Comparative Study On Encryption Algorithms And Proposing A Data Management Structure
Ali Makhmali, Hajar Mat Jani
Index Terms: AES, Blowfish, DES, Encryption Algorithms, RSA, Data Management Structure, Triple DES, Website Security
Abstract: In implementing a web-based application, security is one of the most important issues to be addressed. Generally, two factors should be addressed prior to implementing the application to ensure security: the structure of data management, and data security strategy. In this research, we try to find a suitable implementation and solution to handle these two problems. These issues first led us to perform a comparative study on several encryption algorithms, and consequently, to find the most suitable one; and second, to find the best management structure of data to ensure a reasonable level of security for the clients of the web-based application. We study and compare the concepts of five encryption algorithms that are most widely used: DES, Triple DES, RSA, Blowfish, and AES. The focus is on the general strategy the encryption algorithms are using, and their implementation applicability on websites or web-based applications. A survey was also conducted in finding the level of awareness and concern regarding online systems’ security. Based on the findings of this study, a data management structure for storing confidential data on a server is proposed.
 G. Oded, Foundations of Cryptography: Volume 2, Basic Applications, Vol. 2. Cambridge University Press, 2004.
 R. Richardson, “CSI Computer Crime and Security Survey,” Computer Security Institute, 2008.
 N. Penchalaiah and R. Seshadri, “Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES),” International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010.
 S.P. Singh and R. Maini, “Comparison of Data Encryption Algorithms,” International Journal of Computer Science and Communication, Vol. 2, No. 1, January-June 2011, pp. 125-127, 2011.
 A. Engelfriet, “The DES encryption algorithm,” Available at www.iusmentis.com/technology/encryption/des/, Accessed on 18 Oct. 2012.
 M. Rouse, “Data Enryption Standards (DES),” 2006, Available at http://searchsecurity.techtarget.com/definition/Data-Encryption-Standard, Accessed on 18 Oct. 2012.
 Tropical Software, “Triple DES Encryption,” Available at http://www.tropsoft.com/strongenc/des3.htm, Accessed on 12 Oct. 2012.
 M. Rouse, “RSA Algorithm,” 2005, Available at http://searchsecurity.techtarget.com/definition/RSA, Accessed on 16 Oct. 2012.
 J.S. Coron, How to Implement RSA in Practice, Universite du Luxembourg, 2009.
 D. Joyner, “Application: RSA Encryption,” 2002, Available at http://www.usna.edu/Users/math/wdj/_files/documents/book/node44.html, Accessed on 22 Oct. 2012.
 S. Hollister, “1024-bit RSA encryption cracked by carefully starving CPU of electricity,” 2010, Available at
http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele/, Accessed on 15 Oct. 2012.
 B. Gatliff, “Encrypting data with the Blowfish algorithm,” 2003, Available at http://www.design-reuse.com/articles/5922/encrypting-data-with-the-blowfish-algorithm.html, Accessed on 8 Nov. 2012.
 B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, Available at http://www.schneier.com/paper-blowfish-fse.html, Accessed on 28 Oct. 2012.
 C. Paar and J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners, ISBN 978-3-642-04101-3, 2010.