CFP last date
20 May 2024
Reseach Article

Comparative Analysis of Block Key Encryption Algorithms

by Mukta Sharma, R. B. Garg
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 145 - Number 7
Year of Publication: 2016
Authors: Mukta Sharma, R. B. Garg
10.5120/ijca2016910656

Mukta Sharma, R. B. Garg . Comparative Analysis of Block Key Encryption Algorithms. International Journal of Computer Applications. 145, 7 ( Jul 2016), 26-35. DOI=10.5120/ijca2016910656

@article{ 10.5120/ijca2016910656,
author = { Mukta Sharma, R. B. Garg },
title = { Comparative Analysis of Block Key Encryption Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 145 },
number = { 7 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 26-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume145/number7/25292-2016910656/ },
doi = { 10.5120/ijca2016910656 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:48:11.113966+05:30
%A Mukta Sharma
%A R. B. Garg
%T Comparative Analysis of Block Key Encryption Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 145
%N 7
%P 26-35
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Humankind has grown phenomenally from Stone Age to information technology age. Information technology is deeply treasured; mainly because of the Internet. The internet has brought great changes in almost every domain of life. Besides a computer, laptop, Desktop, even a Mobile Phones, I-Pad, IPod have the facility to use the Internet. With the Internet, life has become easier to get things done at a great speed and effortlessly. Such as searching for some information, retrieving maps, images, bookings for air tickets, movie tickets, sports or concerts tickets, hotel reservations, grocery, vegetables, and fruits, paying bills online, transferring money without going to the bank, etc. and the list is endless. It is a well-known phrase “Each coin has two sides”; similarly, with the benefits of using the internet, there are many threats or flaws. The Internet has given easy access to attack our personal information, financial transactions, etc. by hackers, pedophiles, net extortion, and salami attacks and so on. There are numerous attacks, and the researchers are trying to figure out some solution for them. One of the most popular ways to ensure security is using cryptography. This research paper is written with intent to explore symmetric key encryption algorithms. The research paper will focus on numerous symmetric key algorithms which have been ensuring security while transacting funds online. A study on block cipher algorithms gave a horizon to do a comparative analysis based on its working, real-time implementation, architecture, performance/scalability, flaws, etc.

References
  1. Daemen, J., Govaerts, R. and Vandewalle, J. (1998).Weak Keys for IDEA, Springer-Verlag.
  2. Daemen, J., Rijmen, V.( AES Proposal: Rijndael. Retrieved From: http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf
  3. Deep, T.V. & Reddy, V. S. R. (2015). Comparative Analysis of AES finalist algorithms and low power methodology for RC6 block cipher - A Review. International Journal For Technological Research In Engineering, Vol. 2(6)
  4. Denning, D. E. R. (1982). Cryptography and data Security. Addison-Wesley Publishing Company. Menlo Park, California
  5. Ebrahim, M, et al. (2013). Symmetric Algorithm Survey: A Comparative Analysis. International Journal of Computer Applications, Vol. 61(20)
  6. Elminaam, A., Abdual, D. S., Kader, H.M., and Hadhoud, M.M. (2010).Evaluating The Performance of Symmetric Encryption Algorithms. International Journal of Network Security, Vol.10(3), PP.213 -219
  7. Engelfriet, A.(2012). The DES encryption algorithm,‖ Available at www.iusmentis.com/technology/encryption/des/,.
  8. FIPS 197 (2001). Announcing the ADVANCED ENCRYPTION STANDARD (AES). Retrieved From: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  9. Forouzan, B. A., “Data Communications & Networking”, Fourth Edition, 2008, New York: Tata McGraw- Hill.
  10. Jeeva, A.L., Palanisamy, V. & Kanagaram, K.(2012). Comparative Analysis of Performance Efficiency and Security Measures of Some Encryption Algorithms. International Journal of Engineering Research and Applications, Vol. 2(3)
  11. Johnson, N. F., Jajodia, S. (1998). Steganalysis of imges created using current steganography software. In IHW’98 -Proceedings of the International Information hiding workshop.
  12. Kak, A. (2015). Computer and Network Security- AES: The Advanced Encryption Standard [pdf file].Retrieved from https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture8.pdf
  13. Kaur, M. Kaur(2016), K. A Comparative Review on Data Security Challenges in Cloud Computing. International Research Journal of Engineering and Technology, Vol. 03(1)
  14. LAI, X. (1992). On the Design and Security of Block Ciphers, ETH-9752, Zurich
  15. Mehdi, H. (2013). Checking EABC Performance in Comparison Others Cryptography Algorithms. International journal of Computer Science & Network Solutions, Vol. 1(1).
  16. Mushtaque, A, M. (2014). Comparative Analysis on Different parameters of Encryption Algorithms for Information Security. International Journal of Computer Sciences and Engineering Vol.-2(4), pp (76-82)
  17. National Bureau of Standards, “Data Encryption Standard,” FIPS Publication 46, 1977.
  18. Nema, P., &.Rizvi, M.A. (2015).Critical Analysis of Various Symmetric Key Cryptographic Algorithms. International Journal on Recent and Innovation Trends in Computing and Communication, Vol.3(6)
  19. Pandav, R.M., & Verma, V.K (2015). Data Security using Various Cryptography Techniques: A recent Survey. International Journal for Research in Engineering Application & Management, Vol. 01(09).
  20. Rayan, A.M., Abdel-Hafez, A.A., Hafez, I.M. (2016). Provably Secure Encryption Algorithm based on Feistel Structure. International Journal of Computer Applications, Vol. 139(1)
  21. Rouse, M. (2006). Data Enryption Standards (DES). Available at http://searchsecurity.techtarget.com/definition/Data-Encryption-Standard.
  22. Schneier B., “Applied Cryptography”, John Wiley& Sons Publication, New York, 1994.
  23. Schneier, B. (1994).Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),‖ Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, Available at http://www.schneier.com/paper-blowfish-fse.html
  24. Shannon, Claude, Communications theory of Secrecy Systems, Bell systems Technical Journal. 28 (4): 656 - 715.
  25. Sharma, S. & Bhatt, S.(2015). Comparative Analysis - Performance, Efficiency and Security Measures of Block Cipher Algorithms. IJEDR, Vol. 3(3).
  26. Stallings William, “Cryptography and Network Security Principles and Practice”, Fifth Edition, Pearson Education, Prentice Hall, 2011.
  27. Tamimi, A.A. ''Performance Analysis of Data Encryption Algorithms. Retrieved October 1, 2008 from http://www.cs.wustl.edu/~jain/cse567-06/ftp/encryption_perf/ index.html
  28. Thaduri, M., Yoo, S. and Gaede, R. “ An Efficient Implementation of IDEA encryption algorithm using VHDL”, Elsevier, (2004).
  29. Tropical Software, Triple DES Encryption, Available at http://www.tropsoft.com/strongenc/des3.htm,
  30. Gatliff, B. (2003). Encrypting data with the Blowfish algorithm. Available at http://www.design-reuse.com/articles/5922/ encrypting-data-with-the-blowfish-algorithm.
  31. Verma, O.P, Agarwal, R., Dafouti, D. & Tyagi, S.(2011). Performance Analysis of Data Encryption Algorithms. IEEE- Delhi Technological University India, 2011.
  32. Wagner, R. N. The Laws of Cryptography Retrieved From http://www.cs.utsa.edu/~wagner/laws/
Index Terms

Computer Science
Information Sciences

Keywords

Advanced encryption Standard (AES) Asymmetric Key Blowfish Cryptography Data Encryption Standard (DES) IDEA Symmetric Key Triple Data Encryption Standard (3DES)