ClubEnsayos.com - Ensayos de Calidad, Tareas y Monografias
Buscar

Performance Evaluation Of Encryption Algorithms' Key Length Size On Web Browsers


Enviado por   •  16 de Diciembre de 2012  •  1.764 Palabras (8 Páginas)  •  492 Visitas

Página 1 de 8

Summary

In this article, the research correlates to our previous study done

on encryption algorithms' “text length size”. However, in this

study, the evaluation is analysed on a different means instead,

which is the encryption algorithms' “key length size”, but by

imposing the same method and programming language over the

same Web browsers in order to signify their performance

differences. The performance is based on the encryption process

of the programming language’s script with the Web browsers. We

had performed the simulation test by observing their

performances as to which algorithm works best and most suited

to which Web browser. The results were obtained and concluded

in our findings.

Key words:

Data Security, Encryption Method, Encryption Algorithms, Web

Browser, ASP.

1. Introduction

In today's technology advancement era, where computers

are no longer the needs, but has become a nutrient of

necessity to comply with and serve all activities [1,2]. In

many organisations, they craved for secure, reliable, simple

and flexible system. Thus, there is no security system that

has been said to be foolproofed. However, researchers

throughout the world are in search to strengthen the

security systems and continue to make improvements to

the ones that are existed in order to combat against the

attackers.

In this study, similarly to the ones in our previous research

article on encryption, we made a study on another aspect

that is the key length size as opposed the previous ones of

the text length size. In [3], the text length size was

increased and the key length size remains unchanged,

where we had monitored its performances and obtained a

set of results. Here, is the reverse, whereby we had

increased the key length size instead, but restrained the size

of the text length.

2. Conceptual Framework

In our study, we have imposed a Web programming

language script namely the Active Server Pages (ASP) that

will be used to analyse with four Web browsers, which are

Internet Explorer, Mozilla Firefox, Opera and Netscape

Navigator as the ones that were utilised in [3]. This study

will be conducted in order to determine which type of

algorithm is suitable to which type of Web browser in

terms of their performance and compatibility.

There are five types of encryption algorithms that were

selected to be utilised, which will be used for the analysis

namely Blowfish, International Data Encryption Algorithm

(IDEA), Advanced Encryption Standard (AES), Tiny

Encryption Algorithm (TEA) and Twofish [1,3]. These

encryption algorithms are known to be able to support 128-

bit key size [4]. Subsequently, the five types of algorithm

will be co-analysed with the four Web browsers

mentioned earlier, which are able to process its scripts

effectively and in an efficient manner.

3. Methodology

As stated in [1,3], the idea of an encryption is basically to

secure the data held within a message or file and to ensure

that the data is unreadable to others. The unencrypted

message or file is often referred to as

Plaintext (raw data), and the encrypted message or

file is referred as Ciphertext. Figure 1 illustrates the

process of data encryption from an unencrypted data into

an encrypted data.

Figure 1: Data Encryption

In encryption , it consists of key length in number of bits.

A key is a long sequence of bits used by encryption

algorithms. Thus the length of key determines the

probabilities if one ought to figure it out all its possible key

values [1].

Figure 2 exemplifies the data before and after it is

encrypted, then stored in a database. The two data are of

the same values, where the one circled in blue is the

unencrypted data (in English it stands for “School of

Computer and Communication Engineering”) and the

encrypted data (funny characters) circled in red is

Plaintext

Encryption

Algorithm Ciphertext

Submit Store

Data

IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May

...

Descargar como (para miembros actualizados)  txt (13 Kb)  
Leer 7 páginas más »
Disponible sólo en Clubensayos.com