scholarly journals Performance Analysis of Cascaded Hybrid Symmetric Encryption Models

Author(s):  
Pravin Soni, Et. al.

Over a few years, there is rapid increase of exchange of data over the net has brought data confidentiality and its privacy to the fore front. Data confidentiality can be achieved by implementing cryptography algorithms during transmission of data which confirms that data remains secure and protected over an insecure network channel. In order to ensure data confidentiality and privacy, cryptography service encryption is used which makes data in unreadable form while the reverse process rearranges data in readable form and known as decryption. All encryption algorithms are intended to provide confidentiality to data, but their performance varies depending on many variables such as key size, type, number of rounds, complexity and data size used. In addition, although some encryption algorithms outperform others, they have been found to be prone to particular attacks. This paper reviews and summarizes the various common hybrid cascaded n-tier encryption models. Additionally, this paper compares and analyzes the performance of common hybrid cascaded 2-tier and 3-tier encryption models obtained during simulation based on encryption/decryption time, avalanche effect and throughput. The models compared with AES are 2-tier models (AES-TWOFISH, AES-BLOWFISH, TWOFISH-AES, BLOWFISH-AES, AES-SERPENT and SERPENT-TWOFISH) and 3-tier models (DES-BLOWFISH-AES, AES-TWOFISH-SERPENT and SERPENT-TWOFISH-AES). The hybrid cascaded model like AES-TWOFISH, AES-BLOWFISH and SERPENT-TWOFISH-AES are better hybrid models with respect to throughput and avalanche effect. 

2018 ◽  
Vol 208 ◽  
pp. 02005
Author(s):  
Hanguang Luo ◽  
Guangjun Wen ◽  
Jian Su

The SMS4 cryptosystem has been used in the Wireless LAN Authentication and Privacy Infrastructure (WAPI) standard for providing data confidentiality in China. So far, reliability has not been considered a primary objective in original version. However, a single fault in the encryption/decryption process can completely change the result of the cryptosystem no matter the natural or malicious injected faults. In this paper, we proposed low-cost structure-independent fault detection scheme for SMS4 cryptosystem which is capable of performing online error detection and can detect a single bit fault or odd multiple bit faults in coverage of 100 percent. Finally, the proposed techniques have been validated on Virtex-7 families FPGA platform to analyze its power consumption, overhead and time delay. It only needs 85 occupied Slices and 8.72mW to run a fault-tolerant scheme of SMS4 cryptosystem with 0.735ns of detection delay. Our new scheme increases in minimum redundancy to enhance cryptosystem’s reliability and achieve a better performance compared with the previous scheme.


Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 293 ◽  
Author(s):  
Sreeja Rajesh ◽  
Varghese Paul ◽  
Varun Menon ◽  
Mohammad Khosravi

Recent advancements in wireless technology have created an exponential rise in the number of connected devices leading to the internet of things (IoT) revolution. Large amounts of data are captured, processed and transmitted through the network by these embedded devices. Security of the transmitted data is a major area of concern in IoT networks. Numerous encryption algorithms have been proposed in these years to ensure security of transmitted data through the IoT network. Tiny encryption algorithm (TEA) is the most attractive among all, with its lower memory utilization and ease of implementation on both hardware and software scales. But one of the major issues of TEA and its numerous developed versions is the usage of the same key through all rounds of encryption, which yields a reduced security evident from the avalanche effect of the algorithm. Also, the encryption and decryption time for text is high, leading to lower efficiency in IoT networks with embedded devices. This paper proposes a novel tiny symmetric encryption algorithm (NTSA) which provides enhanced security for the transfer of text files through the IoT network by introducing additional key confusions dynamically for each round of encryption. Experiments are carried out to analyze the avalanche effect, encryption and decryption time of NTSA in an IoT network including embedded devices. The results show that the proposed NTSA algorithm is much more secure and efficient compared to state-of-the-art existing encryption algorithms.


2021 ◽  
Vol 9 (1) ◽  
pp. 01-11
Author(s):  
A. Mohanarathinam Et al.

