Evaluation of Common Encryption Algorithm and Scope of Advanced Algorithm for Simulated Wireless Network

International Journal of Computer Trends and Technology (IJCTT)          
© 2014 by IJCTT Journal
Volume-11 Number-1
Year of Publication : 2014
Authors : Dr. Atul M. Gonsai , Lakshadeep M. Raval
DOI :  10.14445/22312803/IJCTT-V11P102


Dr. Atul M. Gonsai , Lakshadeep M. Raval."Evaluation of Common Encryption Algorithm and Scope of Advanced Algorithm for Simulated Wireless Network". International Journal of Computer Trends and Technology (IJCTT) V11(1):7-12, May 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Encryption algorithms play a vital role in information security systems. The study discovers the progress of Encryption algorithms in terms of their diversity of applications. Some of the Encryption algorithms have been developed to make transmission and storage of data more secured and confidential. Different levels of securities are offered by different algorithms depending on how difficult is to break them. If it is difficult to recover the plain text in spite of having substantial amount of cipher text then an algorithm is unconditionally secured. This study provides evaluation of eight of the most common encryption algorithms namely: DES, 3DES, AES (Rijndael), Blowfish, RSA, RC2, RC4, and RC6. From our analysis we came to conclusion that the best algorithm is the one which fulfills our need of security and speed. We come with new design of encryption algorithm based on AES or RSA or RC4, various scripts on NS2 or MATLAB or SCILAB, simulation environment of encrypted wireless network based on NS2 or MATLAB or SCILAB. We will implement newly proposed encryption algorithm on simulated environment and also test performance of proposed algorithm on wireless simulated network. We come with design and implement technique to store encrypted data on secondary storage device.

