A Survey On Various Cryptography Techniques
A Survey On Various Cryptography Techniques
Survey
aarthy arun
A Survey on Net work Securit y and Securit yAut hent icat ion using Biomet rics
IJSRD Journal
Crit ical Analysis of Various Symmet ric Key Crypt ographic Algorit hms
Int ernat ional Journal IJRIT CC
I nternational Journal of E merging Trends & Technology in Computer Science (I JE TTCS)
Web Site: www.ijettcs.org Email: [email protected]
Volume 3, Issue 4, July-August 2014 ISSN 2278-6856
Abstract
In modern era, evaluation of networking and wireless recipient and also by anyone who gets an access to
we speak- that is the human language, takes the form keys are used, that is one key for encryption and
of plain text. It is understood by the sender, the another key for decryption, then that mechanism is
the columns of the state, combining the four bytes in Operation of Blowfish:
Blowfish encrypts 64-bit block cipher with variable length
Add round key: each byte of the state is combined
each column.
Subkey Generation: This process converts the key
key. It contains two parts
with the round key using bitwise XOR.
Data Encryption: This process involves the iteration
AES encryption is fast and flexible. It can be upto 448 bits long to subkeys to totaling 4168 bits.
implemented on various platforms especially in small
devices. of a simple function 16 times. Each round contains a
AES Encryption: key dependent permutation and key- and data
The encryption process in AES involves following steps: dependent substitution.
(i) Do the one-time initialization process: Blowfish suits the applications where the key remain
(a) Expand the 16-byte key to get the actual Key constant for a long time (e.g. communication link
Block to be used. encryption) but not where the key changes frequently (e.g.
(b) Do one time initialization of the 16-byte plain text packet switching).
block (called State). 3.5 RSA
(c) XOR the state with the key block RSA is a public key algorithm invented by Rivest, Shamir
(ii) For each round do the following: and Adleman [7]. The key used for encryption is different
(a) Apply S-Box to each of the plain text bytes. from (but related to) the key used for decryption. RSA
(b) Rotate row k of the plain text block (i.e. state) by involves a public key and a private key. The public key
k bytes. can be known to everyone and is used for encrypting
(c) Perform mix columns operation. messages. Messages encrypted with the public key can
(d) XOR the state with the key block. only be decrypted using the private key. The keys for the
3.4 Blowfish RSA algorithm are generated the following way:
Blowfish [5] is one of the most common public domain 1. Choose two distinct large prime numbers p and q.
encryption algorithms provided by Bruce Schneier - one 2. For security purposes, the integer’s p and q should be
of the world's leading cryptologists, and the president of chosen at random, and should be of similar bit-
Counterpane Systems, a consulting firm specializing in length. Prime integers can be efficiently found using
cryptography and computer security. The Blowfish a primarily test.
algorithm was first introduced in 1993. The blowfish 3. Compute n = pq; n is used as the modulus for both
encryption is shown in figure below: the public and private keys
4. Select the public key (i.e. the encryption key) E such
that it is not a factor of (p − 1) and (q − 1).
5. Select the private key (i.e. the decryption key) D such 3DES:
that the following equation is true: Advantages
(D*E) mod (p-1)*(q-1) = 1 1) It uses 64 bit block size with 192 bits of key size. It is
6. For encryption, calculate the cipher text CT from the simple like DES because the encryption method is
plain text PT as follows: similar to the one in the original DES but applied 3
CT = PT^E mod N (3.1) times to increase the encryption level and the average
7. Select CT as the cipher text to the receiver. safe time.
8. For decryption, calculate the plain text PT from the 2) 3DES is easy to implement (and accelerate) in both
cipher text CT as follows: hardware and software.
PT = CT^D mod N (3.2)
Disadvantages
3.6 Comparison 1) 3DES is slower than other block cipher methods.
Comparative study of the cryptographic algorithms both 2) It has poor performance.
symmetric as well as asymmetric has been done. AES
Advantages
Table 1: Comparison of Cryptography Algorithms 1) The purpose of the AES algorithm is to replace the
ALGORITH CREATED KEY BLO older and less reliable algorithms, such as Data
M BY SIZE CK Encryption Standard (DES).
