Conference Paper

A comparison of data encryption algorithms with the proposed algorithm: Wireless security.

Fac. of Inf. Technol., Isra Univ., Amman, Jordan
Conference: International Conference on Networked Computing and Advanced Information Management, NCM 2010, Sixth International Joint Conference on INC, IMS and IDC: INC 2010: International Conference on Networked Computing, IMS 2010: International Conference on Advanced Information Management and Service, IDC 2010: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 16-18, 2010
Source: DBLP


Encryption algorithms play a main role in wireless network security systems. However, those algorithms consume a significant amount of computing resources such as CPU time, and packet size. In an attempt to remedy the wireless network security issue, a novel work has been deployed to secure the transmitted data over wireless network, called a secure WiFi (sWiFi) algorithm. The sWiFi algorithm is based on developed HMAC cryptography algorithm. This paper also provides evaluation of five encryption algorithms: AES (Rijndael), DES, 3DES, Blowfish, and the proposed algorithm (sWiFi). We examine a method for analyzing trade-off between efficiency and security. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different platforms and different encryption/decryption speed. The experimental evaluation shows that the sWiFi algorithm could provide an extra level of wireless security with relatively higher performance compared with other existing algorithms for e-content delivery applications over different zones of a wireless network.