12.07.2015 Views

Superior Security Data Encryption Algorithm - Ijoes.org

Superior Security Data Encryption Algorithm - Ijoes.org

Superior Security Data Encryption Algorithm - Ijoes.org

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

174Yashpal Mote, Paritosh Nehete, Shekhar GaikwadRijndael(pronounced Rain Doll). It was selected in 1997 after a competitionto select the best encryption standard. It has variable key lengthof 128, 192, or 256 bits; default 256. AES encryption is fast and flexible; itcan be implemented on various platforms especially in small devices Bruteforce attack isThe only effective attack known against it, in which the attacker tries totest all the characters combinations toun lock the encryption. Both AES andDES are block ciphers.Blowfish: It is one of the most common public domainencryption algorithmsprovided by Bruce Schneier – oneof the world’s leading cryptologists, andthe president of Counterpane Systems, a consulting firm specializing incryptography and computer security. It takes a variable length key, rangingfrom 32 bits to 448bits; default 128 bits. Blowfish is unpatented, license-free,and isavailable free for all uses.NTRU:The NTRU encryption scheme is an interesting alternative to wellestablished<strong>Encryption</strong> schemes such as ,RSA,DES, ElGamal, and ECIES. Thesecurity of NTRU depends on the hardness of computing short lattice vectorsand thus is a promising user for being quantum computer resistant. Therehas been extensive research onefficient implementation of the NTRUencryption scheme. In this paper, we presenta new algorithm forshowingthe performance of NTRU. The proposed method is faster on average thanthe best previously known procedures.3. Simulation ProcedureHere, our destination to measure the <strong>Encryption</strong> andDecryption speedfor each algorithm for different packet sizes. <strong>Encryption</strong> time is used tocalculate the throughput of an encryption pattern. It indicates the speed ofencryption. The throughput of the encryption scheme iscalculated by dividingthe total plaintext in Megabytes encrypted on the total encryption time for© 2012 Journal Anu Books Authors are responsible for any plagiarism issues.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!