Comparative Study of Cryptographic Algorithms

Author(s):  
Mohanad ABDULHAMID ◽  
Nyagathu GICHUKI

This paper presents a comparative study of two cryptosystems, Data Encryption Standard (DES) and the Rivest-Shamir-Adleman (RSA) schemes. DES is a symmetric (or private) key cipher. This means that the same key is used for encryption and decryption. RSA, on the other hand, is an asymmetric (or public) key cipher, meaning that two keys are used, one for encryption and the other for decryption. The objective of this paper is to implement these two schemes in software. The program is written in the Java™ language. It generates a key from a passphrase given by the user, encrypts and decrypts a message using the same key, for the case of DES. In RSA, decryption is done by computing the decryption key from the encryption key. Finally, the program returns the time taken to encrypt and decrypt a message.

Author(s):  
Sabitha S ◽  
Binitha V Nair

Cryptography is an essential and effective method for securing information’s and data. Several symmetric and asymmetric key cryptographic algorithms are used for securing the data. Symmetric key cryptography uses the same key for both encryption and decryption. Asymmetric Key Cryptography also known as public key cryptography uses two different keys – a public key and a private key. The public key is used for encryption and the private key is used for decryption. In this paper, certain asymmetric key algorithms such as RSA, Rabin, Diffie-Hellman, ElGamal and Elliptical curve cryptosystem, their security aspects and the processes involved in design and implementation of these algorithms are examined.


2012 ◽  
Vol 241-244 ◽  
pp. 2471-2474
Author(s):  
Li Juan Zhu

Security transaction problem between the client and the server was solved by a network identity authentication protocol of this paper. We designed this protocol from two aspects, one is the hardware structure design, and the other is data encryption. We used fingerprint sensor to gather the user’s fingerprint and characteristic value instead of password input from keyboard, and used RSA probabilistic encryption to generate public key and private key of the client and public key and private key of the server, and then used the protocol certification process to finish operation of the data encryption and decryption. This protocol guarantees every specific legitimate user rights and prevents the hacker from attacking network data, and the practical application shows this protocol is absolutely safe.


2018 ◽  
Vol 7 (2.31) ◽  
pp. 219
Author(s):  
S Neelima ◽  
R Brinda

Encryption is the process of converting the data from readable format into unreadable format with help of any mathematical expression or sometimes with the help of key. On the other hand decryption is the reverse process of encryption with help of same key used at encryption or with the help of some other key. The paper presents the different methodology used for encryption and decryption. Several methods presented in the literature are reviewed. The methods- Rivest-Shamir-Adlemen algorithm, Data Encryption Standard, Advanced Encryption Standard and three different Secure Hash Algorithm are reviewed and implemented using various FPGA devices. The power consumption, delay and area are analyzed and compared. From the analyses it is been found that the performance of AES and SHA3 are better when compared to other algorithms. These algorithms provide high security when compared to rest of the methods.  


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1389
Author(s):  
Jiwon Lee ◽  
Jihye Kim ◽  
Hyunok Oh

In public key broadcast encryption, anyone can securely transmit a message to a group of receivers such that privileged users can decrypt it. The three important parameters of the broadcast encryption scheme are the length of the ciphertext, the size of private/public key, and the performance of encryption/decryption. It is suggested to decrease them as much as possible; however, it turns out that decreasing one increases the other in most schemes. This paper proposes a new broadcast encryption scheme for tiny Internet of Things (IoT) equipment (BESTIE), minimizing the private key size in each user. In the proposed scheme, the private key size is O(logn), the public key size is O(logn), the encryption time per subset is O(logn), the decryption time is O(logn), and the ciphertext text size is O(r), where n denotes the maximum number of users, and r indicates the number of revoked users. The proposed scheme is the first subset difference-based broadcast encryption scheme to reduce the private key size O(logn) without sacrificing the other parameters. We prove that our proposed scheme is secure under q-Simplified Multi-Exponent Bilinear Diffie-Hellman (q-SMEBDH) in the standard model.


2020 ◽  
Vol 8 (4) ◽  
pp. 475
Author(s):  
Maria Okta Safira ◽  
I Komang Ari Mogi

In this paper two methods are used, namely the vigenere cipher method and the RSA method. The vigenere cipher method is an example of a symmetric algorithm, while RSA is an example of an asymmetric algorithm. The combination of these two methods is called hybrid cryptography which has the advantage in terms of speed during the encryption process. Each process, which is encryption and decryption, is carried out twice, so that security can be ensured. In the process of forming the key used the RSA method. In the encryption process using public keys that have been generated before when the key is formed. This public key is used in sending data to the recipient of a secret message where this key is used for the data encryption process. The Secret key is kept and will be used during the decryption process. There is a system architecture that describes how clients and servers communicate with each other over the internet using the TCP protocol where the client here is an IoT device and the server is a server. 


2008 ◽  
Vol 54 (No. 8) ◽  
pp. 358-366 ◽  
Author(s):  
I. Ubrežiová ◽  
K. Wach ◽  
J. Horváthová

The main attention of the submitted paper is devoted to the comparison of development of entrepreneurship in Slovak and Polish small and medium-sized he enterprise sector. The conditions for blooming entrepreneurship are created in the national economy. Especially the role of SMEs in the transition economy, both in Slovakia and Poland, has the impact on SMEs. The entrepreneurship of small and medium-sized enterprises is extended in the whole Slovakia. From the viewpoint of the regional structure, most enterprises are located in the Bratislavský region (30.4%), Košický region (11.8%), Žilinský region (10.1%) and Trenčianský region (10.1%). On the other hand, the least of enterprises were registered in the Nitrianský region (8.9%), Trnavský region (9.2%) and Banskobystrický region (9.6%). Small and medium entrepreneurship is diversed throughout Poland. The average small and medium entreprenership ratio is 44.5, while the highest is in the Mazowieckie region – 55.2% and the lowest in the Podkarpackie region – 30 %. The supporting system for private entrepreneurship in both countries, Slovakia and Poland, is very similar and the entrepreneurs are satisfied with its offer and help.


