ANALYSIS OF AES ENCRYPTION WITH ECC
|
|
- Louisa Walker
- 5 years ago
- Views:
Transcription
1 ANALYSIS OF AES ENCRYPTION WITH ECC Samiksha Sharma Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Vinay Chopra Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Abstract In present era the requirement of internet for wireless communication is rising day by day and thus there is a need of security to guard such communication on unsecure wireless channels. To defend the data from external threat various cryptography techniques are used such as symmetric, asymmetric and hashing. In this paper analysis of AES which is a symmetric technique is done with ECC. Results obtained are analyzed on the basis of different parameters that include storage, encryption time, decryption time, avalanche effect and correlation. Obtained results demonstrate that the impact of this hybrid approach is significant and better than other algorithms. Keywords Advanced encryption standard (AES), Elliptic curve cryptography (ECC), Avalanche effect, Correlation. I. INTRODUCTION The requirement of internet for wireless communication is rising day by day and thus there is a need of security to safeguard such communication by users on unsecure wireless channels. Data sent over the communication channels is susceptible to attacks because of sensitive information it contain. To defend the data from external threat the concept of Cryptography is emerged. Cryptography is defined as An art of writing a secret code [1], Methodology of writing such code is cipher where a normal text is converted into cipher text which is commonly called Encryption whereas the reverse practice of converting a cipher text into normal text is known as Decryption. Cryptography can be categorized as classical and modern, classical cryptography techniques were used to foil eavesdropping and message interception problems whereas the modern cryptography techniques are more secure and useful for high speed communications. Modern cryptography techniques are more secure than the classical ones and are widely used such as DES, 3DES, AES, ECC, ECDH, RSA etc. Terminology of cryptography is given in the figure 1 below which defines how the data will be encrypted and decrypted. Here plain text will be accepted as input and cipher after encryption will be the output. Using key, user can derive the original plain text after decryption. Fig 1. Encryption/Decryption Terminology Plain Text: Original text which user uses for the communication purpose is termed as plain Text. For example bob sends how are you to alice, here the plain text is how are you. Cipher Text: Plain text is transformed into a message(cipher text) which cannot be interpret by third party out of communication. Example : bye is converted into #@a%. 195
2 Encryption: Encryption is a procedure of transforming the plain text into the cipher text which is in non-readable form. Decryption: Decryption is a process of transforming the encrypted text back into the plain text. Plain text is converted into cipher text after encryption using the key, then the cipher is transformed back to original text after decryption with the help of key. Cryptography must ensure four basic data protection requirements which are authentication, privacy, integrity and non repudiation. From [2] we can define these requirements as: Authentication - Where we have to verify user s identity involved in communication. Privacy - To ensure no third person can intercept the message. Integrity - Ensures that original message and received are identical i.e. no alteration of data. Non-repudiation- Here we need to verify the sender s identity. AES is announced as a federal information Processing standard by NIST (National institutes of standards and technology) in AES is recurrently used encryption technique due to its high security, efficiency and simplicity [3]. It uses the same key for both encryption and decryption process and known as symmetric block cipher. Being a block cipher technique it will take the whole block of data and perform encryption and decryption on that block. It uses three block ciphers AES-192, AES-128, AES-256. There are different rounds of processing according to the block size such as 10 rounds for 128- bit key, 12 rounds for 192-bit key and 14 rounds for 256-bit key [4]. ECC is pronounced as elliptic curve cryptography, developed by Neil Koblitz and Vector Miller in ECC provides better security with a smaller key size if we compare it with other asymmetric algorithm ECC 160-bit gives same level of security to data as RSA 1024-bit does. High level of security can be achieved using a small key size. On the other hand, another advantage of this technique is memory resources which are required for computation are lesser. To crack ECC we almost require double computation than to crack RSA. II. LITERATURE SURVEY This section will have the sight of all research work done in field of Advance encryption algorithm. In