(BITS) SIZ 2) AES encryption is fast and flexible.
E 3) The AES has also been employed in other areas such
(BIT as to secure information in smart cards and online
S) transactions.
DES IBM in 56 64 4) Until May 2009, the only successful published
1975 attacks against the full AES were side-channel
3DES IBM in 112 or 64 attacks on some specific implementations.
1978 168 5) In June 2003, the U.S. Government announced that
AES JOAN 256 128 AES could be used to protect classified
DAEMEN information.
& 6) The design and strength of all key lengths of the
VINCENT AES algorithm (i.e., 128, 192 and 256) are
RIJMEN IN sufficient to protect classified information up to the
1998 SECRET level. TOP SECRET information will
BLOWFISH BRUCE 32 - 448 64 require use of either the 192 or 256 key lengths.
SCHNEIER Disadvantages
IN 1993 1) AES in Galois/Counter Mode (GCM) is challenging
E. Thambiraja, G.Ramesh and Dr. R. Umarani in [8] to implement in software.
have done survey on most common encryption 2) The size of key length is too long that makes it
techniques. Monika Agrawal and Pradeep Mishra in [9] complex sometimes.
have also done a comparative survey on Symmetric Key Blowfish
Encryption Techniques. Gurjeevan Singh, Ashwani 1) Blowfish is block cipher 64-bit which can also be
Kumar Singla and K.S.Sandha in [4] have provided used as a replacement for the DES algorithm. It
comparison of various cryptographic algorithms. takes a variable length key, ranging from 32 bits to
DES 448 bits; default 128 bits.
Advantages and Disadvantages of DES are Advantages 2) Blowfish is fast as its encryption rate on 32-bit
1) DES algorithm has been a popular secret key microprocessor is 26 clock cycles per byte.
encryption algorithm and is used in many 3) It is compact as it can execute in less than 5 kb
commercial and financial applications. memory.
2) Although introduced in 1976, it has proved resistant 4) It is simple because it uses only primitive operations
to all forms of cryptanalysis. like addition, XOR and table lookup, making its
Disadvantages design and implementation simple.
1) Its key size is too small by current standards and its 5) It has a variable key length upto a maximum of 448
entire 56 bit key space can be searched in bits long making it both flexible and secure.
approximately 22 hours. 6) No attack is known to be successful against this.
2) It was recognized that DES was not secure because of Blowfish is unpatented, license-free, and is
advancement in computer processing power available free for all uses. Blowfish has variants of
14 rounds or less.
7) Blowfish is considered to be the best out of all
encryption algorithms.
magazine, IEEE, Volume 16 No 6, pp. 5-6, Nov. Devi Dyal Group of Professional Institutions, Barwala,
1978. Haryana, India.
[4.] Gurjeevan Singh, Ashwani Kumar Singla,
K.S.Sandha “ Performance Evaluation of Symmetric
Cryptography Algorithms,” International Journal of
Electronics and Communication Technology
Volume 2 Issue 3, September 2011.
[5.] Pratap Chnadra Mandal “Superiority of Blowfish
Algorithm,” International Journal Of Advanced
Research in Computers Science and Software
Engineering Vol 2 Issue 9, September 2012.
[6.] Daemen, J., and Rijmen, V. "Rijndael: The
Advanced Encryption Standard." Dr. Dobb's Journal,
March 2001.
[7.] R.L.Rivest, A.Shamir, and L.Adleman, “A Method
for Obtaining Digital Signatures and Public-Key
Cryptosystems,” Communication of the ACM,
Volume 21 No. 2, Feb. 1978.
[8.] E. Thambiraja, G.Ramesh, Dr. R. Umarani, “A
survey on various most common encryption
techniques,” International Journal of Advanced
Research in ComputerScience and Software
Engineering, Vol 2, Issue 7, July 2012.
[9.] Monika Agrawal, Pradeep Mishra,” A Comparative
Survey on Symmetric Key Encryption Techniques,”
International Journal on Computer Science and
Engineering (IJCSE), Vol. 4 No. 05 May 2012,
PP877-882.
AUTHOR