SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
                             International Journal of Advanced Research in Computer Engineering & Technology
                                                                                  Volume 1, Issue 5, July 2012




STUDY AND PERFORMANCE ANALYSIS
  OF CRYPTOGRAPHY ALGORITHMS
                                                  S. Pavithra
                               Research Scholar, Department of Computer Science,
                                         NGM College, Pollachi, India.
                                         Email: Pavisou010@gmail.com

                                               Mrs. E. Ramadevi
                              Assistant Professor, Department of Computer Science,
                                          NGM College, Pollachi, India.
                                          Email: ramajus@hotmail.com

Abstract - Today’s world, for secure data transmission                II. SYMMETRIC KEY ALGORITHMS
via Internet or any public network, there is no
alternative to cryptography. The role of Cryptography
is most important in the field of network security. The
                                                                Symmetric key algorithms are a class of algorithms
main goal of cryptography is Confidentiality, Integrity,        for cryptography that use the same cryptographic
Authentication,      Nonrepudiation. Cryptography is            keys for both encryption of plaintext and decryption
widely used by governmental and intelligence agencies           of ciphertext. The keys may be identical or there may
around the world to safe transmission of any format of          be a simple transformation to go between the two
messages online or offline. In this study is made for the       keys. The keys, in practice, represent a shared secret
cryptography algorithms, particularly algorithms are            between two or more parties that can be used to
compared and performance is evaluated.                          maintain a private information link.

Keywords - AES, BLOWFISH,                Cryptography,
                                                                                       Sender
Decryption, Encryption, Security

                  I. INTRODUCTION                                                     Encryption
                                                                        P                                       C
                                                                                      algorithm
There are number of cryptographic algorithms used
for encryption data and most of all fall into two
generic categories – Public key system and secret key
system. Symmetric key algorithm is known as
secrecy key or shared key algorithm. Because in
                                                                                      Secret Key
symmetric key algorithm a shared key does both the
encryption and decryption. Only one key is used for
doing everything, so the success of algorithm                                          Receiver
depends on two factors-secrecy of the key and its
distribution. Symmeric algorithms are: Data                                            Decryption
Encryption Standard (DES), Triple DES (3DES),                           C                                        P
                                                                                       algorithm
International Data Encryption algorithm (IDEA),
Blowfish, Advanced Encryption Standard (AES).
Asymmetric key algorithm is also known as public
key algorithm. In this algorithm, there are two keys
public and private used for encryption and
decryption. Public key is used to encrypt the message                                  Secret Key
and private key is used to decrypt the message.
Asymmetric algorithms are: Diffe-Hellman and RSA
Public Key Encryption.



                                                                                                                    82
                                           All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                 Volume 1, Issue 5, July 2012



