<<

www.symbiosisonline.org www.symbiosisonlinepublishing.com Symbiosis ISSN Online: 2474-9257

Research Article Journal of Computer Science Applications and Information Technology Open Access A Comparison of Cryptographic : DES, 3DES, AES, RSA and for Guessing Attacks Prevention Mohammed Nazeh Abdul Wahid*, Abdulrahman Ali, Babak Esparham and Mohamed Marwan Limkokwing University of Creative and Technology, Post Graduate Centre, Cyberjaya, Malaysia

Received: June 22, 2018; Accepted: July 12, 2018; Published: August 10, 2018

*Corresponding author: Mohammed Nazeh Abdul Wahid, Senior Lecturer, Limkokwing university of creative technology, Post Graduate Centre, Cyberjaya, Malaysia, Tel: +60104339985; E-mail: [email protected]

Abstract is the process of encoding information or data in (also called secret-key) and Asymmetric-key (called public- order to prevent unauthorized access. These days we need to secure key) encryption [2]. the information that is stored in our computer or is transmitted via evaluation is a network security system for an application using internet against attacks. There are different types of cryptographic the Aproposed secure Wi-Fi . system As for for wireless some cryptographic networks: experimental system, it methods that can be used. Basically, the selecting cryptographic is commonly used to secure communication channels by using method depends on the application demands such as the response public key exchanges based on algorithms such as RSA, DES, AES, cryptographic algorithms has its own weak and strong points. In this paper,time, bandwidth,we will confidentiality the result of and the implementation integrity. However, and analysis each of the key used to encrypt data sent over an unsecured Internet that applied on several cryptographic algorithms such as DES, 3DES, channel.Triple DES In andaddition, Blowfish. the existingFrom the cryptographic , algorithm it depends relies on

the previous cryptographic techniques in terms of performances, weaknessesAES, RSA and and blowfish. strengths. Also, we will show the comparisons between on a data separation model designed by IBM’s [27]. has plays a very important role in business perspective. For Keywords: Network security; Data encryption; Secure utilizingA secure cloud data computing, transmission business feature trends of (CC) have cloud to play computing a lot of communication; Attacks; ; money to the cloud service provider. Cloud service provider also

Introduction This paper proposes an intensive study for the idea of sending In recent years, many applications based on internet are has guaranteed either the confidentiality or integrity of the data. developed such as on-line shopping, internet banking and using RSA and DES algorithm of [4]. The aim is to electronic bill payment etc. Such transactions, over wire or providealready encryptedevidence of file which through of the cloud encryption in spite methodsof the original has more file wireless public networks demand end-to-end secure connections, should be private, to ensure data authentication, accountability and privacy, integrity and availability, also known as CIA triad Sopowerful even if any and intermediate effectiveness user technique sees the whendata, he encrypted will not be file able is [25]. transmitted, so original file is not available even at the network. For this reason, the proposed algorithm has utilized Feistel increased.to understand This the work data. can That’s be enhanced why confidentiality using hybrid and approach integrity by integratingis maintained multiple by this. cryptography Hence, security algorithms of cloud [28]. data will be authenticationCipher in safe wifi purposes. design (sWiFi). Experimental In addition, tests this have system provided will use an Evaluation Metrics Hash-based Message Authentication (HMAC) technology for In this paper, the analysis has been done based on the following evaluation of four encryption algorithms (AES, DES, 3DES, and metrics: [1]. Encryption is one of the principal means to guarantee security Blowfish) compared to developed sWiFi systems [26]. Encryption time: The time taken to convert to of sensitive information. Encryption algorithm performs various i- ciphertext is encryption time. Encryption time depends upon , plaintext block size and mode. In our experiment, we substitutions and transformations on the plaintext (original have measured encryption time in milliseconds. Encryption time affects performance of the system [3]. Encryption time algorithmsmessage before are widely encryption) available and and transforms used in information it into ciphertext security. (scrambled message after encryption). Many encryption must be less making the system fast and responsive.