the past years lot of research has been done in the area of cryptography, various cryptography techniques have been evaluated on the basis of various parameters. In [5] a comparative analysis is performed between various symmetric techniques and at the end it is concluded that AES requires medium memory size as compared to other symmetric techniques and the strength of the algorithm in perspective of security is excellent. Also from [6] AES consumes less time for encryption than RSA. AES algorithm gives better security than RSA and DSA because it requires less time for encryption and decryption [7]. With the same key length if we compare, 3DES is much slower than AES almost three times and AES with respect to key length if we compare with RSA is much faster than RSA about hundred times [8]. For cloud security AES is considered as best cryptography technique [9], with respect to security having diverse key sizes of 128, 192 and 256 bit. Also it provides shield adjacent to different attacks such as differential attack, recovery attack, key attack and square attack. In [3] we can see on accumulating additional rounds (Nr) 16 to AES 196
3 more computational time is required to break the security of algorithm hence enhancing security of system data. In [10] a comparison study is done for AES and DES which concludes that for less memory requirement AES is better. For the same file size it requires 10.2 MB and DES requires 43.3 MB, also the simulation time of DES is greater than AES. In [11] a hybrid approach is used combining the AES and RSA for improved security where data is encrypted by AES and key management is performed by RSA. For securing the Bluetooth transmissions a hybrid approach is used in [12] where AES keys are encrypted by RSA and this approach takes the advantages of both AES and RSA thus highly secure. For the transmission of digital motion images AES is used with DES which will provide better security as AES cannot withstand algebraic attacks [13]. In [14] encryption is done by AES first, then DES is used for encryption after encrypting with AES and DES, data is encrypted with combined approach AES and DES which gave complex results or cipher code that is difficult to break. AES has been used with various algorithms before such as RSA, DSA, Blowfish and many more. In this paper we are going to analyze the performance of AES combining this algorithm with Elliptic curve cryptography (ECC). User will input the text files, after that the performance will be analyzed on the basis of various parameters such as time, storage, avalanche effect and correlation. III. A BRIEF PREFACE TO AES ENCRYPTION AES is announced as a federal information Processing standard by NIST (National institutes of standards and technology) in AES is recurrently used encryption technique due to its high security, efficiency and simplicity [3]. It uses the same key for both encryption and decryption process and known as symmetric block cipher. It uses three block ciphers AES-192, AES-128, AES There are different rounds of processing according to the block size such as 10 rounds for 128- bit key, 12 rounds for 192-bit key and 14 rounds for 256-bit key [4]. Different steps for encrypting data with AES, Key Expansion- Rinjndael s Key Schedule is used to calculate the round key using the cipher key. Initial Round 1. Add round key: Bitwise XOR operation is used to combine each byte of the state with the derived round key. Different Rounds of Processing 1. Sub Bytes: every Byte is replaced with another using the lookup table, a non linear kind of substitution. 2. Shift rows: This is called transposition step where each row will by cyclically shifted to number of times required. 3. Mix columns: four Bytes of each column are combined in a state matrix. Final Round 1. Sub Bytes 2. Shift Rows 3. Add Round Key So, the final round will not have mixing of columns. The above steps are demonstrated by figure 2 given below. 197
4 number of points generated on the elliptic curve. Large number of points on the curve gives high level of security. Elliptic curve is shown in figure 3 below- Fig 2. Encryption/Decryption in AES IV. ECC ENCRYPTION ECC is pronounced as elliptic curve cryptography, developed by Neil Koblitz and Vector Miller in ECC provides better security with a smaller key size if we compare it with other asymmetric algorithms [9]. ECC 160-bit gives same level of security to data as RSA 1024-bit does. High level of security can be achieved using a small key size. ECC works on elliptic curve equation. Elliptic curve equation for binary field is written as- Where a and b are two constants, different elliptic curves will be shaped with different values of these two constants. Elliptic curve equation for prime field is given as- Here a and b are constants and p is a prime number. Grater the value of number p more will be the Fig 3. Elliptic curve V. PROPOSED METHODOLOGY AES is implemented with ECC where the