A. DES:                                                        C. IDEA:

DES is a block cipher. It encrypts data in blocks of           IDEA is one of the strongest cryptographic
size 64 bits each. 64 bits of plain text goes as the           algorithms. Idea is a block cipher. It works on 64-bit
input to DES, which produces 64 bits of cipher text.           plain text blocks. The key is longer and consists of
The key length is 64 bits [3]. Cryptanalyst can                128 bits. IDEA is reversible of DES.[2]
perform cryptanalysis by exploiting the characteristic
of DES algorithm but no one has succeeded in                   The 64-bit plaintext block is partitioned into four 16-
finding out the weakness.                                      bit sub blocks. Four 16-bit key sub-blocks are
                                                               required for the subsequent output transformation,
DES results in a permutation among the 2^64                    and its generated from the 128-bit key. The key sub-
possible arrangement of 64 bits, each of which may             blocks are used for the encryption and the
be either 0 or 1. Each block of 64 bits is divided into        decryption.[10] IDEA was used in Pretty Good
two blocks of 32 bits each, a left half block L and            Privacy (PGP).
right half R.
                                                               D. BLOWFISH:
  The DES algorithm turns 64-bit messages block M
into a 64-bit cipher block C. If each 64-bit block is          Blowfish is a 64-bit symmetric block cipher with
encrypted individually, then the mode of encryption            variable length key. The algorithm operates with two
is called Electronic Code Book (ECB) mode. There               parts: a key expansion part and a data- encryption
are two other modes of DES encryption, namely                  part. The role of key expansion part is to converts a
Chain Block Coding (CBC) and Cipher Feedback                   key of at most 448 bits into several sub key arrays
(CFB), which make each cipher block dependent on               totaling 4168 bytes [8].
all the previous messages blocks through an initial
XOR operation.                                                 The data encryption occurs via a 16-round Feistel
                                                               network . It is only suitable for application where the
B. AES:                                                        key does not change often, like communications link
                                                               or an automatic file encryption. It is significantly
AES is based on a design principle known as a                  faster than most encryption algorithms when
substitution-permutation network. AES has 128-bit              implemented on 32-bit microprocessors with large
block size and a key size of 128,192 or 256 bits [2].          data caches.
AES operates on a 4×4 column-major order matrix of
bytes, termed the state. Most AES calculations are             E. Triple DES:
done in a special finite field.
                                                               Triple DES is an alternative to DES. 3DES takes a
The AES cipher is specified as a number of                     64-bit block of data and performs the operations
repetitions of transformation rounds that convert the          encrypt, decrypt and encrypt. The key is always
input plaintext into the final output of cipher text.          presented as a 64-bit block, every 8th bit of which is
The number of cycles of repetition are as follows:             ignored. Use of multiple length keys leads us to the
                                                               Triple-DES algorithm, in which DES is applied three
   10 cycles of repetition for 128 bit keys.                  times.
   12 cycles of repetition for 192 bit keys.
   14 cycles of repetition for 256 bit keys.                  we consider a triple length key to consist of three 56-
                                                               bit keys K1, K2, K3 then encryption is as follows: [2]
Each round of encryption process requires the                  Encrypt with K1-> Decrypt with K2 -> Encrypt with
following four types of operations: SubBytes,                  K3                           Decryption is the reverse
ShiftRows, MixColumns, XorRoundkey. Decryption                 process:    Encrypt with K3-> Decrypt with K2 ->
is the reverse process of encryption and using inverse         Encrypt with K1
functions:      InvSubBytes,            InvShiftRows,
InvMixColumns.                                                      III. ASYMMETRIC KEY ALGORITHM

                                                               Asymmetric key algorithm uses private key and
                                                               public key. It is used to easily encrypt and decrypt the
                                                               message when the relevant key is known. In crypto
                                                                                                                    83
                                          All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                 Volume 1, Issue 5, July 2012



system one key to encrypt and different key to                is used by several protocols, including Secure
decrypt.                                                      Sockets Layer (SSl), Secure Shell (SSH) and
                                                              Internet protocol security (IPSec).
                       Sender
                                                                              IV. RELATED WORK

       P              Encryption                 C
                      algorithm                               This section discusses the performance of the
                                                              compared algorithms.

                                                              In this paper [6] consider the performance of
                                                              encryption algorithm for text files, it uses AES, DES
                      Receiver’s                              and RSA algorithm and is evaluated from the
                      Public Key                              following     parameters like Computation time,
                                                              Memory usage, Output bytes.

