comparative study of security algorithms

2
@ IJTSRD | Available Online @ www ISSN No: 245 Inte R Comparativ M Bharti Vidyapeeth In CBD Be ABSTRACT At present, through internet lots of confi send across the world and though it is needs protection from unauthorized pe try to read that data so to protect t unauthorized person security algorith through which the original data can be a into encrypted format and only the leg or receiver can be able to read th decrypting it. Algorithms which protec maintain the privacy of data are called Algorithms. Cryptography has been very useful fo data safer over the internet. Compara security algorithms means analyzin Working Overview: In Cryptography the plain text is the information the sender wants to send t through the help of encryption algorithm and the key 1(no of characters) are tak and cipher text is produced. Cipher text the data to be send which is in encr Similarly, at the receiver side the rec provided by key 2 for the decryption cipher text and receiver key as input and w.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 56 - 6470 | www.ijtsrd.com | Volum ernational Journal of Trend in Sc Research and Development (IJT International Open Access Journ ve Study of Security Algorithm Mr. Sagar Yashwant Jadhav nstitute of Management and Information Techno elapur, Navi Mumbai, Maharashtra, India idential data is confidential it erson who will the data from hms are used able to convert gitimate person hat data after ct the data and Cryptography or sending the ative study of ng the better performance which has the l and analyzing which is the through which we can able algorithm for secure transmiss Keywords: Cryptography, E Symmetric Algorithms, Asymm 3DES, Blowfish, RSA. INTRODUCTION Cryptography does the hiding be accessible to the intruder person who have the access t Encryption Standard(DES), T Standard(3DES), Rivest Sham Blowfish are the types of cryp actual data or to the receiver m the plain text ken as an input is nothing but rypted format. ceiver will be by taking the d produces the plain text as output. Both the be kept secured otherwise one data in between transmission. In this both the keys 1 & 2 called symmetric key algor Standard (DES), Triple Dat (3DES) and Blowfish are exam algorithm. [2] n 2018 Page: 2848 me - 2 | Issue 4 cientific TSRD) nal ms ology, low cost comparatively widely used algorithm to understand the best sion. [2] Encryption, Decryption, metric Algorithms, DES, of data so that it cannot but only the authorized to the information. Data Triple Data Encryption mer Adlemen(RSA) and ptography algorithms. keys used are secret so e can steal it and read the are same therefore it is rithm. Data Encryption ta Encryption Standard mples of symmetric key

Upload: ijtsrd

Post on 19-Aug-2019

8 views

Category:

Education


0 download

DESCRIPTION

At present, through internet lots of confidential data is send across the world and though it is confidential it needs protection from unauthorized person who will try to read that data so to protect the data from unauthorized person security algorithms are used through which the original data can be able to convert into encrypted format and only the legitimate person or receiver can be able to read that data after decrypting it. Algorithms which protect the data and maintain the privacy of data are called Cryptography Algorithms. Cryptography has been very useful for sending the data safer over the internet. Comparative study of security algorithms means analyzing the better performance which has the low cost comparatively and analyzing which is the widely used algorithm through which we can able to understand the best algorithm for secure transmission. 2 Mr. Sagar Yashwant Jadhav "Comparative Study of Security Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: https://www.ijtsrd.com/papers/ijtsrd15747.pdf Paper URL: http://www.ijtsrd.com/computer-science/computer-security/15747/comparative-study-of-security-algorithms/mr-sagar-yashwant-jadhav

TRANSCRIPT

Page 1: Comparative Study of Security Algorithms

@ IJTSRD | Available Online @ www.ijtsrd.com

ISSN No: 2456

InternationalResearch

Comparative Study o

Mr. Sagar Yashwant JadhavBharti Vidyapeeth Institute of Management and Information Technology

CBD Belapur, Navi Mumbai,

ABSTRACT At present, through internet lots of confidential data is send across the world and though it is confidential it needs protection from unauthorized person who will try to read that data so to protect the data from unauthorized person security algorithms are used through which the original data can be able to convert into encrypted format and only the legitimate person or receiver can be able to read that data after decrypting it. Algorithms which protect the data and maintain the privacy of data are called Cryptography Algorithms. Cryptography has been very useful for sending the data safer over the internet. Comparative study of security algorithms means analyzing the better Working Overview:

In Cryptography the plain text is the actual data or information the sender wants to send to the receiver through the help of encryption algorithm the plain text and the key 1(no of characters) are taken as an input and cipher text is produced. Cipher textthe data to be send which is in encrypted format. Similarly, at the receiver side the receiver will be provided by key 2 for the decryption by taking the cipher text and receiver key as input and produces the

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018

ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal

Comparative Study of Security Algorithms

Mr. Sagar Yashwant Jadhav Bharti Vidyapeeth Institute of Management and Information Technology

