IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 2- Issue 6, June 2013 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Comparative Study On Encryption Algorithms And Proposing A Data Management Structure

[Full Text]

 

AUTHOR(S)

Ali Makhmali, Hajar Mat Jani

 

KEYWORDS

Index Terms: AES, Blowfish, DES, Encryption Algorithms, RSA, Data Management Structure, Triple DES, Website Security

 

ABSTRACT

Abstract: In implementing a web-based application, security is one of the most important issues to be addressed. Generally, two factors should be addressed prior to implementing the application to ensure security: the structure of data management, and data security strategy. In this research, we try to find a suitable implementation and solution to handle these two problems. These issues first led us to perform a comparative study on several encryption algorithms, and consequently, to find the most suitable one; and second, to find the best management structure of data to ensure a reasonable level of security for the clients of the web-based application. We study and compare the concepts of five encryption algorithms that are most widely used: DES, Triple DES, RSA, Blowfish, and AES. The focus is on the general strategy the encryption algorithms are using, and their implementation applicability on websites or web-based applications. A survey was also conducted in finding the level of awareness and concern regarding online systems’ security. Based on the findings of this study, a data management structure for storing confidential data on a server is proposed.

 

REFERENCES

[1] G. Oded, Foundations of Cryptography: Volume 2, Basic Applications, Vol. 2. Cambridge University Press, 2004.

[2] R. Richardson, “CSI Computer Crime and Security Survey,” Computer Security Institute, 2008.

[3] N. Penchalaiah and R. Seshadri, “Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES),” International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010.

[4] S.P. Singh and R. Maini, “Comparison of Data Encryption Algorithms,” International Journal of Computer Science and Communication, Vol. 2, No. 1, January-June 2011, pp. 125-127, 2011.

[5] A. Engelfriet, “The DES encryption algorithm,” Available at www.iusmentis.com/technology/encryption/des/, Accessed on 18 Oct. 2012.

[6] M. Rouse, “Data Enryption Standards (DES),” 2006, Available at http://searchsecurity.techtarget.com/definition/Data-Encryption-Standard, Accessed on 18 Oct. 2012.

[7] Tropical Software, “Triple DES Encryption,” Available at http://www.tropsoft.com/strongenc/des3.htm, Accessed on 12 Oct. 2012.

[8] M. Rouse, “RSA Algorithm,” 2005, Available at http://searchsecurity.techtarget.com/definition/RSA, Accessed on 16 Oct. 2012.

[9] J.S. Coron, How to Implement RSA in Practice, Universite du Luxembourg, 2009.

[10] D. Joyner, “Application: RSA Encryption,” 2002, Available at http://www.usna.edu/Users/math/wdj/_files/documents/book/node44.html, Accessed on 22 Oct. 2012.

[11] S. Hollister, “1024-bit RSA encryption cracked by carefully starving CPU of electricity,” 2010, Available at
http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele/, Accessed on 15 Oct. 2012.

[12] B. Gatliff, “Encrypting data with the Blowfish algorithm,” 2003, Available at http://www.design-reuse.com/articles/5922/encrypting-data-with-the-blowfish-algorithm.html, Accessed on 8 Nov. 2012.

[13] B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, Available at http://www.schneier.com/paper-blowfish-fse.html, Accessed on 28 Oct. 2012.

[14] C. Paar and J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners, ISBN 978-3-642-04101-3, 2010.