                                                                       First, the encryption time is computed. The
                       Receiver                               time is taken to convert plain text to cipher text is
                                                              known as encryption time. Comparing these three
                      Decryption                              algorithms, RSA takes more time for computation
        C             algorithm                   P           process. The memory usage of each algorithm is
                                                              considered as memory byte level. RSA takes larger
                                                              memory than AES and DES. Finally, the output byte
                                                              is calculated by the size of output byte of each
                                                              algorithm. The level of output byte is equal for AES
                                                              and DES, but RSA algorithm produces low level of
                      Receiver’s
                                                              output byte.
                      Private Key
                                                              In this paper [7], the selected algorithms are AES,
                                                              3DES, Blowfish and DES. By using these algorithms
A. RSA                                                        the performance of encryption and decryption
                                                              process of text files is calculated through the
RSA is a most popular and proven asymmetric                   throughput parameter.
cryptography algorithm. RSA is based on the
mathematical fact that is easy to find the private and                 Encryption time is calculated as the total
public keys based on the very large prime numbers.            plaintext in bytes encrypted divided by the encryption
[2]                                                           time. Decryption time is calculated as the total
                                                              plaintext in bytes decrypted divided by the decryption
Encryption: compute c = m^e mod n, where the e                time.
and n are the public key, and m is the message block.
The c is the encrypted message.                                       As a result mentioned in the paper [7], it is
                                                              said that Blowfish algorithm gives the better
Decryption: The private key d is used to decrypt              performance than all other algorithms in terms of
messages. Compute: m = c^d mod n, where n is the              throughput. The least efficient algorithm is 3DES.
modulus and d is the private key.
                                                              In this paper [9], discuss the performance evaluation
In RSA, compare to encryption process, decryption             of AES and BLOWFISH algorithms, and the
process takes more time.                                      parameters are Time consumption of packet size for
                                                              64 bit encodings and hexadecimal encodings,
B. Diffe-Hellman Key Exchange                                 encryption performance of text files and images are
                                                              compared with these two algorithms and calculate the
Diffie-Hellman key agreement is not based on                  throughput level,
encryption and decryption. Diffe-Hellman (DH) is a
method for securely exchanging a shared secret                Throughput of encryption = Tp/Et
between two parties in real time untrusted network. It
                                                                                                                 84
                                         All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                 Volume 1, Issue 5, July 2012



where                                                                                algorithm consumes less time for encrypting the
                                                                                     audio than that of AES.
Tp: total plain text (bytes)
                                                                                     Next, Comparison of decryption time has been given
Et: encryption time (second)                                                         in the following table 2, and it shows the Average
                                                                                     time of AES and BLOWFISH algorithm for different
The simulation results shows that Blowfish has better                                audio files decryption.
performance than AES in almost all the test cases.
                                                                                                             Table 2: Average time of decryption
                        V. EXPERIMENTAL RESULTS
                                                                                     Audio                   Files     Encryption            Encryption time of
In this section, the AES and Blowfish algorithms can                                 (KB)                              time       of         AES (MS)
be implemented to different audio files. Comparison                                                                    BLOWFISH
of encryption time has been given in the following                                                                     (MS)
table 1, and it shows the Average time of AES and                                    8,282                             300                   433
BLOWFISH algorithm for different audio files                                         387                               120                   220
encryption.                                                                          33                                21                    28
                                                                                     2,826                             55                    97
                        Table 1: Average time of encryption                          Average                           124                   194.5
                                                                                     Time
Audio                   Files    Encryption             Encryption time of
(KB)                             time       of          AES (MS)                                                        DECRYPTION PROCESS
                                 BLOWFISH
                                 (MS)                                                                 250

8,282                            970                    1025                                          200
387                              38                     55
                                                                                       Average Time




                                                                                                      150
33                               16                     20
2,826                            348                    370                                           100
Average                          343                    367.5
                                                                                                      50
Time
                                                                                                       0
                                                                                                                     BLOWFISH                        AES
                                   ENCRYPTION PROCESS                                                                           Algorithms

                 400

                 350
                 300
                                                                                                            Figure 2: Average Time of decryption
  Average Time




                 250
                 200                                                                 Figure 2 shows the result based on the average time
                 150                                                                 of the decryption with different size of audio files. It
                 100                                                                 shows that the average time is minimum for Blowfish
                 50                                                                  when compared to that of AES. So from the
                  0                                                                  experiment it proves that blowfish decryption
                                BLOWFISH                        AES
                                                                                     algorithm consumes less time for decrypting the
                                           Algorithms
                                                                                     audio than that of AES.

