Performance Evaluation of Ciphers Using CRYPTOOL 2.0
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 1
Abstract
Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and considerable research effort is required. This paper includes the complete step by step implementation of advance encryption technique, i.e. encrypting and decrypting 128 bit data using the AES and its modification for enhanced reliability and security. The encryption process consists of the combination of various classical techniques such as substitution, rearrangement and transformation encoding technique. The encryption and decryption module include the key expansion module which generates the key for all iterations. The modification includes the addition of an arithmetic operation and a route transposition cipher in the attacks iterative rounds. The key expansion module is extended to double the number of iterative rounds in order to increase its immunity against unauthorized attacks.
Authors and Affiliations
Kulwinder Kaur
PUBLIC KEY ENCRYPTION WITH CONJUNCTIVE FIELD FREE KEYWORD SEARCH SCHEME
Searchable encryption allows a remote server to search over encrypted documents without knowing the sensitive data contents. Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keywo...
A Comprehensive review of Artificial Bee Colony Algorithm
The Artificial Bee Colony (ABC) algorithm is a stochastic, population-based evolutionary method proposed by Karaboga in the year 2005. ABC algorithm is simple and very flexible when compared to other swarm based algorit...
A Proposed Electronic Health Record Content Structure Based on Clinical Organizations Survey
Computer systems and communication technologies made a strong and influential presence in the different fields of medicine. The cornerstone of a functional medical information system is the Electronic Health Records (EHR...
Color Image Compression by Using Absolute Moment Block Truncation Coding and Hadamard Transform
This paper investigates image data compression as it is applicable to different fields of image processing, in order to reduce the volume of pictorial data which one may need to store or transmit, The research modifies a...
Backstepping Adaptive Control of DFIG-Generators for Variable-Speed Wind Turbines
In this paper, we present a nonlinear robust control of active and reactive power by the use of the technique Backstepping a double-fed asynchronous generator (DFIG) system incorporated in a wind. The power transfer betw...