Fig 1 - uploaded by Mohiy M. Hadhoud
Content may be subject to copyright.
Overview of the field of cryptography

Overview of the field of cryptography

Source publication
Article
Full-text available
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation...

Context in source publication

Context 1
... encryption techniques are almost 1000 times slower than Symmetric techniques, because they require more computational processing power [2].The most common classification of encryption techniques can be shown in Fig. 1. Institute of Standards and Technology).DES is (64 bits key size with 64 bits block size) . Since that time, many attacks and methods recorded the weaknesses of DES, which made it an insecure block cipher [3], [4]. 3DES is an enhancement of DES; it is 64 bit block size with 192 bits key size. In this standard the encryption method is ...

Similar publications

Article
Full-text available
Securing digital data has become tedious task as the technology is increasing. Existing encryption algorithms such as AES,DES and Blowfish ensure information security but consume lot of time as the security level increases. In this paper, Byte Rotation Encryption Algorithm (BREA) has implemented using parallel processing and multi-core utilization....
Conference Paper
Full-text available
Securing digital data has become tedious task as the technology is increasing. Existing encryption algorithms such as AES,DES and Blowfish ensure information security but consume lot of time as the security level increases. In this paper, Byte Rotation Encryption Algorithm (BREA) has implemented using parallel processing and multi-core utilizati...
Research
Full-text available
This article is related to improvement of security in data encryption using symmetric key encryption, which includes combination of DES,AES and blowfish algorithms.
Article
Full-text available
During the last decades, information security has become a major issue. Encrypting and decrypting datahave recently been widely investigated and developed because there is a demand for a stronger encryptionand decryption which is very hard to crack. Cryptography plays major roles to fulfilment these demands.Nowadays, many of researchers have propos...

