Keywords—Cryptography, Symmetric Encryption, Encryption, Decryption, DES, Triple DES, AES, RC2, RC4, RC6, Blowfish.
I. INTRODUCTION
Cryptography is an enormous topic, for it has several aspects. Professionals who decide to study this field have different reasons. The beginning of cryptography was to assist military and for political purposes. Thus, cryptanalysis field has been found …show more content…
The F function of Blowfish algorithm provides a high level of security to encrypt the 64 bit plaintext data. Also the Blowfish algorithm runs faster than other popular symmetric key encryption algorithms.
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms research is continuing of the idea of combining Triple DES and RC4 was presented in IFRSA‟ International Journal of Computing.
Analysis of T.D.B Weerasinge’s research paper is done based on two measurement criteria under two circumstances:
First circumstance: Variable is the input plaintext size (input is given as text files, size is measured in kilobytes) Second circumstance: Variable is the input plaintext length, i.e. input character length (inputs are assumed as passwords)
Two measurement criteria:
* Secrecy of Ciphers (According to Shannon’s secrecy theorems)
* Encryption …show more content…
Average encryption time and secrecy of cipher are calculated after 5 rounds of testing for each input. The aim was to produce two graphical outcomes which show the variation of the Average Encryption Time and Secrecy Value over the input data size.
The second scenario used several types of password consists of alpha numeric with special characters password.
T.D.B Weerasinge used particular steps to calculate the secrecy in both scenarios:
* Calculate how often each key byte has appeared in the key.
* Calculate the probability of each byte appears (given the cipher) in the key and get the summation of Pc(K) * log2Pc(K)
* Calculate how often each cipher byte has appeared in the cipher.
* Calculate the probability of each byte appears in the key and get the summation.
The results for Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms research are summarized in these figures:
Average Secrecy Value vs. Data Size
Average Encryption Time vs. Data Size
The result for scenario1 implies that Hybrid1 (TripleDES+RC4) is the steadiest and the most secured algorithm.
Average Secrecy Value vs. Password