
UNF Digital Commons UNF Graduate Theses and Dissertations Student Scholarship 2007 Performance Analysis of Security Protocols Praveen Kumar Donta University of North Florida Suggested Citation Donta, Praveen Kumar, "Performance Analysis of Security Protocols" (2007). UNF Graduate Theses and Dissertations. 172. https://digitalcommons.unf.edu/etd/172 This Master's Project is brought to you for free and open access by the Student Scholarship at UNF Digital Commons. It has been accepted for inclusion in UNF Graduate Theses and Dissertations by an authorized administrator of UNF Digital Commons. For more information, please contact Digital Projects. © 2007 All Rights Reserved PERFORMANCE ANALYSIS OF SECURITY PROTOCOLS by Praveen Kumar Donta A project submitted to the School of Computing in partial fulfillment of the requirements for the degree of Master of Science in Computer and Information Sciences UNIVERSITY OF NORTH FLORIDA SCHOOL OF COMPUTING April, 2007 Copyright (©) 2007 by Praveen Kumar Donta All rights reserved. Reproduction in whole or in part in any form requires the prior written permission of Praveen Kumar Donta or his designated representative. ii The project "Performance Analysis of Security Protocols" submitted by Praveen Kumar Donta in partial fulfillment of the requirements for the degree of Master of Science in Computer and Information Sciences has been Approved by: Date Signature deleted Dr. Sanjay Ahuja Project Director Signature deleted Dr. Charles . Winton Graduate Director Signature deleted o Dire or, School of Computing iii ACKNOWLEDGEMENTS I am thankful for Dr. Sanjay Ahuja’s invaluable suggestions and assistance throughout this project. My wife, Sunitha, and my son, Nihal, gave their help and encouragement during long hours of project work. My gratitude to my brother, Ramesh, for his continuous support in every part of my life. I am thankful for my parents’ care and love. iv CONTENTS List of Figures................................................................................................................. viii List of Tables .......................................................................................................................x Abstract............................................................................................................................. xi Chapter 1: Introduction........................................................................................................1 Chapter 2: Security Algorithms, Message Digest and SSL .................................................3 2.1 Symmetric Key Algorithms ........................................................................... 3 2.1.1 DES.................................................................................................... 3 2.1.2 3DES...................................................................................................3 2.1.3 AES.....................................................................................................4 2.1.4 RC4 .....................................................................................................4 2.2 Public-Private Key Algorithms....................................................................... 5 2.2.1 RSA ....................................................................................................5 2.2.2 ElGamal .............................................................................................5 2.3 Message Digests .............................................................................................6 2.3.1 MD5 ................................................................................................... 6 2.3.2 SHA1.................................................................................................. 7 2.4 SSL ................................................................................................................ 7 Chapter 3: Project Description.............................................................................................9 3.1 Overview..........................................................................................................9 3.2 Hardware........................................................................................................11 v 3.3 Software .........................................................................................................11 Chapter 4: Testing Methodology .......................................................................................12 4.1 Security Algorithms Testing Method.............................................................12 4.2 SSL Testing Method ......................................................................................12 Chapter 5: Results ............................................................................................................ 13 5.1 DES Versus RC4 Encryption and Decryption Times.................................. 13 5.2 3DES Versus RC4 Versus AES Encryption and Decryption Times With 192 Bit Key..........................................................................................15 5.3 RC4 Versus AES With 5K File ....................................................................17 5.4 RC4 Versus AES With 10K file ...................................................................19 5.5 RSA Algorithm Encryption and Decryption.................................................21 5.6 ElGamal Encryption and Decryption Times.................................................24 5.7 Digital Certificate SHA1 Versus MD5 With RSA .......................................27 5.8 SSL Communication Timings for Two Sets of Security Algorithms...........28 Chapter 6: Analysis and Conclusions ................................................................................30 6.1 Analysis of Test Results..................................................................................30 6.2 Security Algorithms Performance Comparison From Previous Studies.........32 6.2.1 Crypro++ 5.2.1 Benchmarks ............................................................32 6.2.2 Testing a Variety of Encryption Technologies ................................34 6.2.3 Security Performance .......................................................................35 6.3 Conclusions.....................................................................................................37 References......................................................................................................................... 38 Appendix A: Security Protocols Code Listings................................................................ 39 vi Appendix B: SSL Code Listings..................................................................................... 111 Vita ................................................................................................................................. 120 vii LIST OF FIGURES Figure 1: Example of a Digital Signature Scheme ........................................................... 6 Figure 2: Layers for a User Browsing With SSL .............................................................. 8 Figure 3: Simplified Version of the SSL Connection Establishment Protocol ................ 8 Figure 4: DES Versus RC4 With 64 Bit Key Encryption and Decryption ......................14 Figure 5: 3DES Versus RC4 Versus AES Encryption With 192 Bit Key....................... 15 Figure 6: 3DES Versus RC4 Versus AES Decryption With 192 Bit Key........................16 Figure 7: RC4 Versus AES Encryption With 5K File ......................................................18 Figure 8: RC4 Versus AES Decryption With 5K File......................................................18 Figure 9: RC4 Versus AES Encryption With 10K File ....................................................20 Figure 10: RC4 Versus AES Decryption With 10K File..................................................20 Figure 11: RSA Encryption Times for 100 bytes File .......................................................22 Figure 12: RSA Encryption Times ....................................................................................22 Figure 13: RSA Decryption Times for 100 bytes File.......................................................23 Figure 14: RSA Decryption Times ....................................................................................23 Figure 15: ElGamal Encryption Times for 100 bytes File.................................................25 Figure 16: ElGamal Encryption Times..............................................................................25 Figure 17: ElGamal Decryption Times for 100 bytes File ................................................26 Figure 18: ElGamal Decryption Times..............................................................................26 Figure 19: Digital Certificate Times SHA1 Versus MD5 With RSA................................27 Figure 20: Digital Certificate Maximum Throughput SHA1 and MD5 With RSA ..........28 viii Figure 21: SSL Communication 3DES-SHA1 Versus RC4-MD5 With RSA Maximum Throughput.......................................................................................................29 Figure 22: Maximum Throughput of Secure Socket Layer .............................................37 ix LIST OF TABLES Table 1: Throughput For Security Algorithms Using Crypto++ ...................................... 33 Table 2: Performance of RSA Public Key Algorithm Using Crypto++ .......................... 34 Table 3: Testing a Variety of Encryption Technologies..................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages132 Page
-
File Size-