Evaluating the Performance and the Strength of CryptoBI Algorithm

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-21 Number-2
Year of Publication : 2015
Authors : Zakaria M. Abusilmiyeh, Tawfiq S. Barhoom
DOI :  10.14445/22312803/IJCTT-V21P120


Zakaria M. Abusilmiyeh, Tawfiq S. Barhoom "Evaluating the Performance and the Strength of CryptoBI Algorithm". International Journal of Computer Trends and Technology (IJCTT) V21(2):110-115, March 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cryptography problem is a key exchange between users securely, where no one else can obtain a copy. One proposed solution is CryptoBI “A Novel Cryptography Method Based on image for Key Generation” algorithm that prevents the attacks and avoids key exchanges between the two sides of communication by creating the key in home on the sender/receiver machine using RGB image. In this paper, we applied the CryptoBI algorithm and created a prototype for a specific scenario to measureits strength against the cryptanalysis, and to measure its efficiency against well-known symmetric cryptographic algorithms.The experiment results showed that the CryptoBI had higher data rate than AES, Rijndael, DES, 3DES, RC2 and RC6, but less than the Blowfish algorithm.In addition, the experiment results showed that the CryptoBI algorithm was weak against the cryptanalysis attack because it can be broken withinminutes when the CryptoBI images database is known to the attacker.

[1] P. Marwaha and P. Marwaha, "Visual cryptographic steganography in images," Karur, India, 2010.
[2] W. Stallings, "Cryptography and Network Security - Principles and Practices", Pearson Education Third Edition ed., 2002.
[3] D. S. Abd Elminaam, H. M. Abdual Kader and M. M. Hadhoud, "Evaluating The Performance of Symmetric Encryption Algorithms," International Journal of Network Security, Vols. Vol.10, No.3, p. 213–219, May 2010.
[4] P. Ding, “Central manager: A solution to avoid denial of service attacks for wreless LANs,” International Journal of Network Security, vol. 4, no. 1, pp. 35-44, 2007..
[5] Hardjono, Security In Wireless LANS And MANS, Artech House Publishers, 2005..
[6] P. Ruangchaijatupon, and P. Krishnamurthy, “Encryption and power consumption in wireless LANsN,” The Third IEEE Workshop on Wireless LANs, pp. 148-152, Newton, Massachusetts, Sep. 27-28,2001..
[7] D. Coppersmith, “The data encryption standard(DES) and its strength against attacks,” IBM Journal of Research and Development, pp. 243 -250, May1994..
[8] J.Daemen,and V.Rijmen,“Rijndael: Theadvanced encryption standard,” Dr. Dobb’s Journal, pp. 137139,Mar. 2001..
[9] N. E. Fishawy, “Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms,” International Journal of Network Security, pp. 241-251, Nov. 2007..
[10] M. S. Hwang and C. Y. Liu, “Authenticated encryption schemes: current status and key issues,” International Journal of Network Security, vol. 1, no. 2, pp. 61-73, 2005..
[11] K. Naik, “Software implementation strategies for powerconscious systems,” Mobile Networks and Applications,vol. 6, pp. 291-305, 2001..
[12] B. Schneier, The Blowfish Encryption Algorithm,Retrieved Oct. 25, 2008. (http://www.schneier.com/blowfish.html).
[13] Seshadri, R. and T.RaghuTrivedi, "Efficient Cryptographic Key Generation using Biometrics," Int. J. Comp. Tech. Appl., vol. 2 (1), pp. 183-187, 2011.
[14] "Wikipedia (Key exchange)," Dec. 1, 2013. [Online]. Available: (http://en.wikipedia.org/wiki/Key_exchange).
[15] Santhi, B., K.S. Ravichandran, A.P. Arun and L. Chakkarapani, "A Novel Cryptographic Key Generation Method Using Image Features," in Research Journal of Information Technology 4(2), 2012.
[16] Barhoom, Tawfiq S. and Abusilmiyeh, Zakaria M., ""A Novel Cryptography Method Based on Image for Key Generation"," in Palestinian International Conference on Information and Communication Technology, Palestine, Gaza, 2013.
[17] A. A. Tamimi, "Performance Analysis of Data Encryption Algorithms", Retrieved Oct. 1, 2008.
[18] Dhawan, Priya; "Performance Comparison: Security Design Choices," Microsoft Developer Network October 2002. http://msdn2.microsoft.com/enus/ library/ms978415.aspx.
[19] Singhal, Nidhi and Raina, J P S. “Comparative Analysis of AES and RC4 Algorithms for Better Utilization”, International Journal of Computer Trends and Technology, ISSN: 2231-280, July to Aug Issue 2011, pp. 177-181.
[20] "ChilKat Software," 2014. [Online]. Available: http://www.chilkatsoft.com/encryption-features.asp.
[22] 2014. [Online]. Available: http://kb.bloombase.com/kb/?View=entry&EntryID=33.
[23] Asha A., Liyamol A. and Nisha V K, "?RC5 Encryption Using Key Derived From Fingerprint Image?," in Computational Intelligence and Computing Research (ICCIC), 2010 IEEE International Conference, Dec. 2011.

Cryptography, Cryptanalysis, Cryptography key, Image key.