SYMMETRIC AND HOMOMORPHIC ENCRYPTION ALGORITHMS IN CLOUD DATA SECURITY
Authors: Tinatin Mshvidobadze
Affiliation: Gori State University
Category:
Keywords: 3DES, AES, blowfish, computer security, DES, encryption techniques, RC2, RC6
ABSTRACT. Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption algorithms namely: AES, DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness of each algorithm
References:
1. Gigaom Research, 2014, Data privacy and security in the post-snowden era PERC, 2015, Secure Real-time Transport Protocol (SRTP) for Cloud Services
2. PERC, 2015, Secure Real-time Transport Protocol (SRTP) for Cloud Services, available at: https://tools.ietf.org/html/draft-mattsson-perc-srtp-cloud
3. M. S. Hwang and C. Y. Liu, \Authenticated encryp-tion schemes: current status and key issues," Inter-national Journal of Network Security, vol. 1, no. 2, pp. 61-73, 2005
M. H. Ibrahim, \A method for obtaining deni-able public-key encryption," International Journal of Network Security, vol. 8, no. 1, pp. 1-9, 2009
5. M. H. Ibrahim, \Receiver-deniable public-key en-cryption," International Journal of Network Secu-rity, vol. 8, no. 2, pp. 159-165, 2009
6. P. Ding, \Central manager: A solution to avoid de-nial of service attacks for wreless LANs," Interna-tional Journal of Network Security, vol. 4, no. 1, pp.35-44, 2007
Hardjono, Security In Wireless LANS And MANS, Artech House Publishers, 2005
8. P. Ruangchaijatupon, and P. Krishnamurthy, \En-cryption and power consumption in wireless LANs-N," The Third IEEE Workshop on Wireless LANs,pp. 148-152, Newton, Massachusetts, Sep. 27-28,2001
9. D. Coppersmith, \The data encryption standard (DES) and its strength against attacks," IBM Jour-nal of Research and Development, pp. 243 -250, May 1994
10. J. Daemen, and V. Rijmen, \Rijndael: The advanced encryption standard," Dr. Dobb's Journal, pp. 137-139, Mar. 2001
11. N. E. Fishawy, \Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms," International Journal of Network Security, pp. 241-251, Nov. 2007
12. B. Schneier, The Blow¯sh Encryption Algo-rithm, Retrieved Oct. 25, 2008. (http://www.schneier.com/blow¯sh.html)
W. Stallings, Cryptography and Network Security,Prentice Hall, pp. 58-309, 4th Ed, 2005
14. R. Chandramouli, \Battery power-aware encryption," ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 2, pp. 162-180,May 2006
K. McKay, Trade-o®s between Energy and Security in Wireless Networks Thesis, Worcester Polytechnic Institute, Apr. 2005
16. Proceedings of the 23rd ACM,2011, CryptDB: Protecting confidentiality with encrypted query processing, abstract available at: http://dl.acm.org/citation.cfm?id=2043566
Ericsson, 2015, Encryption Performance Improvements of the Paillier Cryptosystem, available at: https://eprint.iacr.org/2015/864.pdf
National Security Agency, 2009, Cryptography Today, available at: https://www.nsa.gov/ia/programs/suiteb_cryptography/
IACR, Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees available at: https://eprint.iacr.org/2013/834.pdf
P. Ruangchaijatupon, and P. Krishnamurthy, \Encryption and power consumption in wireless LANs-N," The Third IEEE Workshop on Wireless LANs,pp. 148-152, Newton, Massachusetts, Sep. 27-28, 2001.
S. Hirani, Energy Consumption of Encryption Schemes in Wireless Devices Thesis, University of Pittsburgh, Apr. 9,2003, Retrieved Oct. 1, 2008.
A. Nadeem, \A performance comparison of data encryption algorithms," IEEE Information and Communication Technologies, pp. 84-89, 2006
Results of Comparing Tens of Encryption Algorithms Using Di®erent Settings- Crypto++Benchmark, Retrieved Oct. 1, 2008
A. A. Tamimi, Performance Analysis of Data Encryption Algorithms, Retrieved Oct. 1, 2008
K. McKay, Trade-o®s between Energy and Security in Wireless Networks Thesis, Worcester Polytechnic Institute, Apr. 2005
Menu