D. (2012). Introduction to Cryptography and its role in Network Security Principles and Practice. Retrieved from The Chronichler 's Web Log: http://dancalloway.com/wordpress/2009/08/introduction-to-cryptography-and-its-role-in-network-security-principles-and-practice/…

    • 1325 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    In the last decade there has been a “combination of trends and technologies” that will change the way people work with managing their data in the future. Because computers have become faster, bandwidth continues to increase, and data storage has increased, the amount of “digitally born data” has exploded (Rizzo, 2005). The increase in digital data has propelled Microsoft to invest in building a new way to manage data. WinFS (Windows Future Storage) is being developed by Microsoft to be used as an advanced storage system that shall be implemented on top of NTFS. Because WinFS is actually operating on top of NTFS, the only way to compare the two is to highlight the features of WinFS that distinguish it from NTFS.…

    • 4575 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Encoding : This is the process of converting the information into a form that can be correctly decoded at the other end by…

    • 2906 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Symmetric encryption is the process of using a key to turn plain text into ciphertext. Once you have encrypted the text you can send it to the desired receiver. The receiver will have to have the key used to encrypt the text to decrypt the text. For this to happen you must share the key used to encrypt the text with the person/people that will receive the message. A “symmetric key can be changed every time” (Czagan, 2013) someone wants to communicate. Although…

    • 1002 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The Rsa Algorithm

    • 5348 Words
    • 22 Pages

    In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau of Standards (NBS) algorithm. Most importantly, RSA implements a public-key cryptosystem, as well as digital signatures. RSA is motivated by the published works of Diffie and Hellman from several years before, who described the idea of such an algorithm, but never truly developed it. Introduced at the time when the era of electronic email was expected to soon arise, RSA implemented two important ideas: 1. Public-key encryption. This idea omits the need for a “courier” to deliver keys to recipients over another secure channel before transmitting the originally-intended message. In RSA, encryption keys are public, while the decryption keys are not, so only the person with the correct decryption key can decipher an encrypted message. Everyone has their own encryption and decryption keys. The keys must be made in such a way that the decryption key may not be easily deduced from the public encryption key. 2. Digital signatures. The receiver may need to verify that a transmitted message actually originated from the sender (signature), and didn’t just come from there (authentication). This is done using the sender’s decryption key, and the signature can later be verified by anyone, using the corresponding public encryption key. Signatures therefore cannot be forged. Also, no signer can later deny having signed the message. This is not only useful for electronic mail, but for other electronic transactions and transmissions, such as fund transfers. The security of the RSA algorithm has so far been validated, since no known attempts to break it have yet been successful, mostly due to the difficulty of factoring large numbers n = pq, where p and q are large prime numbers.…

    • 5348 Words
    • 22 Pages
    Good Essays
  • Better Essays

    Dept. of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China saul.perceive@gmail.com Abstract A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. Therefore, WSN is venerable to various attacks. Among these attacks, the id-based attack such as node replication attacks and Sybil attacks are the most threatening. Hence, the security in WSNs presents a critical challenge for identity and data authentication. Although there are some recent approaches, most are resources-costing or constrained to some specific systems. Thus, in this paper, we present a novel authentication scheme to prevent these attacks. This Id-based Multiple Authentication (IMA) scheme bases upon the joint identity authentication and steganography to present a secure mechanism for data aggregation in WSNs. Simulations against above-mentioned attacks applying this scheme is presented and consequently show that the scheme can successfully authenticate the sensory data with high confidentiality. Keywords: Id-based authentication scheme; Wireless sensor network; Security data authentication which protects the integrity and the freshness against replication attacks. Even though efforts have been put into enhancing the authentication scheme, they have some shortages or drawbacks dealing with the security or the efficiency. Data authentication based on message authentication code (MAC) is known as a conventional scheme. Generally, a sensor node will append a MAC to its sensory data or to an aggregate report as an endorsement. These MACs will then be checked by the intermediate nodes along the route to the sink. Although the simple MAC operation is suitable for the energy efficiency, the…

    • 2530 Words
    • 11 Pages
    Better Essays
  • Good Essays

    The Mystery Box Analysis

    • 633 Words
    • 3 Pages

    J. J. Abrams compares/contrast Roland Barthes' two codes for creating suspense hermeneutic and proairetic by explaining how each film has multiple “mystery boxes”. The “mystery box” is a combination of the hermeneutic and proairetic codes. He mentions that there is always question of who, what, how, and what happens next, which create suspense to keep the audience drawn into the story. His example was from Star Wars, the droid, R2-D2, who meets mysterious women, the audience does not know, that is one “mystery box”. Next Luke Skywalker finds the droid, it’s a hologram with a message, and the princess needs help from Obi-Wan Kenobi, well who is Obi-Wan Kenobi, which is another “mystery box”. In terms on how to influence the audience to care about the story, Abrams explains the TV five act structure. The first…

    • 633 Words
    • 3 Pages
    Good Essays
  • Good Essays

    If you have better understanding of how fat has some inherent design problem, you can better know about the advantages of the FAT32 system. First, FAT16 organizes files in 32K clusters in drives over 1.2gigs, while FAT32 will use a minimum cluster size of 4K, it is very important to emphasize. Second, the biggest improvement is in FAT32 which in today's high-capacity hard disk, with the ability to effectively manage storage space, which means that a 3K file wastes only 1K of disk space on FAT32, while it wastes 29K of space on a standard FAT system. Of course, that there is two considerations:…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Oracle White Paper— A Technical Overview of the Oracle Exadata Database Machine and Exadata Storage Server…

    • 10248 Words
    • 41 Pages
    Powerful Essays
  • Good Essays

    Normally the authentication scheme the user undegoes is paticularly very lenient or very strict.Throughout the yeras authentication has been a very interesting approach.With all the means of technology developing ,it can be very easy for 'others ' to fabricate or to steal identity or to hack someones password.Therefore many algorithms have come up each with an interesting approach toward calculation of a secret key.The algorithms are such based to pick a random number in the range of 10^6 and therefore the possbilities of the sane number coming is rare.…

    • 725 Words
    • 3 Pages
    Good Essays
  • Good Essays

    3d Password: Synopsis

    • 597 Words
    • 3 Pages

    Objective : Users nowadays are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards etc. Some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas. Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, relative names etc. Now with the technology change, fast processors and many tools on the Internet so to crack your authentication has become a Child's Play. Therefore the 3D passwords which are more customisable, and very interesting way of authentication.…

    • 597 Words
    • 3 Pages
    Good Essays