Digital images are very popularly used for communications over the internet. Embedded information in the digital image has to be securely transmitted without any modification in the image. The biomedical telemedicine gains significant importance in information transmission and with increasing popularity with Tele-ophthalmology, requirement of medical data confidentiality and privacy also increases for data storage and secure transformation. The objective is to analyse  the bioimage encryption algorithms which provides security and privacy to the bioimages. In this paper retinal fundus image online available dataset have used. The proposed work is analysed by considering, three performance parameters such as PSNR, MSE and CR. The two different encryption algorithms namely block-based perceptual encryption (BBPE) and advanced encryption standard (AES) algorithm along with arithmetic compression have tested . The proposed work results tested on standard test images and retinal fundus images shows that the BBPE method attains PSNR of 27.58db , MSE of 3.20e+03 and CR of 4.27 for standard test images and 13.35db, 1.4046e+04 and 7.28 respectively for medical HRF images. The BBPE algorithm can be used in tele-ophthalmology and telemedicine applications.


2021 ◽  
Author(s):  
Akula Vamsi Krishna Rao ◽  
V.N. Aditya Datta Chivukula ◽  
Sri Keshava Reddy Adupala ◽  
Abhiram Reddy Cholleti

In recent years, security has become a big issue for many applications to defend attacks from intruders. Exchanging credentials in plaintext might expose it to stealers. Many techniques are required to protect the data of the consumers from attackers. Cryptography has come up with a solution to provide security for the users to exchange data securely by the means of the process called as Encryption/ Decryption. In this field, there are basically two techniques of cryptography i.e Symmetric and asymmetric, developed to achieve a secure connection between the sender and receiver. These techniques provide specific goals in maintaining privacy by converting original message to non-readable form and sends it over a communication channel. The unauthorized members try to break the non-readable form but the difficulty depends upon the techniques that were used to encrypt the data. In this paper, we proposed a quadruple encryption algorithm consists of novel phase-shift algorithm, AES (Advanced Encryption Standard), TwoFish and RC4 and making it hard to attack by common methods.


Author(s):  
GAMIL R.S. QAID ◽  
SANJAY N. TALBAR

Data communication is transmission data from a point to another. Nowadays main issue in data communication is the security. It can provide a fine solution by encryption. The encryption algorithm is the mathematical process for performing encryption on data. The proposed algorithm supports for user desired security level and processing level. The algorithm provides security levels and their corresponding processing levels by generating random keys for the encryption/decryption process. This facility is achieved by using fuzzy logic. The results of the proposed encryption algorithm will be analyzed by comparing with other existing encryption algorithms. The aim of the research is to build a new algorithm using fuzzy sets requirement which will be more advanced than the existing encryption algorithms.


The resources and the services that the cloud provides are attractive for the users and are distinct from one cloud provider to another. The concerning aspect is how much securely our data stored in cloud is and how the data is protected against attacks. Various encryption algorithms or techniques of cryptography are used to protect data against attacks and also provides authenticity and confidentiality of data I an online and offline environment. Therefore in this paper various cryptographic aspects are covered, predominantly compares different algorithms with suggested solutions and results including cloud data protection. Authentication of data, confidentiality of data and data integrity aspects are the primary factors that have to be addressed in today’s social networking and in the distributed environments. Cryptography and crypto cloud computing plays major role in secure transfer and storage of information.


2021 ◽  
Vol 6 (2) ◽  
pp. 54-61
Author(s):  
Lekso Budi Handoko ◽  
Andi Danang Krismawan

The increase in significant advances in information technology greatly provides comfort and convenience in managing data. This convenience is what makes people who are not responsible for using it as a crime such as hacking, cracking, phishing, and so on. In Telkom Region 4 Semarang, there is a container where there are important company data such as customer data. Customer data is very important and the contents of the data must be kept confidential. The company has experienced significant losses due to information leakage due to negligence in the last 5 years. For this reason, data security is necessary so that data is safe and is not misused. This study applies the Advance Encryption Standard algorithm - Cipher Block Chaining (AES-CBC) and Stream cipher in order to secure data so as to reduce the risk of data theft by telecom subscribers. Based on the average avalanche effect value of AES-CBC and a stream cipher of 49.34%, this shows that the AES-CBC and Stream Cipher encrypted files are difficult to crack so that data confidentiality is well maintained.


Sign in / Sign up

Export Citation Format

Share Document