input text is transformed into encrypted form using AES algorithm but the key used for encryption process is generated using ECC (elliptic curve cryptography). Client will decrypt the text message using that key to get the original text file. The complete process has following steps: Step 1: Different text files of different sizes are taken as input. Step 2: After taking text file as input, Advance encryption standard algorithm is applied for encrypting the text file. AES will encrypt the text using a key which is not its own but generated by elliptic curve cryptography algorithm (ECC). Step 3: Encrypted text file is uploaded to the server after encryption using AES. Step 4: Client will download the encrypted file from the server. Using the same key generated by elliptic curve cryptography algorithm, client will decrypt the encrypted text. After decryption is successfully done client will have the original text file. Step 5: Analysis of AES-ECC at the end is done on the basis of different parameters such as Avalanche effect, encryption time, decryption time, storage 198
5 required and correlation coefficient. Figure 4 illustrates the process of AES-ECC encryption. Fig 4. AES ECC Encryption and Decryption VI. RESULTS AND DISCUSSIONS The above methodology is implemented in JAVA 8 using Eclipse an open source platform that allows a developer to create a customized development environment (IDE). The above experiment is conducted on different text files with different sizes (KB). Files with different sizes are taken as input to the system and evaluation is done on the basis of different parameters like correlation, Avalanche effect, storage, encryption time and decryption time. A. PARAMETER EVALUATION USING AES-ECC Different text files are taken as input and encrypted using AES-ECC hybrid approach. Performance of the used hybrid approach is evaluated on the basis of different parameters given in table I and table II below. TABLE I Evaluation on the basis of storage, encryption time and decryption time File Name License. txt new.txt new1.txt Origi nal Size Encryp ted file size(kb) Encrypt ion Time(m s) Decrypt ion Time(m s) (kb) readme.t xt example.txt In table II, evaluation of AES-ECC is done on the basis of avalanche effect and correlation taking again different files as input. TABLE II Evaluation on the basis of avalanche effect and correlation File Name Original Avalanche Correlation Size License.txt new.txt
6 new1.txt readme.txt example.txt Figure 5, represents the graphical outputs of storage which is encrypted file size against the original file sizes taken as input. approach. Figure 7 represents avalanche which is by how much percentage the output will change with a little variation in input. avalanche License.txt new.txt new.1txt readme.txt example.txt Fig 5. Encrypted file size of different input files From the above figure it can be seen storage of encrypted files is more than the original file size. Figure 6 gives graphical outputs of encryption and decryption time whereas figure 7 and figure 8 gives avalanche effect and correlation against files taken as input to the hybrid system. Fig 6. different input files Original file size Encrypted file size Encryption Time Decryption Time Encryption and Decryption time of While decrypting files it takes less time than encrypting the files through AES-ECC hybrid Fig 7. Avalanche effect in different file sizes Correlation License.txt new1.txt new.txt readme.txt example.txt Fig 8. Correlation in different files VII. CONCLUSION In this paper AES is implemented with ECC where the input text file is transformed into encrypted form using AES encryption but the key is generated through ECC (Elliptic curve cryptography). Client will use that key to decrypt the text file which is uploaded to the server in encrypted form to get the original text file. At last analysis of AES encryption with ECC is done on the basis of different parameters like storage requirement, encryption time, decryption time, avalanche effect and correlation. Obtained results illustrate that the impact of this hybrid approach is significant and better than other algorithms. Future work will focus on the improvement in the key generation of AES using some another cryptography model that can provide better security. 200
