www.symbiosisonline.org www.symbiosisonlinepublishing.com Symbiosis ISSN Online: 2474-9257 Research Article Journal of Computer Science Applications and Information Technology Open Access A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention Mohammed Nazeh Abdul Wahid*, Abdulrahman Ali, Babak Esparham and Mohamed Marwan Limkokwing University of Creative and Technology, Post Graduate Centre, Cyberjaya, Malaysia Received: June 22, 2018; Accepted: July 12, 2018; Published: August 10, 2018 *Corresponding author: Mohammed Nazeh Abdul Wahid, Senior Lecturer, Limkokwing university of creative technology, Post Graduate Centre, Cyberjaya, Malaysia, Tel: +60104339985; E-mail: [email protected] Abstract Encryption is the process of encoding information or data in key (also called secret-key) and Asymmetric-key (called public- order to prevent unauthorized access. These days we need to secure key) encryption [2]. the information that is stored in our computer or is transmitted via evaluation is a network security system for an application using internet against attacks. There are different types of cryptographic the Aproposed secure Wi-Fi algorithm. system As for for wireless some cryptographicnetworks: experimental system, it methods that can be used. Basically, the selecting cryptographic is commonly used to secure communication channels by using method depends on the application demands such as the response public key exchanges based on algorithms such as RSA, DES, AES, cryptographic algorithms has its own weak and strong points. In this paper,time, bandwidth,we will present confidentiality the result of and the implementationintegrity. However, and analysiseach of the key used to encrypt data sent over an unsecured Internet that applied on several cryptographic algorithms such as DES, 3DES, channel.Triple DES In andaddition, Blowfish. the existingFrom the cryptographic key exchange, algorithm it depends relies on the previous cryptographic techniques in terms of performances, weaknessesAES, RSA and and blowfish. strengths. Also, we will show the comparisons between on a data separation model designed by IBM’s Horst Feistel [27]. has plays a very important role in business perspective. For Keywords: Network security; Data encryption; Secure utilizingA secure cloud data computing, transmission business feature trends of (CC) have cloud to play computing a lot of communication; Attacks; Ciphertext; money to the cloud service provider. Cloud service provider also Introduction This paper proposes an intensive study for the idea of sending In recent years, many applications based on internet are has guaranteed either the confidentiality or integrity of the data. developed such as on-line shopping, internet banking and using RSA and DES algorithm of cryptography [4]. The aim is to electronic bill payment etc. Such transactions, over wire or providealready encryptedevidence of file which through of the cloud encryption in spite methodsof the original has more file wireless public networks demand end-to-end secure connections, should be private, to ensure data authentication, accountability and privacy, integrity and availability, also known as CIA triad Sopowerful even if anyand intermediateeffectiveness user technique sees the when data, heencrypted will not befile able is [25]. transmitted, so original file is not available even at the network. For this reason, the proposed algorithm has utilized Feistel increased.to understand This the work data. can That’s be enhanced why confidentiality using hybrid and approach integrity by integratingis maintained multiple by this. cryptography Hence, security algorithms of cloud [28]. data will be authenticationCipher in safe wifi purposes. design (sWiFi). Experimental In addition, tests this have system provided will use an Evaluation Metrics Hash-based Message Authentication Code (HMAC) technology for In this paper, the analysis has been done based on the following evaluation of four encryption algorithms (AES, DES, 3DES, and metrics: [1]. Encryption is one of the principal means to guarantee security Blowfish) compared to developed sWiFi systems [26]. Encryption time: The time taken to convert plaintext to of sensitive information. Encryption algorithm performs various i- ciphertext is encryption time. Encryption time depends upon key size, plaintext block size and mode. In our experiment, we substitutions and transformations on the plaintext (original have measured encryption time in milliseconds. Encryption time affects performance of the system [3]. Encryption time algorithmsmessage before are widely encryption) available and and transforms used in information it into ciphertext security. (scrambled message after encryption). Many encryption must be less making the system fast and responsive. Encryption algorithms are classified into two groups: Symmetric- Symbiosis Group *Corresponding author email: [email protected] A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Copyright: © 2018 Nazeh Abdul Wahid MD, et al. Guessing Attacks Prevention ii- Decryption time: The time to recover plaintext from ciphertext transmission. If an encrypted bit is encoded with fewer bits, is called decryption time. The decryption time is desired to it will consume lesser bandwidth and lesser storage as well. be less similar to encryption time to make system responsive and fast. Decryption time affects performance of system. In our experiment, we have measured decryption time is MethodsHence, this impacts cost. milliseconds. As we have mentioned that Encryption is the process of encoding information or data in order to prevent unauthorized iii- different memory size for implementation. This memory access. There are different types of cryptographic methods that requirement Memory used: depends Different on the numberencryption of operations techniques to berequire done can be used. Each one of them serving different topology and by the algorithm, key size used, initialization vectors used all provide secure transmitted data through network links and and type of operations. The memory used impacts cost of the encryption and decryption algorithms have to be applied in the system. It is desirable that the memory required should be as ensure authentication and confidentiality. All these end to end small as possible. physical layer and security layer of the computer application. iv- Avalanche effect: In cryptography, a property called diffusion considered as well as the protocol that will be used to transmit At the same time a specific IP configurations are need to be classes which are subdivided into 2 models: classical and modern reflects cryptographic strength of an algorithm. If there is class.the traffics. The most The common diagram and below used showing is the modern us the classcipher due security to the a small change in an input, the output changes significantly. dynamic and static cryptography techniques that this technique This is also called avalanche effect. We have measured was deployed with. It is known also by its types; hammingAvalanche distance effect using as sum hamming of bit-by-bit distance. xor Hamming considering distance ASCII value,in information as it becomes theory easy is measureto implement of dissimilarity. programmatically. We find A i. same key is used for encryption and decryption [5,11]. high degree of diffusion i.e. high avalanche effect is desired. Secret Key (Symmetric Key) in a symmetric cryptosystem, the ii. algorithm. and decryption keys are different but related. The encryption Avalanche effect reflects performance of cryptographic keyPublic is known Key (Asymmetric as the public Key) key in and an the asymmetric, decryption the key encryption is known v- Entropy: is the randomness collected by an application for use in cryptography that requires random data. A lack of entropy as the private key. The public and private keys are known as a can have a negative impact on performance and security. key pair [5]. So, our focus point in this paper is on these two types with vi- Number of bits required for encoding optimally: the number of bits required to encode an encrypted character should be less. through our literature and to prove which one is the best with Since, the encrypted bit will be transmitted over a network their classes to show the significance for each one of them after encoding; this metric tells us the bandwidth required for what environment. (Figure 1) Figure 1: Classification of Encryption Methods Citation: Page 2 of 7 Nazeh Abdul Wahid MD, Ali A, Esparham B, Marwan MD (2018) A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. J Comp Sci Appl Inform Technol. 3(2): 1-7. A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Copyright: © 2018 Nazeh Abdul Wahid MD, et al. Guessing Attacks Prevention Advanced Encryption Standard (AES) the state. For both encryption and decryption, the cipher begins eachwith ofadding those Round rounds Key four stage transformations [30]. However, are before performed; reaching 1- Sub- the keyAdvance block Encryption cipher [7]. AESStandard algorithm (AES) can algorithm support was any developedcombination in final round, this output goes through nine main rounds, during 1998 by Joan Daemen and Vincent Rijmen, which is a symmetric showsbytes, 2-the Shift overall rows, process. 3- Mix-columns, Decryption 4- isAdd the round reverse Key. process
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages7 Page
-
File Size-