Beruflich Dokumente
Kultur Dokumente
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
© 2013. Dr. Prerna Mahajan & Abhishek Sachdeva. This is a research/review paper, distributed under the terms of the Creative
Commons Attribution-Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-
commercial use, distribution, and reproduction inany medium, provided the original work is properly cited.
A Study of Encryption Algorithms AES, DES and
RSA for Security
Dr. Prerna Mahajan α & Abhishek Sachdeva σ
Abstract- In recent years network security has become an times slower than Symmetric techniques, because they
important issue. Encryption has come up as a solution, and require more computational processing power [4].
Year 2 013
plays an important role in information security system. Many This study evaluates three different encryption
techniques are needed to protect the shared data. The present
algorithms namely; AES, DES and RSA. The
work focus on cryptography to secure the data while
performance measure of encryption schemes will be
transmitting in the network. Firstly the data which is to be
transmitted from sender to receiver in the network must be conducted in terms of encryption and decryption time
encrypted using the encryption algorithm in cryptography. such as text or document[5]. 15
Secondly, by using decryption technique the receiver can view
the original data. In this paper we implemented three encrypt II. Encryption Algorithms
M
any encryption algorithms are widely available DES algorithm consists of the following steps
and used in information security. They can be
i. Encryption
16
E ) Volume XIII Issue XV Version I
Global Journal of Computer Science and Technology ( D
ii. Usual Round : Execute the following operations iii Mix Columns : The Mix Columns transformation
which are described above. operates at the column level; it transforms each
column of the state to a new column.
1. Sub Bytes
iv Add Round Key : Add Round Key proceeds one
2. Shift Rows
column at a time. Add Round Key adds a round
3. Mix Columns
key word with each state column matrix; the
4. Add Round Key , using K(round)
operation in Add Round Key is matrix addition.
iii. Final Round: Execute the following operations
The last step consists of XO Ring the output of
which are described above.
the previous three steps with four words from the key
1. Sub Bytes schedule. And the last round for encryption does not
Year 2 013
2. Shift Rows involve the “Mix columns” step. [8]
3. Add Round Key, using K(10) v. Decryption: Decryption involves reversing all the
iv. Encryption : Each round consists of the following steps taken in encryption using inverse functions
four steps: like a) Inverse shift rows, b) Inverse substitute
bytes, c) Add round key, and d) Inverse mix 17
i Sub Bytes : The first transformation, Sub Bytes, is columns.
used at the encryption site. To substitute a byte,
c) Rivest-Shamir-Adleman (RSA)
RSA is widely used Public-Key algorithm. RSA
firstly described in 1977. In our proposed work, we are
using RSA algorithm to encrypt the data to provide
security so that only the concerned user can access it.
RSA algorithm involves these steps:
1. Key Generation
2. Encryption
3. Decryption
i Key Generation
Year 2 013
iii Decryption
Decryption is the process of converting the
cipher text (data) to the original plain text(data). [10]
Decryption with key d: compute m = cd mod n
Start
C=1
Year 2 013
I=31
19
No
Yes
No
C==1
Yes
C = C2 mod N
Yes
C= (M . C) mod
I = I -1
End
10/12/14 16 1
Stimulation Speed Faster Faster Faster
Trojan Horse Not proved No No
Hardware & Software Faster Better in hardware than in Not Efficient
Implementation software
Ciphering & Deciphering Different Different Same
Algorithm
IV. Experimental Design from a plain text. Encryption time is used to calculate the
throughput of an encryption scheme, is calculated as
The four text files of different sizes are used to the total plaintext in bytes encrypted divided by the
conduct four experiments, where a comparison of three encryption time. Comparisons analyses of the results of
algorithms AES, DES and RSA is performed. the selected different encryption scheme are performed.
[11]
a) Evaluation Parameters
Performance of encryption algorithm is V. Experimental Results And Analysis
evaluated considering the following parameters.
A. Encryption Time Experimental result for Encryption algorithm
B. Decryption Time AES, DES and RSA are shown in table-2, which shows
the comparison of three algorithm AES, DES and RSA
The encryption time is considered the time that using same text file for four experiment.
an encryption algorithm takes to produces a cipher text
Table 2 : Comparisons of DES, AES and RSA of Encryption and Decryption Time
S.NO Algorithm Packet Size (KB) Encryption Time (Sec) Decryption Time (Sec)
AES 1.6 1
1 DES 153 3.0 1.1
RSA 7.3 4.9
Year 2 013
AES 2.0 1.8
4 DES 868 4.0 1.2
RSA 8.2 5.1
21
By analyzing table-2, Time taken by RSA algorithm for both encryption and decryption process is much
higher compare to the time taken by AES and DES algorithm.
4 AES
DES
3
RSA
2
0
SIZE-153 SIZE-196 SIZE-312 SIZE-868
algorithm. AES and DES algorithm show very minor Technology (IJEAT) ISSN: 2249 – 8958, Volume-2,
difference in time taken for encryption and decryption Issue-5, June 2013, pp. 264.
process. 8. Das Debasis, Misra Rajiv. “Programmable Cellular
Automata Based Efficient Parallel AES Encryption
VI. Conclusion Algorithm”. International Journal of Network Security
Encryption algorithm plays very important role in & Its Applications (IJNSA), Vol.3, No.6, November
communication security. Our research work surveyed 2011, pp. 204.
the performance of existing encryption techniques like 9. Kalpana Parsi, Singaraju Sudha. ”Data Security in
AES, DES and RSA algorithms. Cloud Computing using RSA Algorithm”.
Based on the text files used and the International Journal of Research in Computer and
experimental result it was concluded that AES algorithm Communication technology, IJRCCT, ISSN 2278-
Year 2 013
consumes least encryption and RSA consume longest 5841, Vol 1, Issue 4, September 2012. pp. 145.
encryption time. 10. Sunitha K, Prashanth K.S. “Enhancing Privacy in
We also observed that Decryption of AES Cloud Service Provider Using Cryptographic
algorithm is better than other algorithms. Algorithm”. IOSR Journal of Computer Engineering
22 From the simulation result, we evaluated that (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-
AES algorithm is much better than DES and RSA 8727Volume 12, Issue 5 (Jul. - Aug. 2013). pp. 64.
11. Singh Narjeet, Raj Gaurav. “Security On Bccp
E ) Volume XIII Issue XV Version I
algorithm.
Our future work will focus on compared and Through Aes Encryption Technique”. International
analysed existing cryptographic algorithm like AES, DES Journal Of Engineering Science & Advanced
and RSA. It will include experiments on image and audio Technology Volume-2, Issue-4, 813 – 819. pp. 817.
data and focus will be to improve encryption time and .
decryption time.