Symmetric Encryption Vs Blowfish Algorithm

Improved Essays
Abstract— the focus in this paper is on the symmetric encryption. There are some basic information about this type of cryptography will be reviewed. Then, symmetric cryptography advantages and problems will be covered. After that, comparison on several symmetric algorithms are discussed. These algorithms are DES, Triple DES, AES, RC2, RC4, RC6, and Blowfish.

Keywords—Cryptography, Symmetric Encryption, Encryption, Decryption, DES, Triple DES, AES, RC2, RC4, RC6, Blowfish.

I. INTRODUCTION

Cryptography is an enormous topic, for it has several aspects. Professionals who decide to study this field have different reasons. The beginning of cryptography was to assist military and for political purposes. Thus, cryptanalysis field has been found
…show more content…
The F function of Blowfish algorithm provides a high level of security to encrypt the 64 bit plaintext data. Also the Blowfish algorithm runs faster than other popular symmetric key encryption algorithms.

Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms research is continuing of the idea of combining Triple DES and RC4 was presented in IFRSA‟ International Journal of Computing.

Analysis of T.D.B Weerasinge’s research paper is done based on two measurement criteria under two circumstances:

First circumstance: Variable is the input plaintext size (input is given as text files, size is measured in kilobytes) Second circumstance: Variable is the input plaintext length, i.e. input character length (inputs are assumed as passwords)

Two measurement criteria:

* Secrecy of Ciphers (According to Shannon’s secrecy theorems)

* Encryption
…show more content…
Average encryption time and secrecy of cipher are calculated after 5 rounds of testing for each input. The aim was to produce two graphical outcomes which show the variation of the Average Encryption Time and Secrecy Value over the input data size.

The second scenario used several types of password consists of alpha numeric with special characters password.

T.D.B Weerasinge used particular steps to calculate the secrecy in both scenarios:

* Calculate how often each key byte has appeared in the key.

* Calculate the probability of each byte appears (given the cipher) in the key and get the summation of Pc(K) * log2Pc(K)

* Calculate how often each cipher byte has appeared in the cipher.

* Calculate the probability of each byte appears in the key and get the summation.

The results for Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms research are summarized in these figures:

Average Secrecy Value vs. Data Size

Average Encryption Time vs. Data Size

The result for scenario1 implies that Hybrid1 (TripleDES+RC4) is the steadiest and the most secured algorithm.

Average Secrecy Value vs. Password

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 5 Lab Report

    • 1927 Words
    • 8 Pages

    Goals According to the flow chart above, we need to generate a binary sequence of 0's and 1's, the length of which is 2N bits, that occur with equal probability and are mutually independent for which a ‘rand’ function is used. The data is then passed through a QPSK modulator to produce N complex symbols of {±1 , ±1j}. At the receiver, noise is added to the transmitted signal and the resultant signal is then passed through the QPSK demodulator to produce estimates of the transmitted binary data. After that, the demodulator output is compared with the original sequence, and finally an error counter is used to count the number of bit errors.…

    • 1927 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 5

    • 541 Words
    • 3 Pages

    The Haswell microarchitecture improvises the Ivy-bridge in the following ways: • New socket LGA1150 for desktop processors • New AVX2 Instruction set • New TSX Instruction set • New bit manipulation instructions • New dispatch ports INSTRUCTION SET: The AVX instruction set limited the integer operations to use only 128-bit registers whereas the floating point operations used 256-bit registers. In addition, AVX2 implements three operand FMA instructions. New 15 bit manipulation instructions were added to support cryptography, indexing and data conversion. The third new instruction set is TSX which helps resolve data synchronization issues which arises when same data are used by different processes running at the same time.…

    • 541 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 5 Essay

    • 1093 Words
    • 5 Pages

    #include /*input and output */ #include /* printf, NULL */ #include /* srand, rand */ #include /* time */ #include /* file operations */ #include /* symbolic constants */ using namespace std; int Gen(int length) { cout << " ******************Attempting to write key to file*******************\n"<< endl; int randomData = open("/dev/random", O_RDONLY); // open file to get random values char myRandomData[length]; //determine the length of the key size_t randomDataLen = 0;// initialize counter while (randomDataLen < sizeof myRandomData) //read from file while key length is not larger than size of plain text { ssize_t result = read(randomData, myRandomData + randomDataLen, (sizeof…