Encryption algorithms are classified into two groups: Symmetric- Symbiosis *Corresponding author email: [email protected] A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Copyright: © 2018 Nazeh Abdul Wahid MD, et al. Guessing Attacks Prevention

ii- Decryption time: The time to recover plaintext from ciphertext transmission. If an encrypted bit is encoded with fewer bits, is called decryption time. The decryption time is desired to it will consume lesser bandwidth and lesser storage as well. be less similar to encryption time to make system responsive and fast. Decryption time affects performance of system. In our experiment, we have measured decryption time is MethodsHence, this impacts cost. milliseconds. As we have mentioned that Encryption is the process of encoding information or data in order to prevent unauthorized iii- different memory size for implementation. This memory access. There are different types of cryptographic methods that requirement Memory used: depends Different on the number encryption of operations techniques to be require done can be used. Each one of them serving different topology and by the algorithm, key size used, initialization vectors used all provide secure transmitted data through network links and and type of operations. The memory used impacts cost of the encryption and decryption algorithms have to be applied in the system. It is desirable that the memory required should be as ensure authentication and confidentiality. All these end to end small as possible. physical layer and security layer of the computer application.

iv- : In cryptography, a property called diffusion considered as well as the protocol that will be used to transmit At the same time a specific IP configurations are need to be classes which are subdivided into 2 models: classical and modern reflects cryptographic strength of an algorithm. If there is class.the traffics. The most The common diagram and below used showing is the modern us the classcipher due security to the a small change in an input, the output changes significantly. dynamic and static cryptography techniques that this technique This is also called avalanche effect. We have measured was deployed with. It is known also by its types; hammingAvalanche distance effect using as sum hamming of bit-by-bit distance. xor Hamming considering distance ASCII value,in information as it becomes theory easy is measureto implement of dissimilarity. programmatically. We find A i. same key is used for encryption and decryption [5,11]. high degree of diffusion i.e. high avalanche effect is desired. Secret Key (Symmetric Key) in a symmetric , the ii. algorithm. and decryption keys are different but related. The encryption Avalanche effect reflects performance of cryptographic keyPublic is known Key (Asymmetric as the public Key) key in and an the asymmetric, decryption the key encryption is known v- Entropy: is the randomness collected by an application for use in cryptography that requires random data. A lack of entropy as the private key. The public and private keys are known as a can have a negative impact on performance and security. key pair [5]. So, our focus point in this paper is on these two types with vi- Number of bits required for encoding optimally: the number of bits required to encode an encrypted character should be less. through our literature and to prove which one is the best with Since, the encrypted bit will be transmitted over a network their classes to show the significance for each one of them after encoding; this metric tells us the bandwidth required for what environment. (Figure 1)

Figure 1:

Classification of Encryption Methods

Citation: Page 2 of 7

Nazeh Abdul Wahid MD, Ali A, Esparham B, Marwan MD (2018) A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. J Comp Sci Appl Inform Technol. 3(2): 1-7. A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Copyright: © 2018 Nazeh Abdul Wahid MD, et al. Guessing Attacks Prevention

Advanced Encryption Standard (AES) the state. For both encryption and decryption, the begins

eachwith ofadding those Round rounds Key four stage transformations [30]. However, are before performed; reaching 1- Sub- the keyAdvance block Encryption cipher [7]. AESStandard algorithm (AES) can algorithm support was any developedcombination in final round, this output goes through nine main rounds, during 1998 by Joan Daemen and Vincent Rijmen, which is a symmetric

showsbytes, 2-the Shift overall rows, process. 3- Mix-columns, Decryption 4- is Add the round reverse Key. process In the dependingof data (128 on bits)the andkey keylength. length During of 128, encryption 192, and decryption 256 bits. final (10th) round, there is no Mix-column transformation. Figure The algorithm is referred to as AES-128, AES-192, or AES-256, of encryption and using inverse functions: Inverse Substitute

process, AES system goes through 10 rounds for I28-bit keys, 12 of AES is governed by the following transformations [12]: 3.4.1 SubstituteBytes, Inverse Shift transformation Rows and Inverse AES contains Mix Columns. 128 bit Eachdata roundblock, AESrounds allows for I92-bit a 128 keys,bit data and length 14 rounds that canfor 256-bitbe divided keys into in order four basicto deliver operational final cipher-text blocks. These or to blocks retrieve are the treated original as plain-text array of and organized as a matrix of the order of 4×4 that is called intowhich another means eachblock of using the dataan 8-bitblocks substitution has 16 bytes. box, In whichsub-byte is transformation, each byte (8-bit) of a data block is transformed

known as Rijndael Sbox [13]. (Figure 2)