                       Figure 1 : Average Time of encryption                                                          VI. CONCLUSION

Figure 1 shows the result based on the average time                                  Cryptography algorithm is the science in secret code.
of the encryption with different size of audio files. It                             Rapidly rising cyber crime and the growing prospect
shows that the average time is minimum for Blowfish                                  of the internet being used as a medium for attacks
when compared to that of AES. So from the                                            create a major challenge for network security. In this
experiment it proves that blowfish encryption                                        paper


                                                                                                                                                            85
                                                                All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                 Volume 1, Issue 5, July 2012



We studied the various cryptographic algorithms and            Coimbatore. Her research interest lies in the area of
majorly deals the encryption and decryption process            Networking and Data Security.
for protecting the text files and images using some of
the cryptographic algorithms.                                  Mrs. E. Ramadevi - Mrs. E. Ramadevi received
                                                               M.Phil degree in Computer Science from Bharathiar
The presented simulation results of audio files show           University, Coimbatore. Currently she is an Assistant
the points. It was concluded that Blowfish has better          Professor in Computer Science at NGM College,
performance than AES in terms of Average time.                 Pollachi, India. She has got 10 years of research
                                                               experience and she has more than 15 years of
                                                               teaching experience . Her research interest includes
                  REFERENCES
                                                               areas like Data Mining, Knowledge base System,
                                                               Intelligent and Control Systems and Fuzzy Logic,
[1]  Atul Kahate,       “cryptography and network              presented various papers in National and
     security”,      Tata McGraw-Hill publishing               International conferences. Published 2 research
     company, New Delhi, 2008.                                 papers.
[2] B. Schneier, ” Description of a New Variable-
     Length Key, 64-Bit Block Cipher (Blowfish)
     Fast                       Software Encryption”,
     Cambridge Security Workshop Proceedings
     (December 1993), Springer-Verlag, 1994, pp.
     191-204.
[3] “BLOWFISHalgorithm”
     http://pocketbrief.net/related/BlowfishEncryptio
     n.pdf
[4] “DES algorithm”
     http://orlingrabbe.com/des.htm
[5] Gurjeevan Singh, Ashwani Kumar Singla,
     K.S.Sandha, “Through Put Analysis of Various
     Encryption Algorithms”, IJCST Vol.2, Issue3,
     September 2011.
[6] How-Shen         Chang,     “International    Data
     Encryption Algorithms”, 2004.
[7] “Performance        Analysis     of    AES      and
     BLOWFISH Algorithms “,                    National
     Conference on Computer Communication &
     Informatics”, School of computer science, RVS
     college of arts and science, March 07, 2012.
[8] Shashi Mehrotra Seth, Rajan Mishra,
     “Comparitive       Analysis     of     Encryption
     Algorithms For Data Communication”, IJCST
     Vol.2, Issue 2, June 2011
[9] Tingyuan Nie Teng Zhang, ” A study of DES
     and Blowfish encryption algorithm”, Tencon
     IEEE Conference, 2009.
[10] William Stallings, “cryptography and network
     security”, pearson prentice hall, 2006, 4th
     edition.


Authors:

S. Pavithra – S.Pavithra received M.Sc degree in
Computer Science from Karpagam University,
Coimbatore. Currently she is doing M.Phil Degree in
Computer Science at Bharathiar University,


                                                                                                                 86
                                          All Rights Reserved © 2012 IJARCET

Contenu connexe

Tendances

IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
Rsa Encryption in java
Rsa Encryption in java Rsa Encryption in java
Rsa Encryption in java PiyushPatil73
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsTharindu Weerasinghe
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystemsijtsrd
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET Journal
 

Tendances (20)

IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
Rsa Encryption in java
Rsa Encryption in java Rsa Encryption in java
Rsa Encryption in java
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
H42063743
H42063743H42063743
H42063743
 
Encryption
EncryptionEncryption
Encryption
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
 

Similaire à 82 86

Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfDhamuKing1
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneSecurityTube.Net
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communicationijsrd.com
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comphanleson
 
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionSecured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionTharindu Weerasinghe
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 

Similaire à 82 86 (20)

Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
H42054550
H42054550H42054550
H42054550
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communication
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
 
Day5
Day5Day5
Day5
 
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionSecured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEAIntroducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Dernier (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

