Author:
V. Vilasini ,V. Vasudevan ,S. Manuj Nanthan ,K. Lakshmi Kalpana Roy
Abstract
The algorithms that are used for encrypting the text information for security purpose are referred as encryption algorithms. They are widely employed for the application on data transmission over networks. This is seen as a necessary part of data transmission since confidentiality and data privacy are important factors. Different encryption algorithms have different complexities, speeds of execution, and degrees of security. The Advanced Encryption Standard (AES) is one of the algorithms acknowledged by the U.S. government and other major organizations. The AES algorithm guarantees high security since there is no known public attack that can crack it. The Blowfish algorithm on the other hand is very fast but less secure. The encryption algorithms in the average zone of these two algorithms are highly useful for the transmission of general information among people. Such an algorithm also guarantees a good amount of speed as well as more security. Non-conventional algorithms such as transpositional cipher based on Rubik’s Cube mechanism can be seen as a viable option to use in common applications. These algorithms can be further deepened with the help of more complex key generation parts that can be done to enhance the security of the data. This paper focuses on analytically evaluating if this algorithm can be treated as a viable replacement in an application compared to other algorithms. Moreover, this research covers some pros and cons noted while evaluating.
Publisher
Inventive Research Organization
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference9 articles.
1. [1] Robert E. Endeley, “End-to-End Encryption in Messaging Services and National Security―Case of WhatsApp Messenger”, Journal of Information Security, Vol.09 No.01, 2018
2. [2] IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 22, Issue 6, Ser. I (Nov. – Dec. 2020), PP 39-44 www.iosrjournals.org
3. [3] Khaled Loukhaoukha, Jean-Yves Chouinard, Abdellah Berdai, "A Secure Image Encryption Algorithm Based on Rubik's Cube Principle", Journal of Electrical and Computer Engineering, vol. 2012, Article ID 173931, 13 pages, 2012. https://doi.org/10.1155/2012/173931
4. [4] Nazeh Abdul Wahid MD, Ali A, Esparham B, Marwan MD (2018) A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. J Comp Sci Appl Inform Technol. 3(2): 1-7. DOI: 10.15226/2474-9257/3/2/00132
5. [5] E. Fernando, D. Agustin, M. Irsan, D. F. Murad, H. Rohayani and D. Sujana, "Performance Comparison of Symmetries Encryption Algorithm AES and DES With Raspberry Pi," 2019 International Conference on Sustainable Information Engineering and Technology (SIET), Lombok, Indonesia, 2019, pp. 353-357, doi: 10.1109/SIET48054.2019.8986122.