CBD Belapur, Navi Mumbai, Maharashtra, India

confidential data is send across the world and though it is confidential it needs protection from unauthorized person who will try to read that data so to protect the data from unauthorized person security algorithms are used

a can be able to convert into encrypted format and only the legitimate person or receiver can be able to read that data after decrypting it. Algorithms which protect the data and maintain the privacy of data are called Cryptography

y has been very useful for sending the data safer over the internet. Comparative study of security algorithms means analyzing the better

performance which has the low cost comparatively and analyzing which is the widely used algorithm through which we can able to understand the best algorithm for secure transmission. Keywords: Cryptography, Encryption, Symmetric Algorithms, Asymmetric Algorithms, DES, 3DES, Blowfish, RSA. INTRODUCTION Cryptography does the hiding of data so that it be accessible to the intruder but only the authorized person who have the access to the information. Data Encryption Standard(DES), Triple Data Encryption Standard(3DES), Rivest Shamer Adlemen(RSA) and Blowfish are the types of cryptography algorith

In Cryptography the plain text is the actual data or information the sender wants to send to the receiver through the help of encryption algorithm the plain text and the key 1(no of characters) are taken as an input and cipher text is produced. Cipher text is nothing but the data to be send which is in encrypted format. Similarly, at the receiver side the receiver will be provided by key 2 for the decryption by taking the cipher text and receiver key as input and produces the

plain text as output. Both the be kept secured otherwise one can steal it and read the data in between transmission. In this both the keys 1 & 2 are same therefore it is called symmetric key algorithm. Data Encryption Standard (DES), Triple Data Encryption Stan(3DES) and Blowfish are examples of symmetric key algorithm. [2]

Jun 2018 Page: 2848

6470 | www.ijtsrd.com | Volume - 2 | Issue – 4

Scientific (IJTSRD)

International Open Access Journal

f Security Algorithms

Bharti Vidyapeeth Institute of Management and Information Technology,

performance which has the low cost comparatively and analyzing which is the widely used algorithm

an able to understand the best algorithm for secure transmission. [2]

Cryptography, Encryption, Decryption, orithms, Asymmetric Algorithms, DES,

Cryptography does the hiding of data so that it cannot be accessible to the intruder but only the authorized person who have the access to the information. Data Encryption Standard(DES), Triple Data Encryption Standard(3DES), Rivest Shamer Adlemen(RSA) and Blowfish are the types of cryptography algorithms.

plain text as output. Both the keys used are secret so be kept secured otherwise one can steal it and read the data in between transmission.

In this both the keys 1 & 2 are same therefore it is called symmetric key algorithm. Data Encryption

(DES), Triple Data Encryption Standard (3DES) and Blowfish are examples of symmetric key

Page 2: Comparative Study of Security Algorithms

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2849

Data Encryption Standard(DES) 1. Data Encryption Standard is a type of symmetric

key encryption technique published in1977 and updated in 1993.

2. DES encodes plain text of 64 bit using 56 bit key. 3. DES consists of two permutation steps in which

all 64 bits are permuted and 16 rounds are used by DES.

4. The operation in each round is identical taking the output of previous round as input.

5. After doing all this cipher text is obtained by the XOR operation.

6. Decryption works by reversing the algorithm’s operation.[1]

Triple Data Encryption Standard(3DES) 1. Triple Data Encryption Standard(3DES) is also a

type of symmetric key encryption technique. 2. 3DES also encodes the plain text of 64 bits with

56 bits of key length. 3. Compare to DES the 3DES is more secure. 4. It performs the same DES algorithm but three

times to each block. 5. The same XOR operation is performed for

obtaining the cipher text. Decryption is done by reversing the operations of algorithm.[1]

Blowfish Encryption Technique 1. Blowfish algorithm is third type of symmetric key

encryption technique. Blowfish is designed in 1993 by Bruce Schneier.

2. Blowfish uses key sizes from 32 to 448 bits for block size of 64 bits.

3. Blowfish also uses 16 rounds for encryption. Blowfish was developed for faster encryption of data.

4. Blowfish is used in many applications but later blowfish got a successor named Twofish.

5. Blowfish consists of two phase, In first phase key expansion is done. 448 bit key is converted into number of sub keys totalling 4168 bytes.

6. In second phase encryption is done. The function is executed 16 times and encrypted text is obtained by performing XOR operation.

Rivest Shamir Adlemen (RSA) 1. RSA is the type of asymmetric key encryption

technique it means the keys used for this are not similar.

2. Asymmetric key uses different key such as public key and private key for encryption.

3. The sender encrypts the plain text and obtain the cipher text by public key which is visible to everyone.

4. The receiver decrypts the cipher text with the private key which is only known to the receiver. RSA is the best algorithm of asymmetric key encryption type.

5. RSA use C = M^E mod(n) Formula for calculating the cipher text. RSA use P = M^D mod(n) Formula for calculating the plain text. Where E and D are the public and private keys and n is the value obtained through mathematical operations in RSA.[2]

CONCLUSION: Each encryption technique is best at their time also has strong and weak points to look out. DES is the encryption technique which was developed for encryption but it gives less security to the data which is overcome by 3DES encryption technique which runs 3 times and gives more security to the data compare to DES which is required for transmission. Blowfish has small requirement of memory and it gives faster encrypted data which is also well secured. RSA requires more memory compare to Blowfish but it is also good algorithm of asymmetric type encryption. Though Blowfish requires less memory it can used for applications which has small memory such as embedded applications. [2] REFERENCES 1. W. Stallings, Cryptography and Network Security.

2. Pradeep Senwal and M K Sharma, “ Comparative study of different algorithms”.