82 86

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 STUDY AND PERFORMANCE ANALYSIS OF CRYPTOGRAPHY ALGORITHMS S. Pavithra Research Scholar, Department of Computer Science, NGM College, Pollachi, India. Email: Pavisou010@gmail.com Mrs. E. Ramadevi Assistant Professor, Department of Computer Science, NGM College, Pollachi, India. Email: ramajus@hotmail.com Abstract - Today’s world, for secure data transmission II. SYMMETRIC KEY ALGORITHMS via Internet or any public network, there is no alternative to cryptography. The role of Cryptography is most important in the field of network security. The Symmetric key algorithms are a class of algorithms main goal of cryptography is Confidentiality, Integrity, for cryptography that use the same cryptographic Authentication, Nonrepudiation. Cryptography is keys for both encryption of plaintext and decryption widely used by governmental and intelligence agencies of ciphertext. The keys may be identical or there may around the world to safe transmission of any format of be a simple transformation to go between the two messages online or offline. In this study is made for the keys. The keys, in practice, represent a shared secret cryptography algorithms, particularly algorithms are between two or more parties that can be used to compared and performance is evaluated. maintain a private information link. Keywords - AES, BLOWFISH, Cryptography, Sender Decryption, Encryption, Security I. INTRODUCTION Encryption P C algorithm There are number of cryptographic algorithms used for encryption data and most of all fall into two generic categories – Public key system and secret key system. Symmetric key algorithm is known as secrecy key or shared key algorithm. Because in Secret Key symmetric key algorithm a shared key does both the encryption and decryption. Only one key is used for doing everything, so the success of algorithm Receiver depends on two factors-secrecy of the key and its distribution. Symmeric algorithms are: Data Decryption Encryption Standard (DES), Triple DES (3DES), C P algorithm International Data Encryption algorithm (IDEA), Blowfish, Advanced Encryption Standard (AES). Asymmetric key algorithm is also known as public key algorithm. In this algorithm, there are two keys public and private used for encryption and decryption. Public key is used to encrypt the message Secret Key and private key is used to decrypt the message. Asymmetric algorithms are: Diffe-Hellman and RSA Public Key Encryption. 82 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 A. DES: C. IDEA: DES is a block cipher. It encrypts data in blocks of IDEA is one of the strongest cryptographic size 64 bits each. 64 bits of plain text goes as the algorithms. Idea is a block cipher. It works on 64-bit input to DES, which produces 64 bits of cipher text. plain text blocks. The key is longer and consists of The key length is 64 bits [3]. Cryptanalyst can 128 bits. IDEA is reversible of DES.[2] perform cryptanalysis by exploiting the characteristic of DES algorithm but no one has succeeded in The 64-bit plaintext block is partitioned into four 16- finding out the weakness. bit sub blocks. Four 16-bit key sub-blocks are required for the subsequent output transformation, DES results in a permutation among the 2^64 and its generated from the 128-bit key. The key sub- possible arrangement of 64 bits, each of which may blocks are used for the encryption and the be either 0 or 1. Each block of 64 bits is divided into decryption.[10] IDEA was used in Pretty Good two blocks of 32 bits each, a left half block L and Privacy (PGP). right half R. D. BLOWFISH: The DES algorithm turns 64-bit messages block M into a 64-bit cipher block C. If each 64-bit block is Blowfish is a 64-bit symmetric block cipher with encrypted individually, then the mode of encryption variable length key. The algorithm operates with two is called Electronic Code Book (ECB) mode. There parts: a key expansion part and a data- encryption are two other modes of DES encryption, namely part. The role of key expansion part is to converts a Chain Block Coding (CBC) and Cipher Feedback key of at most 448 bits into several sub key arrays (CFB), which make each cipher block dependent on totaling 4168 bytes [8]. all the previous messages blocks through an initial XOR operation. The data encryption occurs via a 16-round Feistel network . It is only suitable for application where the B. AES: key does not change often, like communications link or an automatic file encryption. It is significantly AES is based on a design principle known as a faster than