Conference Paper

A comparison of data encryption algorithms with the proposed algorithm: Wireless security.

Fac. of Inf. Technol., Isra Univ., Amman, Jordan
Conference: International Conference on Networked Computing and Advanced Information Management, NCM 2010, Sixth International Joint Conference on INC, IMS and IDC: INC 2010: International Conference on Networked Computing, IMS 2010: International Conference on Advanced Information Management and Service, IDC 2010: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 16-18, 2010
Source: DBLP

ABSTRACT Encryption algorithms play a main role in wireless network security systems. However, those algorithms consume a significant amount of computing resources such as CPU time, and packet size. In an attempt to remedy the wireless network security issue, a novel work has been deployed to secure the transmitted data over wireless network, called a secure WiFi (sWiFi) algorithm. The sWiFi algorithm is based on developed HMAC cryptography algorithm. This paper also provides evaluation of five encryption algorithms: AES (Rijndael), DES, 3DES, Blowfish, and the proposed algorithm (sWiFi). We examine a method for analyzing trade-off between efficiency and security. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different platforms and different encryption/decryption speed. The experimental evaluation shows that the sWiFi algorithm could provide an extra level of wireless security with relatively higher performance compared with other existing algorithms for e-content delivery applications over different zones of a wireless network.

2 Bookmarks
 · 
515 Views
  • [Show abstract] [Hide abstract]
    ABSTRACT: A variety of systems with possibly embedded computing power, such as small portable robots, hand-held computer, and automated vehicles, have power supply constraints. Their batteries generally last only for a few hours before being replaced or recharged. It is important that all design efforts are made to conserve power in those systems. Energy consumption in a system can be reduced using a number of techniques, such as low-power electronics, architecture-level power reduction, compiler techniques, to name just a few. However, energy conservation at the application software-level has not yet been explored. In this paper, we show the impact of various software implementation techniques on energy saving. Based on the observation that different instructions of a processor cost different amount of energy, we propose three energy saving strategies, namely (i) assigning live variables to registers, (ii) avoiding repetitive address computations, and (iii) minimizing memory accesses. We also study how a variety of algorithm design and implementation techniques affect energy consumption. In particular, we focus on the following aspects: (i) recursive versus iterative (with stacks and without stacks), (ii) indifferent representations of the same algorithms, (iii) different algorithms --- with identical asymptotic complexity --- for the same problem, and (iv) different input representations. We demonstrate the energy saving capabilities of these approaches by studying a variety of applications related to power-conscious systems, such as sorting, pattern matching, matrix operations, depth-first search, and dynamic programming. From our experimental results, we conclude that by suitably choosing an algorithm for a problem and applying the energy saving techniques, energy savings in excess of 60% can be achieved.
    Mobile Networks and Applications 01/2001; 6:291-305. · 1.11 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and the cost of implementation are also important concerns. A data encryption algorithm would not be of much use if it is secure enough but slow in performance because it is a common practice to embed encryption algorithms in other applications such as e-commerce, banking, and online transaction processing applications. Embedding of encryption algorithms in other applications also precludes a hardware implementation, and is thus a major cause of degraded overall performance of the system. In this paper, the four of the popular secret key encryption algorithms, i.e., DES, 3DES, AES (Rijndael), and the Blowfish have been implemented, and their performance is compared by encrypting input files of varying contents and sizes, on different Hardware platforms. The algorithms have been implemented in a uniform language, using their standard specifications, to allow a fair comparison of execution speeds. The performance results have been summarized and a conclusion has been presented. Based on the experiments, it has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation.
    Information and Communication Technologies, 2005. ICICT 2005. First International Conference on; 09/2005
  • [Show abstract] [Hide abstract]
    ABSTRACT: From the Publisher:In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology.|This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.|This volume is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.

Full-text

Download
18 Downloads
Available from
Nov 1, 2014