Figure 2:

AES (Advanced Encryption Standard) process

Citation: Page 3 of 7

Nazeh Abdul Wahid MD, Ali A, Esparham B, Marwan MD (2018) A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. J Comp Sci Appl Inform Technol. 3(2): 1-7. A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Copyright: © 2018 Nazeh Abdul Wahid MD, et al. Guessing Attacks Prevention

Data Encryption Standard (DES) Rivest, Shamir & Adelman [9,29]. It is one of the best-known public key for key exchange or digital signatures or DES is one of the most widely accepted, publicly available encryption of blocks of data. RSA uses a variable size encryption

but was later adopted by the National Institute of Standards and cryptographic systems. It was developed by IBM in the 1970s cryptosystem based on number theory, which is a system.block and It uses a variable two prime size key.numbers It is an to asymmetricgenerate the (public public key)and Technology (NIST). The algorithm submitted to the National are used for encryption and decryption purpose. Sender encrypts isBureau now taken of Standards as unsecured (NBS) cause to of propose its small asize candidate and a brute for force the private keys size is 1024 to 4096 bits. These two different keys protection of sensitive unclassified electronic government data. It the message using Receiver public key and when the message gets transmit to receiver, then receiver can decrypt it by using attack is possible in it. The key length is 56 bits and block size is in three broad steps; , encryption and decryption. 64 bit length. It is vulnerable to key attack when a is his own private key [20,21]. RSA operations can be decomposed used. It began with a 64 bit key and then the NSA put a restriction to use of DES with a 56- bit key length, hence DES discards 8 bits theRSA designinghave many of flaws key inthen its designthe encryption therefore process not preferred becomes for toothe operateof the 64 in bit different key and thenmodes uses - CBC, the compressedECB, CFB and 56 OFB,bit key making derived it commercial use. When the small values of p & are selected for from 64 bits key to encrypt data in block size of 64bits.DES can weak and one can be able to decrypt the data by using random probability theory and side channel attacks. On the other hand, if flexible. It is vulnerable to key attack when a weak key is used. large p & q lengths are selected then it consumes more time and the performance is degraded in comparison with DES. Further, hoursIn January and 15 1999 minutes. distributed The algorithm net and is believed the Electronic to be practically Frontier Foundation (EFF) collaborated to publicly break a DES key in 22 the algorithm also requires of similar lengths for p & q, practically secure in the form of Triple DES, although there are theoretical this is very tough conditions to satisfy. techniques are attacks. In recent years, the cipher has been superseded by the more processing time. Figure illustrates the sequence of events required in such cases increases the system’s overheads by taking AdvancedRivest-Shamir-Adleman Encryption Standard (RSA) (AES) [14-16]. followed by RSA algorithm for the encryption of multiple blocks. RSA is founded in 1977 is a public key cryptosystem. RSA is an asymmetric cryptographic algorithm named after its founders Decrypt blocks of data consisting of 64 bits by using a 64-bit key [22]. (Figure 3)

Figure 3:

RSA processing of Multiple Blocks [23]

Citation: Page 4 of 7

Nazeh Abdul Wahid MD, Ali A, Esparham B, Marwan MD (2018) A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. J Comp Sci Appl Inform Technol. 3(2): 1-7. A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Copyright: © 2018 Nazeh Abdul Wahid MD, et al. Guessing Attacks Prevention

Blowfish

forweak all keys’uses [24].problem; no attack is known to be successful against. key block cipher with key length variable from 32 to 448 bits Blowfish is not patented, has free license and is freely available Blowfish was first published in 1993 [6]. It is a symmetric Results and Discussions is a symmetric block cipher that can be used as an informal In this paper, the results are analyzed based on the replacementand block size for of 64DES bits. or Its IDEA. structure It takes is fiestal a variable-length network. Blowfish key, implementation that performed in [1,27]. from 32 bits to 448 bits, making it ideal for both domestic and i- a fast, free alternative to existing encryption algorithms. From encryption time, and RSA algorithm records the slowest then,commercial it has beenuse [8]. analyzed Blowfish considerably, was designed and by it Bruce is slowly Schneier gaining as Figureencryption 4 shows time. that Based the blowfishon the encryption algorithm timerecords we thewill fastest select popularity as a robust encryption algorithm. It suffers from

the blowfish technique for further evaluation.