most encryption algorithms when substitution-permutation network. AES has 128-bit implemented on 32-bit microprocessors with large block size and a key size of 128,192 or 256 bits [2]. data caches. AES operates on a 4×4 column-major order matrix of bytes, termed the state. Most AES calculations are E. Triple DES: done in a special finite field. Triple DES is an alternative to DES. 3DES takes a The AES cipher is specified as a number of 64-bit block of data and performs the operations repetitions of transformation rounds that convert the encrypt, decrypt and encrypt. The key is always input plaintext into the final output of cipher text. presented as a 64-bit block, every 8th bit of which is The number of cycles of repetition are as follows: ignored. Use of multiple length keys leads us to the Triple-DES algorithm, in which DES is applied three  10 cycles of repetition for 128 bit keys. times.  12 cycles of repetition for 192 bit keys.  14 cycles of repetition for 256 bit keys. we consider a triple length key to consist of three 56- bit keys K1, K2, K3 then encryption is as follows: [2] Each round of encryption process requires the Encrypt with K1-> Decrypt with K2 -> Encrypt with following four types of operations: SubBytes, K3 Decryption is the reverse ShiftRows, MixColumns, XorRoundkey. Decryption process: Encrypt with K3-> Decrypt with K2 -> is the reverse process of encryption and using inverse Encrypt with K1 functions: InvSubBytes, InvShiftRows, InvMixColumns. III. ASYMMETRIC KEY ALGORITHM Asymmetric key algorithm uses private key and public key. It is used to easily encrypt and decrypt the message when the relevant key is known. In crypto 83 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 system one key to encrypt and different key to is used by several protocols, including Secure decrypt. Sockets Layer (SSl), Secure Shell (SSH) and Internet protocol security (IPSec). Sender IV. RELATED WORK P Encryption C algorithm This section discusses the performance of the compared algorithms. In this paper [6] consider the performance of encryption algorithm for text files, it uses AES, DES Receiver’s and RSA algorithm and is evaluated from the Public Key following parameters like Computation time, Memory usage, Output bytes. First, the encryption time is computed. The Receiver time is taken to convert plain text to cipher text is known as encryption time. Comparing these three Decryption algorithms, RSA takes more time for computation C algorithm P process. The memory usage of each algorithm is considered as memory byte level. RSA takes larger memory than AES and DES. Finally, the output byte is calculated by the size of output byte of each algorithm. The level of output byte is equal for AES and DES, but RSA algorithm produces low level of Receiver’s output byte. Private Key In this paper [7], the selected algorithms are AES, 3DES, Blowfish and DES. By using these algorithms A. RSA the performance of encryption and decryption process of text files is calculated through the RSA is a most popular and proven asymmetric throughput parameter. cryptography algorithm. RSA is based on the mathematical fact that is easy to find the private and Encryption time is calculated as the total public keys based on the very large prime numbers. plaintext in bytes encrypted divided by the encryption [2] time. Decryption time is calculated as the total plaintext in bytes decrypted divided by the decryption Encryption: compute c = m^e mod n, where the e time. and n are the public key, and m is the message block. The c is the encrypted message. As a result mentioned in the paper [7], it is said that Blowfish algorithm gives the better Decryption: The private key d is used to decrypt performance than all other algorithms in terms of messages. Compute: m = c^d mod n, where n is the throughput. The least efficient algorithm is 3DES. modulus and d is the private key. In this paper [9], discuss the performance evaluation In RSA, compare to encryption process, decryption of AES and BLOWFISH algorithms, and the process takes more time. parameters are Time consumption of packet size for 64 bit encodings and hexadecimal encodings, B. Diffe-Hellman Key Exchange encryption performance of text files and images are compared with these two algorithms and calculate the Diffie-Hellman key agreement is not based on throughput level, encryption and decryption. Diffe-Hellman (DH) is a method for securely exchanging a shared secret Throughput of encryption = Tp/Et between two parties in real time untrusted network. It 84 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 