4 A Study of Encryption Algorithms
4 A Study of Encryption Algorithms
4 A Study of Encryption Algorithms
Abstract- In recent years network security has become an important issue. Encryption has come up
as a solution, and plays an important role in information security system. Many techniques are
needed to protect the shared data. The present work focus on cryptography to secure the data while
transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the
network must be encrypted using the encryption algorithm in cryptography. Secondly, by using
decryption technique the receiver can view the original data. In this paper we implemented three
encrypt techniques like AES, DES and RSA algorithms and compared their performance of encrypt
techniques based on the analysis of its stimulated time at the time of encryption and decryption.
Experiments results are given to analyses the effectiveness of each algorithm.
Keywords: DES, RSA, AES, encryption, decryption, private key encryption, public key encryption,
cryptography.
GJCST-E Classification : E.3
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Strictly as per the compliance and regulations of:
2013. Dr. Prerna Mahajan & Abhishek Sachdeva. This is a research/review paper, distributed under the terms of the Creative
Commons Attribution-Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all noncommercial use, distribution, and reproduction inany medium, provided the original work is properly cited.
I.
Introduction
Encryption Algorithms
15
Year 2 013
Year 2 013
16
Sub Bytes
Shift Rows
Mix Columns
Add Round Key , using K(round)
Year 2 013
1.
2.
3.
4.
17
Year 2 013
c) Rivest-Shamir-Adleman (RSA)
18
1}
2. Compute c = me mod n
iii Decryption
Decryption is the process of converting the
cipher text (data) to the original plain text(data). [10]
Decryption with key d: compute m = cd mod n
Start
C = ME mod N
Year 2 013
C=1
I=31
19
No
I>0
Yes
No
C==1
Yes
C = C2 mod N
No
EI = = 1
Yes
C= (M . C) mod
I = I -1
End
Figure 3 : RSA Encryption and Decryption Flowchart
2013 Global Journals Inc. (US)
Comparision
III.
Year 2 013
AES
DES
RSA
Developed
Key Size
Block Size
Ciphering & deciphering
key
Scalability
2000
128, 192, 256 bits
128 bits
Same
1977
56 bits
64 bits
Same
1978
>1024 bits
Minimum 512 bits
Different
Not Scalable
Not Scalable
Algorithm
Symmetric Algorithm
It is scalable algorithm
due to varying the key
size and Block size.
Symmetric Algorithm
Encryption
Decryption
Power Consumption
Security
Deposit of keys
Inherent
Vulnerabilities
Faster
Faster
Low
Excellent Secured
Needed
Brute Forced Attack
Key Used
20
Rounds
Stimulation Speed
Trojan Horse
Hardware & Software
Implementation
Ciphering & Deciphering
Algorithm
Different
Experimental Design
IV.
a) Evaluation Parameters
Moderate
Moderate
Low
Not Secure Enough
Needed
Brute Forced,
Linear and
differential
cryptanalysis
attack
Same key used for Encrypt
and Decrypt
16
Faster
No
Better in hardware than in
software
Different
Asymmetric Algorithm
Slower
Slower
High
Least Secure
Needed
Brute Forced
and Oracle
attack
Different key used for
Encrypt and Decrypt
1
Faster
No
Not Efficient
Same
Table 2 : Comparisons of DES, AES and RSA of Encryption and Decryption Time
S.NO
Algorithm
AES
1
DES
RSA
1.6
153
3.0
1.1
7.3
4.9
1.7
1.4
2.0
1.24
RSA
8.5
5.9
AES
1.8
1.6
DES
DES
196
3.0
1.3
RSA
7.8
5.1
AES
2.0
1.8
4.0
1.2
8.2
5.1
DES
312
868
RSA
By analyzing table-2, Time taken by RSA algorithm for both encryption and decryption process is much
higher compare to the time taken by AES and DES algorithm.
9
8
7
6
5
AES
DES
RSA
2
1
0
SIZE - 153
SIZE - 196
SIZE - 312
SIZE - 868
DES
RSA
2
1
0
SIZE-153
SIZE-196
SIZE-312
SIZE-868
21
AES
Year 2 013
Year 2 013
VI.
22
Conclusion
2278-800X,
e-ISSN:
2278-067X,
p-ISSN:
www.ijerd.com Volume 8, Issue 2 (August 2013),
pp. 45
2. Abdul.Mina, D.S, Kader, H.M. Abdual & Hadhoud,
M.M. Performance Analysis of
Symmetric
Cryptography. pp. 1.
3. Chehal Ritika, Singh Kuldeep. Efficiency and
Security of Data with Symmetric Encryption
Algorithms. International Journal of Advanced