Figure 4:

Encryption time vs. File size for DES, 3DES, AES, Blowfish and RSA ii- Figure 5 shows that the decryption time for all algorithms iii- Up next in the table 1 presents that memory used for unit operations for all cryptographic techniques that we studied. records the fastest decryption time and RSA algorithm records is faster than the encryption time. Also, blowfish algorithm the slowest decryption time. Based on the decryption time while RSA uses the highest memory. Blowfish consumed less memory storage than other types, at the next evaluation level. Table 1: Comparison of memory used feature we will select the blowfish technique to be considered Algorithm Memory used (KB) DES 18.2 3DES

AES 20.714.7 9.38

BlowfishRSA 31.5 iv- effect, whereas RSA manifests the least avalanche effect. This has Figure turned 6 displays the attention that AES back manifests to AES for the further highest analysis avalanche and improvements. v-

Figure 5: As the entropy test and final experiment. Table 2 shows that RSA achievementsblowfish records for consideration the highest averageof a new entropysecurity aspect. per byte of Decryption time vs. File size for DES, 3DES, AES, Blowfish and encryption. That should highlight the blowfish algorithm

Citation: Page 5 of 7

Nazeh Abdul Wahid MD, Ali A, Esparham B, Marwan MD (2018) A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. J Comp Sci Appl Inform Technol. 3(2): 1-7. A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Copyright: © 2018 Nazeh Abdul Wahid MD, et al. Guessing Attacks Prevention

that all the algorithms and the classes are functioned well with differentand IPv6 execution and the examinationstime and memory recoded consumption. in this paper showing References 1. Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, Priyadarshini P, Prashant N, Narayan DG, Meena SM. A

AES, RSA and Blowfish. Procedia Computer Science. 2016;78:617- 2. 624. asymmetric cryptography with existing vulnerabilities and Yogesh K, Rajiv M, Harsh S. Comparison of symmetric and

countermeasures. International Journal of Computer Science and 3. Management Studies. 2011;11(3):60-63. Figure 6: Jeeva AL, Palanisamy V, Kanagaram K. Comparative analysis of performance efficiency and security measures of some encryption Avalanche effect for DES, 3DES, AES, Blowfish and RSA Table 2: Average entropy values algorithms. International Journal of Engineering Research and 4. Applications. 2012;2(3): 3033-3037. Average entropy per byte of Y. New Comparative Study Between DES, 3DES and AES within Nine Algorithm Alanazi HO, Zaidan BB, Zaidan AA, Jalab HA, Shabbir M, Al-Nabhani encryption DES 2.9477 5. Factors. Journal of Computing. 2010;2(3):152-157. 3DES 2.9477 Ritu T, Sanjay A. Comparative Study of Symmetric and Asymmetric

AES Cryptography Techniques. International Journal of Advance Foundation and Research in Computer. 2014;1(6):68-76. 3.840243.93891 6. Mahindrakar MS. Evaluation of Blowfish Algorithm based RSA Blowfish on Avalanche Effect. International Journal of Innovations in 7. vi- Table 3 presents AES demands the highest3.0958 number of bits Engineering and Technology. 2014;4(1):99-103. to be encoded optimally, whereas DES demands the lowest Ritu P, Vikas k. Efficient Implementation of AES. International number of bits to be encoded optimally. Journal of Advanced Research in Computer Science and Software 8. Engineering. 2013;3(7):290-295. Table 3: Optimal encoding length Pratap CM. Superiority of blowfish Algorithm. International

