In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is... more
In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is which technique should be used to provide secure transmission. This paper provides an analysis of various encryption algorithms i.e. AES, DES, 3DES, Blowfish, RC4, RC6. The Comparison is also provided.
During the last decades, information security has become a major issue. Encrypting and decrypting data have recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very... more
During the last decades, information security has become a major issue. Encrypting and decrypting data have recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very hard to crack. Cryptography plays major roles to fulfilment these demands. Nowadays, many of researchers have proposed many of encryption and decryption algorithms such as AES, DES, RSA, and others. But most of the proposed algorithms encountered some problems such as lack of robustness and significant amount of time added to packet delay to maintain the security on the communication channel between the terminals. In this paper, the security goals were enhanced via "A New Approach for Complex Encrypting and Decrypting Data" which maintains the security on the communication channels by making it difficult for attacker to predicate a pattern as well as speed of the encryption / decryption scheme.
With the widespread growth in applications for resource limited Wireless Sensor Networks (WSN), the need for reliable and efficient security mechanisms for them has increased manifold but its implementation is a non-trivial task.... more
With the widespread growth in applications for resource limited Wireless Sensor Networks (WSN), the need for reliable and efficient security mechanisms for them has increased manifold but its implementation is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography algorithms for WSNs. Several security mechanisms have been introduced to address the need for security in WSNs. To provide a better understanding of these security mechanisms, two encryption algorithms RC5 and RC6 have been studied and implemented in WSN environment.