Comparative Survey of Different Cryptographic Algorithm
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 ISSN 2229-5518 41 Comparative Survey of different Cryptographic Algorithm Alka Pandey Dr. M.A. Rizvi Abstract- Now days, Data security is very challenging issue that touches many areas including computers and communication. Recently, came across many attacks on cyber security that have played with the confidentiality of the users. These attacks just broke all the security algorithms and affected the confidentiality, authentication, integrity, availability and identification of user data. Cryptography is one such way to make sure that confidenti- ality, authentication, integrity, availability and identification of user data can be maintained as well as security and privacy of data can be provided to the user. Cryptography is used widely for the purpose of secure commu- nication and password management. It comprises the techniques of encryption and decryption mechanism. En- cryption is the process of converting normal data or plaintext to something inexplicable or cipher-text by apply- ing mathematical transformations or formulae. These mathematical transformations or formulae used for encryp- tion processes are called algorithms. In this paper we have analysed ten data encryption algorithms AES, DES, RSA, DIFFIE HELLMAN, THREEFISH, CLEFIA, ARIA, SPEAK, SIMON and CHIASMU etc, comparing their different parameters. So that in future the best algorithm method can be used for encryption and decryption of data. Index Terms— Security, Cryptography, Algorithm, Key, Cipher, Security attacks, Encryption, Decryption. —————————— —————————— It is one of the earliest used techniques of Cryptog- 1 INTRODUCTION raphy. Asymmetric Key Cryptography on the other Need of communication has no alternative since hand uses two keys for the purpose of encryption early ages. Today method of communication got and decryption. improved and now it has widely transformed in A Cryptographic protocol is a procedure carried technical ways. Along with social communication out between two parties which is used to perform the exchange of information is also needed where some security task. Typically cryptographic proto- privacy and safety play important role. [1] col makes use of one, or more, cryptographic primi- The need of exchanging information without being tives and/or schemes. An example might be the hacked theft or distorted gave birth to encryption transmission of a credit card number from Bob to and decryption of information. [2] an e-commerce web site Alice. Such a protocol The concept behindIJSER encryption and decryption to might involves a digital signature scheme9so Bob disorganizing or rearranging the information in an knows he is talking to Alice), and a form of encryp- unreadable way, this concept of information to pro- tion (to ensure Bob’s credit card details are not in- tect the information in an unreadable manner is tercepted in transit). Examples of deployed proto- refer to Cryptography. Cryptography is derived cols which perform such operations are TLS or IP- from two Greek words: "Kryptos" meaning 'hidden' Sec. and "graphein" meaning 'to write' i.e. hidden writ- 2. BASIC TERMS OF CRYPTOGRAPHY ing. The main feature of Cryptography is the use of Encryption - It is the act of obscuring a message by a secret key to encrypt and decrypt the sensitive mystifying its contents. It can also be used to create information. Cryptography is not only restricted to digital signatures, which helps in the authentication providing confidentiality and privacy but also pro- of a original message. vides authentication, data integrity, non repudiation Decryption – It is the inverse process of encryption. etc. Parameters considered while adopting a Cryp- Usually the cipher text or algorithm used for en- tographic techniques can be broadly divided into cryption is the one used for decryption. two broad spectrums: Asymmetric key Cryptog- Cipher – It is method, an algorithm function or pro- raphy and Symmetric key Cryptography. Symmet- cess for performing encryption or decryption. A ric key Cryptography uses a single key for the pur- cipher is a set of well defined steps which can be pose of encryption and decryption, and is shared followed to Crypt data. with both the sender and the receiver. Plaintext - any information before being encrypted ———————————————— or in its original undisturbed form. • Ms. Alka Pandey is currently pursuing masters degree program in Com- Cipher text - It is the output or the incomprehensi- puter technology Application in Rajiv Gandhi prodyogiki vishwavidyalaya, ble code obtained by encryption of the plain text. Bhopal, India,. E-mail: [email protected] Cryptanalysis - It is the act of trying to decipher an • Dr. M.A. Rizvi is currently working as Associate and Head professor in encrypted message without the cognition of the NITTTR ,Bhopal ,India,E-mail: [email protected] IJSER © 2017 http://www.ijser.org International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 