Critical analysis of some cryptography algorithms

Authors: E. Jincharadze
Affiliation: Georgian Technical University

Category:

Keywords: algorithm, authentication, critical, cryptography, decryption
ABSTRACT. Nowadays large amounts of data are being transferred over different network channels that could be both public and private. Protecting information is more vital than ever. One of the main problems during transferring data is to ensure security. Nowadays the exchange of valuable information over Internet, such as bank transactions, credit card numbers and telecommunication services are already common practices. Because the world becomes more connected and communication methods are developed, the security on electronic services has become more important. In order to protect valuable data in computer and communication systems from unauthorized attack and modification different security methods must be involved. Cryptography is one such method to make sure that confidentiality, authentication, integrity, availability and identification of user data can be secured. Cryptography provides security and privacy of used data. Encryption is the process of converting normal data or plaintext to something incomprehensible or cipher-text by applying mathematical transformations or formulae. These mathematical transformations or formulae used for encryption processes are called algorithms. At the present time, cryptography plays important role to provide security communication between multiple objects. In many modern studies, researchers are trying to identify best cryptography mechanisms with their strong and weak points in terms of their performance results. To select cryptographic technique according to a particular situation is not so easy task. To solve this issue we have to understand that technique selection is totally dependent on desired quality attributes such as efficiency and security. In this paper is presented critical analyze of some cryptography algorithms DES, 3DES, AES, Blowfish and RSA is presented. According to the literature review we have analyzed the performance and efficiency of those algorithms. To make an evaluation of those systems was explained imitations of sample context. We have analyzed various encryption algorithms on the basis of different parameters and compared them to choose the best data encryption algorithm so that we can use it in our future work.

References:

Applied Cryptography, Second Edition: Protocols, Algorthms, and Source. Bruce Schneier, ISBN: 0471128457, 01.01.1996
Introduction to Cryptography, Second Edition, Johhanes A. Buhman, 2000
An Introduction to Modern Cryptosystems, Andrew Zwicke, 2003
Physical Security of Cryptographic Algorithm Implementations, Ilya KIZHVATOV, L’UNIVERSITÉ DU LUXEMBOURG, 2009
Handbook of Applied Cryptography, Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanston, Massachusetts Institute of Technology, June 1996
Diffie, Whitfield; Hellman, Martin (November 1976). "New Directions in Cryptography" (PDF). IEEE Transactions on Information Theory
Cryptographic algorithms and reconfigurable hardware, A Brief Introduction to Modern Cryptography, F. Rodriguez-Henriquez, Diaz Perez, 2007
A. Sterbenz and P. Lipp, “Performance of the {AES} Candidate Algorithms in {Java},” Third {Advanced Encryption Stand. Candidate Conf. April 13--14, 2000, New York, NY, USA, pp. 161–168, 2000
D. Coppersmith, "The data encryption standard (DES) and its strength against attacks", IBM Journal, Research Develop., vol. 38, no. 3, (1994), pp. 243 -250.
Introduction to Modern Cryptography by Phillip Rogaway and Mihir Bellare, 2005
D. Elminaam, “Performance evaluation of symmetric encryption algorithms,” Int. J. Comput. Networks, vol. 8, no. 12, pp. 280–286,2008
Hamdan O. Alanazi, B. B. Zaidan, A. A. Zaidan, Hamid A. Jalab, M. Shabbir and Y. AlNabhani, “New Comparative Study Between DES, 3DES and AES within Nine factors”, Journal of Computing, Volume, 2, Issue 3, March 2010, pp. 152-157
Dr. Prerna Mahajan and Abhishek Sachdeva, “ A study of Encryption Algorithms AES, DES and RSA for Security”, Global Journal of Computer Science and Technology Network, Web & Security, Volume 13 Issue 15 Version 1.0 Year 2013, pp. 15-22.
Deepak Kumar Dakate and Pawan Dubey, “Performance comparison of Symmetric Data Encryption Techniques”, International Journal of Advanced Research in Computer Engineering and Technology, Volume 3, No. 8, August 2012, pp. 163-166.
Abdel-Karim Al Tamimi, “Performance Analysis of Data Encryption Algorithms.”
Sumitra, “Comparative Analysis of AES and DES security Algorithms”, International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013, pp. 1- 5.
Ayushi, 2010,A Symmetric Key Cryptographic Algorithm, International Journal of Computer Applications (0975 - 8887) Volume 1. No. 15, 2010
"Quantum cryptography: An emerging technology in network security". - Sharbaf, M.S. IEEE International Conference on Technologies for Homeland Security . 2011
The official Advanced Encryption Standard" (PDF). Computer Security Resource Center. National Institute of Standards and Technology. Retrieved 26 March 2015.
"The Digital Millennium Copyright Act of 1998" (PDF). United States Copyright Office. Retrieved 26 March 2015.