Citations

... Safeguarding information exchanged involves a variety of approaches. Utilizing the most common block and stream ciphers and algorithms, this study evaluated their encryption, decryption time, and throughput (speed) [3] advanced encryption standard (AES), Blowfish, Twofish, Salsa20 and ChaCha20 were evaluated. This study employing several sorts of photos. ...
Article
Full-text available
Nowadays, cybersecurity has grown into a more significant and difficult scientific issue. The recognition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. Since cyber security guarantees the privacy and security of data sent via the Internet, it is essential, while also providing protection against malicious attacks. Thanks to that, encrypt has grown into an answer that has become an essential element of information security systems. For securing shared data, multiple approaches are needed. The most common prevent and stream cryptography methods and algorithms, associated with their encoding, decrypt times, and throughputs (speeds), are discussed in this work: AES, Blowfish, Twofish, Salsa20 and ChaCha20 were studied. research using different types of images. The productivity of each method is assessed in this study utilizing the following parameters: process time and speed. This article analyzes and compares several symmetric key ciphers (AES, Blowfish, Twofish, Salsa20 and ChaCha20) are based on time-based encoding and decoding of visuals generated utilizing Java as the main programming platform.
... Safeguarding information exchanged involves a variety of approaches. Utilizing the most common block and stream ciphers and algorithms, this study evaluated their encryption, decryption time, and throughput (speed) [3] advanced encryption standard (AES), Blowfish, Twofish, Salsa20 and ChaCha20 were evaluated. This study employing several sorts of photos. ...
Article
Full-text available
Nowadays, cybersecurity has grown into a more significant and dif-ficult scientific issue. The recognition of threats and attacks meant forknowledge and safety on the internet is growing harder to detect. Since cyber-security guarantees the privacy and security of data sent via the Internet, it isessential, while also providing protection against malicious attacks. Encrypthas grown into an answer that has become an essential element of informationsecurity systems. To ensure the security of shared data, including text, images,or videos, it is essential to employ various methods and strategies. This studydelves into the prevalent cryptographic methods and algorithms utilized forprevention and stream encryption, examining their encoding techniques suchas advanced encryption standard (AES), Blowfish, Twofish, Salsa20, andChaCha20. The primary objective of this research is to identify the optimaltimes and throughputs (speeds) for data encryption and decryption processes.The methodology of this study involved selecting five distinct types of imagesto compare the outcomes of the techniques evaluated in this research. The as-sessment focused on processing time and speed parameters, examining visualencoding and decoding using Java as the primary platform. A comparativeanalysis of several symmetric key ciphers was performed, focusing on han-dling large datasets. Despite this limitation, comparing different images helpedevaluate the techniques' novelty. The results showed that ChaCha20 had thebest average time for both encryption and decryption, being over 50% fasterthan some other algorithms. However, the Twofish algorithm had lowerthroughput during testing. The paper concludes with findings and suggestionsfor future improvements. (2) (PDF) Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption. Available from: https://www.researchgate.net/publication/381224600_Comparative_Analysis_of_AES_Blowfish_Twofish_Salsa20_and_ChaCha20_for_Image_Encryption [accessed Jun 13 2024].
... This method can lead to inefficiencies when applied to images due to the large file sizes and high redundancy typically present in uncompressed image formats. These characteristics can result in increased encryption time and higher computational resources, which are not ideal for real-time applications like video streaming or live surveillance systems [16]. ...
... Firstly, images often contain a high degree of redundancy, with many areas of uniform color and intensity. Traditional block ciphers like AES and DES are designed for text data and may not efficiently handle the large data volumes and redundancy present in images, leading to inefficient encryption with possible performance bottlenecks [16]. Furthermore, the structure of image files might be altered in a way that makes them unusable or leads to significant quality degradation once decrypted, if standard encryption methods are used without modifications. ...
Thesis
Full-text available
Image Encryption using, Memristive Neural Network, PRNG, Substitution-Box, and Fibonacci Q-Matrix
... Many methods of secret data cryptography and the majority of these methods were designed based on a standard DES (data encryption standard) such as 3DES, AES, and blowfish (BF) methods [49,50,51,52]. These standard methods operate in the fashion using various lengths and numbers of some parameters used in each, as shown in Table 1 [53,54,55,56]. ...
Article
Full-text available
Long and short text messages are widely transmitted through various communication media, and some of these messages may be very secret or of a special nature, which requires protecting them from the danger of abusers, intruders, or data hackers. Given the importance of protecting text messages, a novel method will be presented focusing on simplifying the procedures to protect data and make the hacking process difficult.A high-level protection method will be provided using the complicated variable content private key; this key can be easily changed without changing the sequence of operations used in the encryption and decryption phases.A secret color image is to be used to generate the private key;both the sender and receiver must save this image, and the selected image key can be easily resized to get a key equal to the secret message length.To increase the degree of protection, it is recommended to divide the text message into blocks with a selected size, the sender and receiver must determine the size, and the byte in each block is to be combined into one vector. This vector will be rotated left using a specified number of bits determined by the sender and receiver.The proposed method will be implemented using various color images and text messages, and the results will be compared with other methods to prove the achievements obtained by the proposed method.
... This time is also used to determine the throughput of an encryption system. It is a measure of the speed of encryption (Elminaam et al. 2009). In the figures 5, 6 and 7, the blue line represented the OTP while the red line represented the AES algorithms respectively. ...
Article