2019 ◽  
Vol 2019 ◽  
pp. 1-11
Author(s):  
Hojoong Park ◽  
Yongjin Yeom ◽  
Ju-Sung Kang

We propose a new lightweight BCH code corrector of the random number generator such that the bitwise dependence of the output value is controllable. The proposed corrector is applicable to a lightweight environment and the degree of dependence among the output bits of the corrector is adjustable depending on the bias of the input bits. Hitherto, most correctors using a linear code are studied on the direction of reducing the bias among the output bits, where the biased input bits are independent. On the other hand, the output bits of a linear code corrector are inherently not independent even though the input bits are independent. However, there are no results dealing with the independence of the output bits. The well-known von Neumann corrector has an inefficient compression rate and the length of output bits is nondeterministic. Since the heavy cryptographic algorithms are used in the NIST’s conditioning component to reduce the bias of input bits, it is not appropriate in a lightweight environment. Thus we have concentrated on the linear code corrector and obtained the lightweight BCH code corrector with measurable dependence among the output bits as well as the bias. Moreover, we provide some simulations to examine our results.


1999 ◽  
Vol 27 (03n04) ◽  
pp. 365-370
Author(s):  
Atsushi Kato ◽  
Toshihiro Miura ◽  
Yumi Nishiyama ◽  
Yoko Tachibana ◽  
Yasuhiro Ohnishi ◽  
...  

Intraperitoneal administration of the methanol extract of Embelia schiperi (ES) to normal mice caused a significant decrease in blood glucose (p < 0.01) and a significant increase in triglycerides 4 hours after administration at 100 mg/kg (p < 0.01). The toluene fraction of Embelia keniensis methanol extract (TS) showed hypoglycemic and lipid lowering activity 7 hours after intraperitoneal administration at 100 mg/kg. In addition, TS (100 mg/kg) administration significantly decreased blood glucose in epinephrine-induced hyperglycemic mice (p < 0.01). Moreover, ES tended to increase while TS tended to decrease the blood triglycerides in epinephrine-induced hyperglycemic mice. On the other hand, no changes in blood cholesterol were observed after the administration of ES or TS in normal and epinephrine-induced hyperglycemic mice. We found that two species from Embelia, ES and TS, have different activities on blood glucose and triglycerides in normal and epinephrine-induced hyperglycemic mice.


2015 ◽  
Vol 21 ◽  
pp. 43-49
Author(s):  
Luthfunnesa Bari ◽  
M Ariful Islam ◽  
Zannatul Ferdous ◽  
M Atiqul Azman ◽  
Shahanaz Khatun ◽  
...  

Context: Recent reports of media have brought great attention to the problem of formalin used by whole sellers and venders in preserving fish. It is evident from several studies that fish items in different markets in Bangladesh are treated with formalin for preservation which is highly hazardous and carcinogenic chemical. Objectives: The study was undertaken to determine the presence of formalin in fishes collected from various wet markets of Tangail and Tongi town. Materials and Methods: From 12 selected wet markets, various species of fishes were collected and presence of formalin was detected using the “formalin detection kit in fish” developed by Bangladesh Council of Scientific and Industrial Research (BCSIR). Results: It was found that 16 fishes were formalin contaminated out of 192 fish samples in which 0% in Santosh bazar, 11.11% in Soi ani bazar, 13.33% in Park bazar, 14.81% in Old bus stand bazar, 0% in Chara bari bazar and 12.82% in New bus stand bazar of Tangail town. On the other hand, 33 formalin contaminated fish out of 171 were obtained in which 0% in Coto bazar, 20% in Gazipura bus stand bazar, 37.5% in Chourasta bazar, 0% in Boro bari bazar, 36.36% in CheragAli bazar and 20% in Tongi bazar of Tongi town. The study indicates that almost 8.33% of fish samples in Tangail town and 19.29% of fish samples in Tongi town were formalin contaminated. Conclusion: The present study revealed that in Tangail town 75% imported fish and 25% local fishes were formalin contaminated whereas in Tongi town, 82% imported fishes and 18% local fishes were formalin contaminated. DOI: http://dx.doi.org/10.3329/jbs.v21i0.22518 J. bio-sci. 21: 43-49, 2013


2020 ◽  
Vol 4 (2) ◽  
pp. 9
Author(s):  
Angga Aditya Permana ◽  
Desi Nurnaningsih

Cryptography is the science of maintaining data confidentiality, where the original text (plaintext) is encrypted using an encryption key to be ciphertext (text that has been encrypted). In this case cryptography secures data from a third party so that the third party cannot know the original contents of the data because the one who holds the key for encryption and decryption is only the sender and receiver. There are several cryptographic methods that are commonly used, one of which is DES or Data Encryption Standard. DES is included in the key-symmetric cryptography and is classified as a block cipher type


Sign in / Sign up

Export Citation Format

Share Document