    • 1093 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1310 Unit 9

    • 1390 Words
    • 6 Pages

    UML 91.561 Computer & Network Security I HomeWork 1 Name – Nrupen Abnave Student ID -01382247 1.1 (a) Describe the major structure of a TCP packet and explain the main functions of the TCP headers. - TCP is a transport layer protocol and is connection oriented. Its reliable connection, has error checking and flow control.…

    • 1390 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    The file retrieved have the size 916 bytes. 4.3 RESULTS CONCLUDED FROM DIFFERENT ALGORITHMS According above results , In Shamir’s Algorithm the data recovered is not as per saved on the server, confidentiality is maintained. Using this algorithm the integrity is violated. , In Tree Based Recursive Information Hiding Scheme the data recovered is not as saved on the server, confidentiality and integrity is maintained.…

    • 599 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    1) Eavesdropping: It can be defined as secretly listening to the private conversation of others without their consent. Here an attacker can choose to passively eavesdrop on the network communication and steal the data. Through passive eavesdropping attackers apparently eliminate their presence in the network and make such attacks difficult to detect. The goal of such an attack is to violate the confidentiality of the communications by intercepting the network and sniffing or listening to the routing packets. Also, an adversary can actively influence the communication channel by disrupting, jamming or modifying the network packets and/or inserting false packets into the network.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The NSA/CSS strives to lead an expert workforce for their best efforts to advance and operate cryptologic systems and tools. They also look to improve performance and integration of their core expertise and of their mission to protect and defend. The agency must also make sense of and securely share electronically gathered information as well as increase security of national security systems. To accomplish these goals, a five-step strategy has been set in place. First, the NSA/CSS must succeed in todays operations by enabling wise…

    • 1143 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The authors of the book suggest physical means of making sure that your personal information does not get into the wrong hands. So what will it be: hammer or axe? ` In conclusion, the third chapter of Blown to Bits was very informative. “Ghosts in the Machine” was a chapter about how information can be hidden within computers. It is important to be careful when sending sensitive information.…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In 1996, United States Congress passed the Health Insurance Portability and Accountability Act (HIPAA) as a way for Americans to continue with health care insurance during a job transition and reduce health care fraud and abuse (California Department of Health Care Services, 2015). Providing health care services at the administrative level, the organization is responsible for protecting the individuals served private information when working with other health care providers and those supporting the individual needs. In this analysis the origins and impact of HIPAA/Private Health Information (PHI) while serving individuals with Intellectual Developmental Disabilities will be discussed, along with Bardach’s eightfold process of HIPPA/PHI and…

    • 1101 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    FBI Role In The US

    • 1788 Words
    • 8 Pages

    The Information Assurance mission confronts the challenge of preventing foreign enemies from gaining access to sensitive: national security information. The Signals Intelligence mission collects, processes, and disseminates intelligence information for intelligence and counterintelligence purposes and to support military operations. The overall mission of the NSA and the CSS “leads the U.S. Government in cryptology that encompasses both Signals Intelligence and Information Assurance products and services, and enables Computer Network Operations in order to gain a decision…

    • 1788 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    Some were simply unaware that government surveillance occurs at all. The purpose of this project is to make people aware of surveillance and to show them the harmful effects that surveillance can have. In order to do that, I have to provide some background. First, I need to explain encryption.…

    • 1437 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    ROI based Secured and Robust medical image watermarking in Transform domain. ABSTRACT: In medical field, It’s common to transmit medical image and medical reports from one hospital to other hospital for diagnosis of the diseases. In that case the patient personal information and medical image plays a vital role while transferring over network. Because if a third party got those information and he intentionally cross change the information of multiple patients with wrong medical images, It’s causes wrong treatment for all patients.…

    • 1436 Words
    • 6 Pages
    Great Essays