The study elicited knowledge about the factors associated with one-time pad encryption/decryption with big data in healthcare; formulate an assembled algorithms model for one-time pad encryption; design and implement the system and evaluating the system performance with the view implementing big data security on Hadoop open-source framework for healthcare data. Literature was sourced to investigate the factors associated with healthcare security attacks and various consequences of breach of data. An assembled algorithm model was formulated using mathematical theory of one-time pad encryption and a model was designed using Universal Modelling Language (UML) and implemented using python programming language, Distributed File System of Hadoop, Yet Another Resource Negotiator called YARN; encryption time and decryption time was adopted for the performance metrics deployed for the evaluation of the developed system. The result showed that as the size of the files increased, the encryption/decryption time keeps increasing as well. While carryout the algorithm evaluation, two different values (file sizes) were used for testing on the Hadoop framework.Securing the healthcare (Ebola) big-data, it was observed that OTP encryption/decryption performed better compared to AES encryption/decryption in term of computational processing time of the healthcare big-data considered. Considering before/after downloading, it was observed that there was need for authentication for another level of security towards securing healthcare records on HDFS. The study concluded that, big data analytics on Hadoop is ideal for today’s big healthcare data and also that One Time Pad encryption algorithm is sufficient to provide needed big healthcare data security.
... This time is also used to determine the throughput of an encryption system. It is a measure of the speed of encryption (Elminaam et al. 2009). In the figures 5, 6 and 7, the blue line represented the OTP while the red line represented the AES algorithms respectively. ...
Thesis
Full-text available
The study elicited knowledge about the factors associated with one-time pad encryption/decryption with big data in healthcare; formulate an assembled algorithms model for one-time pad encryption; design and implement the system and evaluating the system performance with the view implementing big data security on Hadoop open-source framework for healthcare data. Literature was sourced to investigate the factors associated with healthcare security attacks and various consequences of breach of data. An assembled algorithm model was formulated using mathematical theory of one-time pad encryption and a model was designed using Universal Modelling Language (UML) and implemented using python programming language, Distributed File System of Hadoop, Yet Another Resource Negotiator called YARN; encryption time and decryption time was adopted for the performance metrics deployed for the evaluation of the developed system. The result showed that as the size of the files increased, the encryption/decryption time keeps increasing as well. While carryout the algorithm evaluation, two different values (file sizes) were used for testing on the Hadoop framework.Securing the healthcare (Ebola) big-data, it was observed that OTP encryption/decryption performed better compared to AES encryption/decryption in term of computational processing time of the healthcare big-data considered. Considering before/after downloading, it was observed that there was need for authentication for another level of security towards securing healthcare records on HDFS. The study concluded that, big data analytics on Hadoop is ideal for today's big healthcare data and also that One Time Pad encryption algorithm is sufficient to provide needed big healthcare data security.
... Elminaamn et al. [16] studied the performance of symmetric encryption algorithms. This white paper evaluates the six most used cryptographic algorithms (AES (Rijndael), DES, 3DES, RC2 and Blowfish, and RC6). ...
... header=T, sep="\t") max_y <-max(str_data) #define colours to be used for CESA, EDH, and AES lines plot_colors <-c("black", "blue", "red") #draw the graph using y axis that ranges from 0 to max_y. plot(str_data$CESA, type="o", pch=22, lwd=4, col=plot_colors [1], ylim=c(0, max_y), las = 3, axes=FALSE, ann=FALSE) #make x axis using 4 -64 bits labels axis(1, at=1:5, lab=c (4,8,16,32,64)) axis(2, at=10000*0:max_y) #create box around plot box() # graph EDH with blue line lines(str_data$EDH, type="o", pch=23, lwd=4, col=plot_colors [2]) # graph AES with red line lines(str_data$AES, type="o", pch=24, lwd=4, col=plot_colors [3]) ...
... The encryption time is calculated using the amount of time needed to transform the plaintext into an unknown (ciphertext), which is another metric for evaluating the algorithm's performance [22]. In this situation, the throughput metric is calculated as follows: ...
Article
Full-text available
This study offers a new adjustment to the Advanced Encryption Standard (AES) in order to assure a high degree of security. This is achieved by replacing the binary (XOR) operation with a new (Xo) operation in each add-round-key stage. The Xo operation generated an extra six randomly selected control keys determined by six state tables (2, 4, 6, 8, 10, and 12) produced from the addition operation in the Galois Field GF (2^2 ,2^4 ,2^6 , 2^8, 2^10 and 2^12 ) in order to boost the algorithm's unpredictability. In the suggested method, an adversary requires at least probabilities of keys to break the message; hence, it improves the difficulty of the original AES against brute force attacks. also enhances the performance of additional security metrics, such as NIST tests, compared to the original AES. Consequently, this replacement, including the use of six keys in both the encryption and decryption processes, offers a new level of security and a higher degree of resistance to data breaches. The novelty of the proposed (Xo) technique lies in the construction of GF tables ( 2^6 , 2^10 and 2^12) to be used in the encryption and decryption process for the first time, as well as the approach utilized to create the code for it.
... The six most popular encryption algorithms like RC6, DES, 3DES, BLOWFISH, RC2and AES (Rijndael) were discussed by Elminaam et al. [11]. The performance of compared algorithms was assessed. ...
Article
Full-text available
One persistent obstacle has been verified to be one of the main problems with the main developments in the electronics and technology fields, called: Data Security. The data should be encrypted to be quickly and securely linked via the electronic information transfer over the network. The procedure of transforming plain text to ciphered text is called encryption, where cannot be changed or understood simply by undesirable individuals. It may similarly be described as the science that utilizes mathematics in decryption and encryption data processes. In this article, we consider different significant algorithms utilized for data decryption and encryption in whole areas, for making a comparative study of most vital algorithms. This paper focuses on various current cryptography algorithms types. This paper also analyses the algorithm's security and parameters that define the cryptosystem efficiency.
... The authors of [10] compared the secret key algorithms DES, AES, and Blowfish. The performance is recorded. ...
Article
Full-text available
The security of private and sensitive data stored in the public domain is a major problem. It is critical for the user that data be safe both in transit and evenafter it has been stored on the server. The data owner must be guaranteed that the data held on the service provider site is safeguarded against data theft fromoutsiders, and the data must be protected even from the service providers. The secret key generation is one of the most important factors for the security ofany cryptographic system because the length of the key directly affects the performance and prevents various cryptographic attacks such as brute force attacks.At the application level, our developed system efficiently secures sensitive, private, and personally identifiable information by ensuring privacy andconfidentiality of data at rest in the public domain. This study also compares the performance of block cipher algorithms DES, 3DES, Blowfish, and AES. Itwas deduced from the result that AES consumes less time when compared to other symmetric algorithms with small consistent behavior for variouscryptographic operations with small, medium and big datasets..