ISSN 2229-5518 42 actual keys or the algorithm used during encryp- the availability of a verity of libraries implementing tion. The Cryptanalyst may have some part of the TLS. The TLS protocol suite aims to provide a con- plaintext and is interested in the rest of it have the fident ail channel rather than simply a key agree- cipher text and may want to know about the key ment protocol. The protocol is broken up into two and algorithms used. [4] phases: A handshake (or key agreement) phase and Cryptographic Attacks - They are classified as a record layer encryption phase. [6] 1) Passive attack - The goal here might be to only Limitation: Due to the non-systematic development read the contents of a message and not change process, the protocol is hard to analyse and easily anything. prone to implementation weaknesses. [7] 2) Active Attack - The goal here is to change the 4.2 SSH contents of the message to disable future use or General Description: Secure Shell (SSH) was origi- understanding of the message. nally designed as a replacement for insecure remote Cryptanalytic Technique - shell protocol such as telnet. It provides a secure 2) Cipher Text Only - The attacker tries to decipher channel between two networked computers for the message without having the knowledge about applications such as secure file transfer. In general the kind of information contained in the message the host one is connecting to be authenticated, and must conjecture from the cipher text only. whereas the client is not (although some corpora- Known Plaintext Attack – It is easy to predict or tions do insist on client side authentication for SSH guess some part of Plaintext for Attackers. usage). [16] 3) Man - in - the - Middle Attack - The idea behind Limitation: The main issues with SSH, much like this attack is to interpose the communication be- TLS, is that most of the standard encryption algo- tween two parties. The attacker can access the traf- rithm for the transport layer are not sufficient to fic, information, modify the original form and then ensure complete security. They possess a number of forward it to the receiver. Such attacks can be pre- cryptographic weaknesses, which would not exist if vented by public key encryption. the protocol choices had been made more recently. 4) Correlation - The main source of information in 4.3 IPSec the communication are the correlation between the secret key and the cipher text, and hence it enables General Description: IPSec provide security at the IP network layer of the TCP/IP protocol stack. This the attackers. 5) Attack Against or Using the Underlying Hard- differs from protocols such bas TLS and SSH, which provide security at higher layers such as the appli- ware These attacks make use of the data of the very fine cation layer. The main use of IPSec has been to cre- measurements of the cryptographic device to com- ate virtual private network (VPNs) which facilities secure communication over an untrusted network pute the key and the encryption information. IJSERsuch as the internet. [11] There are two main IPSec 6) Faults in the Cryptosystem - These can even lead to the discovery of the secret key [4] protocols which specify the actual cryptography 3. NEED OF CRYPTOGRAPHY processing applied to packets. These are called Au- thentication Header and Encapsulating security In the field of sharing information, data and im- payload.AH provides integrity protection, data portant files it has become mandatory. Not only in origin authentication and anti-reply service.ESP communication but also in defence areas, commer- provides similar service to AH and in addition pro- cial field and to protect individual data as well as vides confidentiality and traffic flow confidentiality extensive applications in our daily lives. The tech- service through symmetric key encryption and var- nique of cryptography covers all these parameters iable length padding of packets.Limitation: The key of security issues. It has become very essential tool agreement phase of IPSec, called IKE, is well stud- in protecting the sensitive information from unau- ied and well defined. As for TLS ads SSH the pay- thorized access and to provide information security. load encryption algorithm has had a number of [6] issues over the years, related to pour acceptance of 4. SPECIFIED PROTOCOL USED IN the need for AEAD? IND-OCA encryption algo- DATA SECURITY rithm. The protocols here were designed for specific tasks. 4.4 Kerberos 4.1 TLS General Description: Kerberos is an authentication General Description: The TLS protocol (the current service which allows a client to authentication his or version v1.2) is primary aimed at securing traffic herself to multiple services e.g. a printer or a file between an unauthenticated web browser and an server. It uses a trusted authentication server which authenticated web site, although the protocol is will grant tickets to participating users or parties now often used in other application due in part of allowing them to show their identity to each other.