scholarly journals A Comparative Analysis of Different Encryption Algorithms: RSA, AES, DSS for Data Security

Author(s):  
Er. Shikha Atwal ◽  
Dr. Umesh Kumar

With the emerging technology connected with the internet, there is one constant issue related to that is data security. The only solution with which this issue can be resolved at a limit and can be used to protect the data is various algorithms for encryption. Though different approaches were used for the same, Cryptography seems to be efficiently protecting the data while transmitting in network from sender to receiver. Firstly the data is encrypted before sending to receiver using the most secure and reliable encryption algorithm. Secondly, at the receiver end it can be decrypted using the same decryption algorithm. Only receiver will have the key with which the data can be decrypted. In this paper, AES, DSS and RSA algorithms were implemented. These algorithms are encryption algorithms which perform encoding and decoding of data, to be sent from sender to receiver, using the keys. Each have different criteria for encryption and are then compared based on different parameters viz. delay, throughput, PDR is an acronym for packet delivery ratio, PLR represents packet loss ratio and RPC denotes Received Packet Count. The results in the form of graphs are given to analyze the security provided by each algorithm.

Author(s):  
S. Maharaja ◽  
R. Jeyalakshmi ◽  
A.V. Sabarish Kanna ◽  
M. Deva Priya

A Mobile Adhoc Network (MANET) is prone to attacks. Adversaries take hold of the network, thus degrading their performance. Various attacks are prevalent in MANET, out of which Byzantine attack plays a vital role. A node or group of nodes present in the routing path between the source and the destination may be compromised due to Byzantine attack. In this paper, Cohen Kappa Reliability Coefficient based Mitigation (CKRCM) mechanism is proposed to deal with these attacks. The intermediate nodes are monitored by their neighbors for a timestamp. If the monitoring node does not receive an acknowledgment, then the nodes are perceived to be attacked. The trustworthiness of the nodes is built by computing the trusts and reliabilities of the nodes. It is seen that the proposed scheme outperforms the existing scheme in terms of Throughput, Packet Delivery Ratio (PDR) and Packet Loss Ratio (PLR).


Teknika ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 86-91
Author(s):  
Dwi Ariyanti ◽  
Unan Yusmaniar Oktiawati

Kualitas koneksi khususnya pada backbone menjadi tantangan Internet Service Provider (ISP). MPLS berkerja di layer 2,5 OSI yang mampu mempercepat pengiriman paket pada jaringan backbone. MPLS melekatkan label pada paket yang dikirimkan. Salah satu layanan dari MPLS adalah traffic engineering yang dibuat dengan protokol RSVP. Terdapat protokol baru untuk memberi label pada paket dan mendukung traffic engineering, yaitu Segment Routing. Penelitian ini menganalisis perbandingan performa traffic engineering dengan RSVP dan Segment Routing. Baik pada penerapan RSVP maupun Segment Routing dibuat tunnel untuk jalur utama dan reroute menuju jalur cadangan. Penelitian dilakukan pada emulator EVE-NG dengan mengambil studi kasus topologi backbone di PT ICON+.Hasil penelitian adalah Segment Routing di MPLS menyederhanakan kinerja dari router dalam hal pelabelan dan dalam memelihara Label Switch Path (LSP), tidak membutuhkan protokol signaling. Hasil pengujian latency pada jalur utama, dengan Segment Routing maupun dengan RSVP mempunyai nilai sama. Sedangkan pada jalur cadangan, nilai latency dari Segment Routing lebih kecil, sehingga Segment Routing dapat mengirim data dengan lebih cepat daripada dengan RSVP. Hasil pengujian packet delivery ratio dan packet loss ratio dengan Segment Routing dan dengan RSVP baik di jalur utama maupun jalur cadangan bernilai sama, yaitu 100% dan 0%. Baik pada jalur utama maupun jalur cadangan, penerapan Segment Routing mempunyai nilai throughput yang lebih besar daripada penerapan RSVP, sehingga Segment Routing dapat mengirim data dengan lebih cepat daripada RSVP. Pada kondisi link mengalami kegagalan saat pengujian, keduanya memiliki 1% packet loss, namun perpindahan jalur dilakukan dengan lebih cepat pada Segment Routing.


The volume of healthcare information is rapidly growing. Collecting and securing information gathered through a Wireless Sensor Network (WSN) is an open challenge. The integrity and confidentiality of the information is to be ensured, failing to do which will lead to fatal consequences. Further, conserving energy is a challenge in WSN. Hence, in this paper a Secured Energy Aware (SEA) scheme is proposed. Only authenticated nodes communicate to the Fusion Centres (FCs) which collect the data and forward to the Sink or other FCs, thus avoiding redundancy. The propounded scheme offers better results in contrast to the existing scheme in terms of Packet Delivery Ratio (PDR), Throughput, Residual Energy, Packet Loss Ratio (PLR) and Routing Overhead.