7 VIII. REFERENCES [1] R. Denning and D. Elizabeth, Cryptography and Data Security. America : Addison-Wesley Publishing Company, [2] G. Kessler, An overview of cryptography. [Online] Available: html#purpose. [3] P. Kumar and S. B. Rana. "Development of modified AES algorithm for data security." Optik- International Journal for Light and Electron Optics 127, no.4, pp , [4] R. Bhanot and R. Hans. "A Review and Comparative Analysis of Various Encryption Algorithms." International Journal of Security and Its Applications 9, no.4, pp , [5] P. Patil et al. "A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish." Procedia Computer Science 78, pp , [6] P. Prajapati et al. "Comparative Analysis of DES, AES, RSA Encryption Algorithms." International Journal of Engineering and Management Research 4, no.1, [7] P. Mahajan and A. Sachdeva. "A study of Encryption algorithms AES, DES and RSA for security." Global Journal of Computer Science and Technology 13, no.15, [8] Y. Wang, and M. Hu. "Timing evaluation of the known cryptographic algorithms." Computational Intelligence and Security, 2009 International Conference on IEEE Vol. 2. [9] V. R. Pancholi and B. P. Patel. "Enhancement of Cloud Computing Security with Secure Data Storage using AES." International Journal for Innovative Research in Science and Technology 2, no.9, pp , [10] A. K. Mandal, C. Parakash, and A. Tiwari. "Performance evaluation of cryptographic algorithms: DES and AES."Electrical, Electronics and Computer Science (SCEECS), 2012 IEEE Students' Conference on. IEEE, pp 1-5. [11] A. A. Hasib and A. A. M. Mahmudul Haque. "A comparative study of the performance and security issues of AES and RSA cryptography." Convergence and Hybrid Information Technology, ICCIT'08. Third International Conference on. IEEE, Vol 2, pp [12] K. Rege et al. "Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA." International Journal of Computer Applications 71, no.22, [13] M. B. Vishnu, et al. "Security enhancement of digital motion image transmission using hybrid AES-DES algorithm." th Asia-Pacific Conference on Communications. IEEE, pp [14] W. Tianfu and K. R. Babu. "Design of a Hybrid Cryptographic Algorithm." International Journal of Computer Science & Communication Networks 2, no. 2, Samiksha Sharma received her B. Tech degree from Beant College of Engineering and Technology, Punjab, India and currently pursuing Masters from DAV Institute of Engineering and Technology, Jalandhar, Punjab, India. Her research areas include cryptography and network security. 201
Cryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationImplementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 4.72 e-issn (O): 2348-4470 p-issn (P): 2348-66 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May-17 Comparaitive Analysis
More informationSecure Encryption Using Armstrong Number,Color Code ASCII and Prime Number
Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 6 (2017), pp. 1257-1265 Research India Publications http://www.ripublication.com Secure Encryption Using Armstrong Number,Color
More informationENHANCED AES ALGORITHM FOR STRONG ENCRYPTION
ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION V. Sumathy & C. Navaneethan Assistant Professor, Department of CSE, Kingston Engineering College, Vellore, Tamil Nadu, India ABSTRACT In this paper we present
More informationDelineation of Trivial PGP Security
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 20, Issue 3, Ver. I (May. - June. 2018), PP 17-23 www.iosrjournals.org Delineation of Trivial PGP Security Mr.
More informationInternational Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY
Scientific Journal of Impact Factor (SJIF): 3134 ISSN (Print): 2348-6406 ISSN (Online): 2348-4470 International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS
More informationComputer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a
More informationDiversified Caesar Cipher for Impeccable Security
Vol.11, No.3 (2017), pp.33-40 http://dx.doi.org/10.14257/ijsia.2017.11.2.04 Diversified Caesar Cipher for Impeccable Security 1 Priya Verma, 2 Gurjot Singh Gaba, 3 Rajan Miglani * 1,2,3 Discipline of Electronics
More informationHybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm
ISSN : 0974 5572 International Science Press Volume 9 Number 40 2016 Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm D. Anitha a S. Aruna a Mathew a K. Mathew a and Devilal
More informationFPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM
FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM P. Aatheeswaran 1, Dr.R.Suresh Babu 2 PG Scholar, Department of ECE, Jaya Engineering College, Chennai, Tamilnadu, India 1 Associate
More informationFPGA Based Design of AES with Masked S-Box for Enhanced Security
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 3 Issue 5ǁ May 2014 ǁ PP.01-07 FPGA Based Design of AES with Masked S-Box for Enhanced Security
More informationUNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan
UNIT - II Traditional Symmetric-Key Ciphers 1 Objectives To define the terms and the concepts of symmetric key ciphers To emphasize the two categories of traditional ciphers: substitution and transposition
More informationAPNIC elearning: Cryptography Basics
APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security
More information06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security
1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of
More informationChapter 3 Traditional Symmetric-Key Ciphers 3.1
Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric
More informationCryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.
Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets
More informationCryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain
Cryptography Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar Submitted by:- Hardeep Gaurav Jain Cryptography Cryptography, a word with Greek origins, means "secret writing." However, we use the term
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 6: Advanced Encryption Standard (AES) Ion Petre Department of IT, Åbo Akademi University 1 Origin of AES 1999: NIST
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationCRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext
CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public
More informationFPGA Can be Implemented Using Advanced Encryption Standard Algorithm
FPGA Can be Implemented Using Advanced Encryption Standard Algorithm Shahin Shafei Young Researchers and Elite Club, Mahabad Branch, Islamic Azad University, Mahabad, Iran Email:Shahin_shafei@yahoo.com
More informationMODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3
ISSN 2277-2685 IJESR/Feb 2015/ Vol-5/Issue-2/76-81 Rajdeep Chakraborty et. al./ International Journal of Engineering & Science Research MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT)
More informationI. INTRODUCTION. Manisha N. Kella * 1 and Sohil Gadhiya2.
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology A Survey on AES (Advanced Encryption Standard) and RSA Encryption-Decryption in CUDA
More informationISSN: Page 320
A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar
More informationNetwork Security Essentials
Network Security Essentials Applications and Standards Third Edition William Stallings Chapter 2 Symmetric Encryption and Message Confidentiality Dr. BHARGAVI H. GOSWAMI Department of Computer Science
More informationKeywords :Avalanche effect,hamming distance, Polynomial for S-box, Symmetric encryption,swapping words in S-box
Efficient Implementation of Aes By Modifying S-Box Vijay L Hallappanavar 1, Basavaraj P Halagali 2, Veena V Desai 3 1 KLES s College of Engineering & Technology, Chikodi, Karnataka 2 V S M Institute of
More informationFPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed
FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed Vijaya Kumar. B.1 #1, T. Thammi Reddy.2 #2 #1. Dept of Electronics and Communication, G.P.R.Engineering College,
More informationA SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS
Volume 116 No. 6 2017, 149-153 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET
More information2.1 Basic Cryptography Concepts
ENEE739B Fall 2005 Part 2 Secure Media Communications 2.1 Basic Cryptography Concepts Min Wu Electrical and Computer Engineering University of Maryland, College Park Outline: Basic Security/Crypto Concepts
More informationCryptanalysis. Ed Crowley
Cryptanalysis Ed Crowley 1 Topics Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types 2 Cryptanalysis Science of cracking ciphers and codes, decoding secrets,
More informationThis chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest
1 2 3 This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest PKCS, Diffie- Hellman key exchange. This first published
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Secret Key Cryptography Block cipher DES 3DES
More informationBlock Ciphers. Secure Software Systems
1 Block Ciphers 2 Block Cipher Encryption function E C = E(k, P) Decryption function D P = D(k, C) Symmetric-key encryption Same key is used for both encryption and decryption Operates not bit-by-bit but
More informationProposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect
Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect 1 Aumreesh Saxena, 2 Sourabh Singh 1 Sagar Institute of Research Technology and Science, Bhopal, Madhya Pradesh
More informationECC Elliptic Curve Cryptography. Foundations of Cryptography - ECC pp. 1 / 31
ECC Elliptic Curve Cryptography Foundations of Cryptography - ECC pp. 1 / 31 Elliptic Curve an elliptic curve E is a smooth, projective, algebraic curve defined by the following equation: y 2 3 2 a xy
More informationCryptography and Network Security
Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY PRAKASH C. GUPTA Former Head Department of Information Technology Maharashtra Institute of Technology Pune Delhi-110092 2015 CRYPTOGRAPHY
More informationCIS 3362 Final Exam. Date: 12/9/2015. Name:
CIS 3362 Final Exam Date: 12/9/2015 Name: 1) (7 pts) Consider an adjusted shift cipher on an alphabet with 36 characters, the letters 'A' through 'Z', followed by the digits '0' through '9', where the
More informationComputer Security 3/23/18
s s encrypt a block of plaintext at a time and produce ciphertext Computer Security 08. Cryptography Part II Paul Krzyzanowski DES & AES are two popular block ciphers DES: 64 bit blocks AES: 128 bit blocks
More informationAdvanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data
Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data Ako Muhamad Abdullah MSc Computer Science UK PhD Student in Computer Science Department of Applied Mathematics & Computer Science
More informationPrinciples of Information Security, Fourth Edition. Chapter 8 Cryptography
Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries
More informationInternational Journal of Computer Engineering and Applications,
International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 SECURING TEXT DATA BY HIDING IN AN IMAGE USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
More informationUnderstanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography
Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 6 Introduction to Public-Key Cryptography ver. November 18, 2010 These
More informationMulti-Level Encryption Framework
Multi-Level Encryption Framework Ahmad Habboush Faculty of Computer and Information Technology Jerash University Jerash, Jordan Abstract Multi-level encryption approaches are becoming more popular as they
More informationAn Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion
Volume 117 No. 20 2017, 325-330 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Adaptive Play fair Cipher Algorithm for Secure Communication Using
More informationScience & Technology (DCRUST), Sonepat
A Hybrid Approach for Data Encryption and Hema Arora 1, Anil Arora 2 1 Department of Computer ScienceGateway Institute of Engineering & Technology (GIET), Deenbandhu Chhotu Ram University of Science &
More informationECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos
ECE596C: Handout #7 Analysis of DES and the AES Standard Electrical and Computer Engineering, University of Arizona, Loukas Lazos Abstract. In this lecture we analyze the security properties of DES and
More informationUses of Cryptography
Uses of Cryptography What can we use cryptography for? Lots of things Secrecy Authentication Prevention of alteration Page 1 Cryptography and Secrecy Pretty obvious Only those knowing the proper keys can
More informationComputer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS
More informationKey Exchange. Secure Software Systems
1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?