[1] Priyanka Pimpale, Rohan Rayarikar, Sanket Upadhyay, " Modifications to AES Algorithm for Complex Encryption”, IJCSNS International Journal of Computer Science and Network Security, Vol.11, No.10, October 2011, pp. 183-186.
[2] Manjesh.K.N, R K Karunavathi, " Secured High throughput implementation of AES Algorithm", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013 ISSN: 2277 128X , pp. 1193-1198.
[3] Evgeny Milanov, “The RSA Algorithm”, June 2009. pp. 1-11
[4] Sonal Sharma, Jitendra Singh Yadav, Prashant Sharma, " Modified RSA Public Key Cryptosystem Using Short Range Natural Number Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering , Volume 2, Issue 8, ISSN: 2277 128X, August 2012, pp. 134-138.
[5] Rajorshi Biswas, Shibdas Bandyopadhyay, Anirban Banerjee, “Fast Implementation of the RSA Algorithm Using the GNU MP library”, pp. II-30.1 to II-30.15.
[6] Suk-Hyun Cho, Devin Kaylor, "RC4 Encryption, Ralph (Eddie) Rise".
[7] Allam Mousa & Ahmad Hamad, “Evaluation of the RC4 Algorithm for Data Encryption”, International Journal of Computer Science & Application, Vol.3, No.2, June 2006, pp. 44-56.
[8] Liang Hong a, Wei Chen b, "Information theory and cryptography based secured communication scheme for cooperative MIMO communication in wireless sensor networks", www.elsevier.com/locate/adhoc, AdHoc Networks (2013).
[9] Shuai Chen, Xian-Xin Zhong, " Confidential Communication Through Chaos Encryption in Wireless Sensor Network", Journal of China University of Mining and Technology, Volume 17, Issue 2, June 2007, pp. 258–261.
[10] Jason Andress, “Understanding the Fundamentals of Info Sec in Theory and Practice", the Basics of Information Security, 2011. pp. 115-130.
[11] Chunming Rong, Gansen Zhao, Liang Yan, Erdal Cayirci, Hongbing Cheng, "Computer and Information Security Handbook (Second Edition)", 2013, pp. 285–300.
[12] N.W. Lo & Kuo-Hui Yeh, "Cryptanalysis of two three-party encrypted key exchange protocols”, Computer Standards & Interfaces 31 (2009), pp. 1167-1174.
[13] Supratim Saha, “Low Power AES Algorithm Implementation for Wireless Communication”, International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 2 Issue 8, August - 2013. pp. 29-31.
[14] Alan Kaminsky, Michael Kurdziel, Stanis?aw Radziszowski, “An Overview of Cryptanalysis Research for the Advanced Encryption Standard”.
[15] Jawahar Thakur, Nagesh Kumar, "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis", www.ijetae.com , ISSN 2250-2459, Volume 1, Issue 2, December 2011, pp. 6-12.
[16] Khushdeep Kaur, Er.Seema, “Hybrid Algorithm with DSA, RSA &MD5 Encryption Algorithm for wireless devices", (IJERA) ISSN: 2248-9622, www.ijera.com Vol. 2, Issue 5, September-October 2012, pp. 914-917.
[17] Samoud Ali, "RSA algorithm implementation for ciphering medical imaging", International Journal of Computer and Electronics Research, Volume 1, Issue 2, ISSN: 2278-5795, August 2012, pp. 44-49.
[18] Quentin Galvane Baptiste Uzel, “Cryptography - RC4 Algorithm", February 2012.
[19] Cai-hong Liua, Jin-shui Jia, Zi-long Liua, "Implementation of DES Encryption Arithmetic based on FPGA", Science Direct, AASRI Procedia 5, 2013, pp. 209 – 213.
[20] Scott Contini, Ronald L. Rivest, M.J.B. Robshaw, Yiqun Lisa Yin, "The Security of the RC6 Block Cipher", Version 1.0, August 20, 1998.
[21] Himani Agrawal, "MATLAB Implementation, Analysis and Comparison of AES and BLOWFISH", International J. of Multidispl.Research & Advcs. in Engg. (IJMRAE), ISSN 0975-7074, Vol. 2, No. II, July 2010. pp. 283-290.
[22] Morgan Monger, “RC6: the Simple Cipher", CS-627-0001: Cryptography, fall 2004.
[23] Eric Conrad, "Advanced Encryption Standard"
[24] Diaa Salama, Hatem Abdual Kader, & Mohiy Hadhoud, "Wireless Network Security Still Has no Clothes”, International Arab Journal of e-Technology, Vol. 2, No. 2, June 2011. pp. 112-123.
[25] Erica Simcoe, Hirsh Goldberg, Mehmet Ucal and Advisor: Dr. Sennur Ulukus, "An Examination of Security Algorithm Flaws in Wireless Networks ".
[26] Patil Ganesh G & Madhumita, "Selective Encryption Algorithm for Wireless Ad-hoc Networks".
[27] Diaa Salama Abd Elminaam, Hatem Mohamed Abdual Kader, and Mohiy Mohamed Hadhoud, "Evaluating The Performance of Symmetric Encryption Algorithms", International Journal of Network Security, Vol.10, No.3, May 2010, pp. 216–222.
[28] Mr. Gurjeevan singh, Mr. Ashwani Singla, Mr. K S Sandha, "Cryptography Algorithm Comparison for Security Enhancement in Wireless Intrusion Detection System", International Journal of Multidisciplinary Research, Vol.1, Issue 4, August 2011, ISSN: 2231 780. pp. 143 – 151.
[29] T.Gunasundari, Dr. K.Elangovan, “A Comparative Survey on Symmetric Key Encryption Algorithms”, International Journal of Computer Science and Mobile Applications, ISSN: 2321-8363, Vol.2, Issue. 2, February- 2014, pp. 78-83.
[30] Hamdan.o.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani, “New Comparative Study between DES, 3DES and AES within Nine Factors”, Journal of Computing, Volume 2, Issue 3, ISSN 2151-9617, March 2010, pp. 152-157.
[31] Vibha Verma and Mr. Avinash Dhole, “Analysis of comparison between Single Encryption (Advance Encryption Scheme (AES)) and Multicrypt Encryption Scheme”, International Journal of Scientific and Research Publications, ISSN 2250-3153, Volume 2, Issue 4, April 2012, pp. 1-4.
[32] Lalit Singh, Dr. R. K. Bharti, “Comparative Performance Analysis of Cryptographic Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN 2277 128X, Volume 3, Issue 11, November 2013, pp. 563-568.

Algorithm, cryptography, Cipher, Encryption, Network Security