2020 ◽  
Vol 8 (6) ◽  
pp. 5759-5764

Given the current use of the Internet, The most important thing is to provide security to the user's information. Many encryption algorithms already exist for this purpose. Here we discussed a new process called Mahaviracharya Encryption Standard. MES is a symmetric encryption algorithm. Here, this algorithm is cryptanalyzed, and compared with blowfish algorithm. MES algorithm can be used instead off algorithms like AES, Blowfish etc.


2017 ◽  
Vol 4 ◽  
pp. 82-86
Author(s):  
Dawid Górniak ◽  
Piotr Kopniak

The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1.


Sensors ◽  
2020 ◽  
Vol 20 (13) ◽  
pp. 3627 ◽  
Author(s):  
Junhyeok Yun ◽  
Mihui Kim

Along with the recent growth of Internet of Things (IoT) security camera market, there have been a number of personal information leakage incidents from security attacks targeting such cameras. Therefore, a permutation-based video encryption algorithm was proposed to secure video streams in low-performance processors such as IoT security cameras. However, existing permutation-based video encryption algorithms are vulnerable to known-plaintext attacks since they use the same permutation list for every frame. Moreover, situation deduction based on the color composition is possible. In this paper, we propose a new permutation-based video encryption algorithm that updates the permutation list for every frame using a crypto secure pseudo-random number generator without significantly increasing memory usage. By doing so, the algorithm becomes robust to known-plaintext attacks, which has been a common problem with existing permutation-based video encryption algorithms. In addition, color channel separation can prevent attackers from deducing situations through color composition. Pre-compression encryption is applied to make the algorithm robust to data loss because of packet loss. We implement the proposed algorithm and conduct an experiment to show its performance in terms of probability of data loss because of packet loss, encryption speed, and memory usage.


Author(s):  
Mourad Talbi ◽  
Med Salim Bouhalel

The IoT Internet of Things being a promising technology of the future. It is expected to connect billions of devices. The increased communication number is expected to generate data mountain and the data security can be a threat. The devices in the architecture are fundamentally smaller in size and low powered. In general, classical encryption algorithms are computationally expensive and this due to their complexity and needs numerous rounds for encrypting, basically wasting the constrained energy of the gadgets. Less complex algorithm, though, may compromise the desired integrity. In this paper we apply a lightweight encryption algorithm named as Secure IoT (SIT) to a quantized speech image for Secure IoT. It is a 64-bit block cipher and requires 64-bit key to encrypt the data. This quantized speech image is constructed by first quantizing a speech signal and then splitting the quantized signal into frames. Then each of these frames is transposed for obtaining the different columns of this quantized speech image. Simulations result shows the algorithm provides substantial security in just five encryption rounds.


2019 ◽  
Vol 8 (2) ◽  
pp. 40-43
Author(s):  
Sheik Saidhbi

Internet working security has become one of the biggest uprising points of concern now days. People are getting attached more and more to the internet in order to fulfill their demands. Not only customers but also the IT based companies are also getting themselves relying on up growing technology called as cloud computing. Cloud is a branch of computer science that provides the services on lease. In this paper we will make a comparative analysis of various technical security issues towards cloud computing, cloud deployment based security and model based security issues. A comparative analysis has been made at the end of the paper.


2021 ◽  
Author(s):  
Colin Xialin Huang

There are increasing demands for real-time streaming video applications over the Internet. However, the current generation Internet was not originally designed for real-time streaming applications and only provides best-effort services, so there are many challenges in the deployment of video streaming applications over the Internet. This thesis investigates a hybrid end-to-end rate adaptation framework that provides application-level enhancements to achieve Quality of Service (QoS) for MPEG-4 FGS-Encoded video bandwidth on the path and the terminal process capabilities based on the packet-loss ratio and then determine their subscribing rate of video streams. The sender adjusts the transmission rate based on the packet-loss ratio and then determine their subscribing rate of video streams. The sender adjusts the transmission rate based on the proportion of load status feedbacks from the receivers. The sender and the receivers act together to minimize the possibility of network congestion by adjusting the transmission rate to match the network conditions. This framework achieves inter-receiver fairness in a heterogeneous multicast environment and improves QoS stability for MPEG-4 FGS video streaming over the Internet.


Author(s):  
Sachin Lalar ◽  
. Monika ◽  
Arun Kumar Yadav

Wireless sensor networks (WSNs) establish a new popular of ambient supervision with many latent packages. The environment of wireless sensor networks prone to different forms of attacks as networks are prepared in open and unsecured surroundings. This paper analyses the overall performance of AODV whilst attacked by black hole, through varying the mobility of the nodes within the community. The overall performance metrics which can be used to do the analysis are LPR, packet delivery ratio & Packet loss. The simulation consequences display that the overall performance of each AODV degrades in the presence of black hole attack.


Sign in / Sign up

Export Citation Format

Share Document