More informationCryptography ThreeB. Ed Crowley. Fall 08
Cryptography ThreeB Ed Crowley Fall 08 Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types Cryptanalysis. Science of cracking ciphers and codes, decoding secrets,
More informationParallelizing Cryptography. Gordon Werner Samantha Kenyon
Parallelizing Cryptography Gordon Werner Samantha Kenyon Outline Security requirements Cryptographic Primitives Block Cipher Parallelization of current Standards AES RSA Elliptic Curve Cryptographic Attacks
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationA Modified Playfair Encryption Using Fibonacci Numbers
A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms
More informationHardware Implementation of Cryptosystem by AES Algorithm Using FPGA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationComparison of Performance of AES Standards Based Upon Encryption /Decryption Time and Throughput
Comparison of Performance of AES Standards Based Upon Encryption /Decryption Time and Throughput Miss Navraj Khatri Mr Jagtar Singh Mr Rajeev dhanda NCCE,Israna,K.U Senior lecturer,ncce,israna,k.u Assistant
More informationAnalysis of Cryptography and Pseudorandom Numbers
ISSN: 2454-2377 Volume 2, Issue 2, June 2016 Analysis of Cryptography and Pseudorandom Numbers Richa Agarwal Student, M. Tech., Computer Science, Invertis University, Bareilly, India Abstract: With the
More information18-642: Cryptography 11/15/ Philip Koopman
18-642: Cryptography 11/15/2017 Cryptography Overview Anti-Patterns for Cryptography Using a home-made cryptographic algorithm Using private key when public key is required Not considering key distribution
More informationLecture 1 Applied Cryptography (Part 1)
Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication
More informationInternational Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES
Performance Comparison of Cryptanalysis Techniques over DES Anupam Kumar 1, Aman Kumar 2, Sahil Jain 3, P Kiranmai 4 1,2,3,4 Dept. of Computer Science, MAIT, GGSIP University, Delhi, INDIA Abstract--The
More informationCryptography Introduction
Cryptography Introduction Last Updated: Aug 20, 2013 Terminology Access Control o Authentication Assurance that entities are who they claim to be o Authorization Assurance that entities have permission
More informationOptimized AES Algorithm Using FeedBack Architecture Chintan Raval 1, Maitrey Patel 2, Bhargav Tarpara 3 1, 2,
Optimized AES Algorithm Using FeedBack Architecture Chintan Raval 1, Maitrey Patel 2, Bhargav Tarpara 3 1, 2, Pursuing M.Tech., VLSI, U.V.Patel college of Engineering and Technology, Kherva, Mehsana, India
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationStudy on data encryption technology in network information security. Jianliang Meng, Tao Wu a
nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric
More informationA NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS
IJRET: International Journal of Research in Engineering and Technology eissn: 2319-1163 pissn: 2321-738 A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS Kalavathi Alla 1, Sai Jyothi B 1,2
More informationSecret Key Cryptography
Secret Key Cryptography 1 Block Cipher Scheme Encrypt Plaintext block of length N Decrypt Secret key Cipher block of length N 2 Generic Block Encryption Convert a plaintext block into an encrypted block:
More informationCryptography Functions
Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)
More information4 Hybrid Cryptographic Algorithm
This chapter describes the MD5 hashing mechanism for general m-commerce transactions and Hybrid algorithm that combines the AES and ECC operations for the security mechanism. Part of the work is presented
More informationCSCE 715: Network Systems Security
CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Next Topic in Cryptographic Tools Symmetric key encryption Asymmetric key encryption Hash functions and
More informationImproved ELGAMAL Encryption for Elliptic Curve Cryptography
Volume 118 No. 17 2018, 341-353 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Improved ELGAMAL Encryption for Elliptic Curve Cryptography Dr. C.R.
More informationCryptography Introduction to Computer Security. Chapter 8
Cryptography Introduction to Computer Security Chapter 8 Introduction Cryptology: science of encryption; combines cryptography and cryptanalysis Cryptography: process of making and using codes to secure
More information3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some
3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some popular block ciphers Triple DES Advanced Encryption
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 158
Enhancing The Security Of Koblitz s Method Using Transposition Techniques For Elliptic Curve Cryptography Santoshi Pote Electronics and Communication Engineering, Asso.Professor, SNDT Women s University,
More informationHardware Design and Software Simulation for Four Classical Cryptosystems
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 21 (2013 ) 500 505 The 4 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)
More information18-642: Cryptography
18-642: Cryptography 4/16/2018 Cryptography [without system integrity] is like investing in an armored car to carry money between a customer living in a cardboard box and a person doing business on a park
More informationCHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Advance Encryption Standard (AES) Rijndael algorithm is symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256
More informationVertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem
Vol 1, Issue 2, April 2013 Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Krishnappa H K 1, N K Srinath 2 and S Manjunath 3 Assistant Professor, Dept of
More informationA Survey On SecureImage Encryption Technique Using Blowfish And Chaos
A Survey On SecureImage Encryption Technique Using Blowfish And Chaos Romani Patel 1,Krunal Panchal 2 1 Research Scholar, Information Technology, L.J Institute Of Engineering And Technology, Ahmedabad,
More informationBLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION
132 International Journal of Research in Computer Applications And Robotics, x(x): xx-xx INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 BLOWFISH ALGORITHM ON ITS
More informationCRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:
CRYPTOGRAPHY AND NETWORK SECURITY K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 1 Email:lakshmikpriya3698@gmail.com, 2 Email:rubhapandian@gmail.com, 3 Email:niranjanamurugan@gmail.com, Nadar Saraswathi College
More informationFPGA BASED CRYPTOGRAPHY FOR INTERNET SECURITY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,
More informationName of chapter & details.
Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to:
More informationIntroduction to Symmetric Cryptography
Introduction to Symmetric Cryptography Tingting Chen Cal Poly Pomona 1 Some slides are from Dr. Cliff Zou. www.cs.ucf.edu/~czou/cis3360-12/ch08-cryptoconcepts.ppt Basic Cryptography Private Key Cryptography
More informationWebpage: Volume 5, Issue VII, July 2017 ISSN
Image Security using Non-Linear Data Structure Dr. S. Kiran 1, R. Pradeep Kumar Reddy 2, V. Siva Kumar 3, P. Veereshkumar Goud 4 1,2 Assistant Professor, 3,4 Student 1,2,3,,4 Dept. of CSE, YSR Engineering
More informationCombine and Multilevel Implementation of Cryptographic and Data Hiding Algorithms to Provide a Hybrid Data-Security Scheme
American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS) ISSN (Print) 2313-4410, ISSN (Online) 2313-4402 Global Society of Scientific Research and Researchers http://asrjetsjournal.org/
More informationProtecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets
Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and
More informationTechnological foundation
Technological foundation Carte à puce et Java Card 2010-2011 Jean-Louis Lanet Jean-louis.lanet@unilim.fr Cryptology Authentication Secure upload Agenda Cryptology Cryptography / Cryptanalysis, Smart Cards
More informationEncryption Details COMP620
Encryption Details COMP620 Encryption is a powerful defensive weapon for free people. It offers a technical guarantee of privacy, regardless of who is running the government It s hard to think of a more
More informationENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM Thangarasu.N Research Scholar in Department of Computer Science Bharathiar University,Coimbatore Dr.Arul Lawrence SelvaKumar Dean & Professor, Department of
More informationBlackBerry Enterprise Solution Security
Release 4.1 Technical Overview 2006 Research In Motion Limited. All rights reserved. Contents Wireless security... 4 BlackBerry Enterprise Solution security... 4 New security features...6 BlackBerry encryption
More informationChapter 7 Advanced Encryption Standard (AES) 7.1
Chapter 7 Advanced Encryption Standard (AES) 7.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Objectives To review a short history of AES To define
More informationEnhanced 3-D PLAYFAIR Cipher
Enhanced 3-D PLAYFAIR Cipher Anju Bala Research Scholar, DCSA, M.D.U. Rohtak, Haryana (India) anjudeswal.mdu@gmail.com Publishing Date: June 10, 2017 Abstract Cryptography is where security engineering
More information1-7 Attacks on Cryptosystems
1-7 Attacks on Cryptosystems In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from
More informationCryptographic Algorithms - AES
Areas for Discussion Cryptographic Algorithms - AES CNPA - Network Security Joseph Spring Department of Computer Science Advanced Encryption Standard 1 Motivation Contenders Finalists AES Design Feistel
More informationIssues in Information Systems Volume 18, Issue 2, pp , 2017
IMPLEMENTING ELLIPTIC CURVE CRYPTOGRAPHY USING MICROSOFT EXCEL Abhijit Sen, Kwantlen Polytechnic University, abhijit.sen@kpu.ca ABSTRACT Microsoft Excel offers a number of data manipulation tools that
More information