Average number of bits demanded to Journal of Advanced Research in Computer Science and Software Algorithm 9. optimally encode a byte of encrypted data Engineering. 2012;2(9):196-201. Preetha M, Nithya M. A study and performance analysis of RSA DES 27 algorithm. International Journal of Computer Science and Mobile 3DES Computing. 2013;2(6):126-139. by using triple DES and performance analysis of crypto system. AES 40 10. Karthik S, Muruganandam A. Data encryption and decryption 128 256 International Journal of Scientific Engineering and Research. BlowfishRSA 44 11. 2014;2(11):24-31. Conclusion Elminaam DSA, Kader HMA, Hadhoud MM. Performance Evaluation of Symmetric Encryption Algorithms. International Journal of Each of cryptographic algorithms has weakness points and 12. Computer Science and Network Security. 2008;8(12):280-286. on the demands of the application that will be used. From the Akash KM, Chandra P, Archana T. Performance Evaluation of strength points. We select the cryptographic algorithm based Cryptographic Algorithms: DES and AES. IEEE Students’ Conference 13. is the perfect choice in case of time and memory according to on Electrical, Electronics and Computer Science. 2012:1-5. theexperiment criteria ofresults guessing and attacks the comparison, and the required the blowfish features, algorithm since it Ritu P, Vikas k. Efficient Implementation of AES. International records the shortest time among all algorithms. Also, it consumes Journal of Advanced Research in Computer Science and Software 14. Engineering. 2013;3(7):290-295. by using triple DES and performance analysis of crypto system. Karthik S, Muruganandam A. Data encryption and decryption applicationthe minimum is memorythe network storage. bandwidth, If confidentiality the DES is and the integrity best option. are major factors, AES algorithm can be selected. If the demand of the International Journal of Scientific Engineering and Research. 15. prevent the application from guessing attacks and it can be 2014;2(11):24-31. We can consider that blowfish and AES algorithms are used to applied on top of all the internet protocols that are based on IPv4 Stallings W. Cryptography and network Security: Principles and DES. Available from: http://www.tropsoft.com/strongenc/des.htm Practice. 5th Edition Pearson Education/Prentice Hall; 2011. 16. Citation: Page of 7

Nazeh Abdul Wahid MD, Ali A, Esparham B, Marwan MD (2018) A Comparison of Cryptographic Algorithms: DES, 3DES, 6 AES, RSA and Blowfish for Guessing Attacks Prevention. J Comp Sci Appl Inform Technol. 3(2): 1-7. A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Copyright: © 2018 Nazeh Abdul Wahid MD, et al. Guessing Attacks Prevention

17. 3DES. Available from: http://www.cryptosys.net/3des.html 25. 18. Security analysis of a cryptographically- enabled RFID device. In: Bono SC, Green M, Stubblefield A, Juels A, Rubin AD, Szydlo M. thconference on USENIX Security Preetha M, Nithya M. A study and performance analysis of RSA algorithm. International Journal of Computer Science and Mobile SSYM’05: Proceedings of the 14 19. 3DES. Available from: http://en.wikipedia.org/wiki/Triple_DES Computing. 2013;2(6):126-139. Symposium. 2005. 26. Schneier B, Kelsey J. Unbalanced Feistel networks and block cipher 20. Aman K, Sudesh J, Sunil M. Comparative Analysis between DES and design. In: Proceedings of the Third International Workshop on Fast 27. RSA Algorithm’s. International Journal of Advanced Research in 12 Software Encryption. 1996:121-144. 21. A. Automated design of a lightweight block cipher with genetic Computer Science and Software Engineering. 2012;2(7):386-391. Polimon J, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda Xin Z, Xiaofei T. Research and Implementation of RSA Algorithm for 28. Encryption and Decryption. 6th International Forum on Strategic programming. Int J Know-Based Intell Eng Syst. 2008;12(1):3-14. 22. Technology. 2011:1118-1121. Pooja B. Optimization of Cryptography Algorithms in Cloud Preetha M, Nithya M. A study and performance analysis of RSA Computing. International Journal of Computer Trends and 29. Sonal S, algorithm. International Journal of Computer Science and Mobile Technology. 2017;46(2):67-72. 23. subset sum cryptosystem. 2nd International Conference on Computing. 2013;2(6):126-139. Prashant S, Ravi Shankar D. RSA algorithm using modified Stallings W. Cryptography and network Security: Principles and 24. Shraddha D. Performance Analysis of AES and DES Cryptographic Practice. 5th Edition Pearson Education/Prentice Hall; 2011. Computer and Communication Technology. 2011:457-461. Pratap CM. Superiority of blowfish Algorithm. International 30. Journal of Advanced Research in Computer Science and Software Algorithms on Windows & Ubuntu using Java. International Journal Engineering. 2012;2(9):196-201. of Computer Trends and Technology. 2016;35(4):179-183.

Citation: Page 7 of 7

Nazeh Abdul Wahid MD, Ali A, Esparham B, Marwan MD (2018) A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. J Comp Sci Appl Inform Technol. 3(2): 1-7.