where algorithm consumes less time for encrypting the audio than that of AES. Tp: total plain text (bytes) Next, Comparison of decryption time has been given Et: encryption time (second) in the following table 2, and it shows the Average time of AES and BLOWFISH algorithm for different The simulation results shows that Blowfish has better audio files decryption. performance than AES in almost all the test cases. Table 2: Average time of decryption V. EXPERIMENTAL RESULTS Audio Files Encryption Encryption time of In this section, the AES and Blowfish algorithms can (KB) time of AES (MS) be implemented to different audio files. Comparison BLOWFISH of encryption time has been given in the following (MS) table 1, and it shows the Average time of AES and 8,282 300 433 BLOWFISH algorithm for different audio files 387 120 220 encryption. 33 21 28 2,826 55 97 Table 1: Average time of encryption Average 124 194.5 Time Audio Files Encryption Encryption time of (KB) time of AES (MS) DECRYPTION PROCESS BLOWFISH (MS) 250 8,282 970 1025 200 387 38 55 Average Time 150 33 16 20 2,826 348 370 100 Average 343 367.5 50 Time 0 BLOWFISH AES ENCRYPTION PROCESS Algorithms 400 350 300 Figure 2: Average Time of decryption Average Time 250 200 Figure 2 shows the result based on the average time 150 of the decryption with different size of audio files. It 100 shows that the average time is minimum for Blowfish 50 when compared to that of AES. So from the 0 experiment it proves that blowfish decryption BLOWFISH AES algorithm consumes less time for decrypting the Algorithms audio than that of AES. Figure 1 : Average Time of encryption VI. CONCLUSION Figure 1 shows the result based on the average time Cryptography algorithm is the science in secret code. of the encryption with different size of audio files. It Rapidly rising cyber crime and the growing prospect shows that the average time is minimum for Blowfish of the internet being used as a medium for attacks when compared to that of AES. So from the create a major challenge for network security. In this experiment it proves that blowfish encryption paper 85 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 We studied the various cryptographic algorithms and Coimbatore. Her research interest lies in the area of majorly deals the encryption and decryption process Networking and Data Security. for protecting the text files and images using some of the cryptographic algorithms. Mrs. E. Ramadevi - Mrs. E. Ramadevi received M.Phil degree in Computer Science from Bharathiar The presented simulation results of audio files show University, Coimbatore. Currently she is an Assistant the points. It was concluded that Blowfish has better Professor in Computer Science at NGM College, performance than AES in terms of Average time. Pollachi, India. She has got 10 years of research experience and she has more than 15 years of teaching experience . Her research interest includes REFERENCES areas like Data Mining, Knowledge base System, Intelligent and Control Systems and Fuzzy Logic, [1] Atul Kahate, “cryptography and network presented various papers in National and security”, Tata McGraw-Hill publishing International conferences. Published 2 research company, New Delhi, 2008. papers. [2] B. Schneier, ” Description of a New Variable- Length Key, 64-Bit Block Cipher (Blowfish) Fast Software Encryption”, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, 1994, pp. 191-204. [3] “BLOWFISHalgorithm” http://pocketbrief.net/related/BlowfishEncryptio n.pdf [4] “DES algorithm” http://orlingrabbe.com/des.htm [5] Gurjeevan Singh, Ashwani Kumar Singla, K.S.Sandha, “Through Put Analysis of Various Encryption Algorithms”, IJCST Vol.2, Issue3, September 2011. [6] How-Shen Chang, “International Data Encryption Algorithms”, 2004. [7] “Performance Analysis of AES and BLOWFISH Algorithms “, National Conference on Computer Communication & Informatics”, School of computer science, RVS college of arts and science, March 07, 2012. [8] Shashi Mehrotra Seth, Rajan Mishra, “Comparitive Analysis of Encryption Algorithms For Data Communication”, IJCST Vol.2, Issue 2, June 2011 [9] Tingyuan Nie Teng Zhang, ” A study of DES and Blowfish encryption algorithm”, Tencon IEEE Conference, 2009. [10] William Stallings, “cryptography and network security”, pearson prentice hall, 2006, 4th edition. Authors: S. Pavithra – S.Pavithra received M.Sc degree in Computer Science from Karpagam University, Coimbatore. Currently she is doing M.Phil Degree in Computer Science at Bharathiar University, 86 All Rights Reserved © 2012 IJARCET