Preview

Feasibility Evaluation of Symmetric Key Encryption Technique for Wireless Channel and Disk Storage

Powerful Essays
Open Document
Open Document
1796 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Feasibility Evaluation of Symmetric Key Encryption Technique for Wireless Channel and Disk Storage
www.ijraset.com

Vol. 2 Issue V, May 2014
ISSN: 2321-9653

I N T E R N A T I O N A L J O U R N A L F O R RE S E A R C H I N A P P L I E D S C I E N C E
AN D E N G I N E E R I N G T E C H N O L O G Y (I J R A S E T)

Feasibility Evaluation of Symmetric Key Encryption
Techniques for Wireless Channel and Disk Storage
Md Asif Mushtaque1, Mr. Khushal Singh2
School of Computing Science and Engineering, Galgotias University
Abstract— Network security has become very important and challenging issue in this world. Cryptography is a technique that

provides security for the sender and receiver to exchange their information over a network. There are basically two types of cryptography technique- Symmetric and Asymmetric. Symmetric key algorithm is also categorized into two parts Stream
Cipher and Block Cipher. In this paper, we analyzed feasibility of Symmetric Key Block Cipher Encryption techniques for storage space with their advantages and disadvantages and also presented the possible attacks on these algorithms. The main objective of analyzing the feasibility for Storage space, because to increase the transmission speed over wireless channel it is necessary to reduce the size of the encrypted data.
Keywords— Space complexity, Encryption Algorithm, AES, Serpent,, RC5, Rijndael, Symmetric Key, Cryptography, Private

Key, Blowfish. Wireless sensor network.
I. INTRODUCTION
In this era of information technology, network security is very important to secure our data from unauthorized user; the information should be secure while transmitting from sender to receiver. Cryptography is a technique or method that provides security for data while we transfer our data over the network. Cryptography converts the information into another format that is not understood by anyone, unauthorized user can receives that format and try to convert in the original format but it is difficult for unauthorized user.

A. Some basic terms of cryptography:
Plain Text -

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Over the past 30 years the cost of Electronics has steadily decreased. The cost of electronic storage has decreased greatly over the past 30 years as well. In this paper I will be talking about the decrease in the cost of RAM and Hard Drive Storage, how much will a 100TB HDD will cost when it becomes widely available in the future, and how much memory I will be able to buy with $100 in 10 years. In 1956, IBM created the first commercial Hard Drive called the IBM 305 RAMAC which held 5MB and cost a whopping 50 thousand dollars! Electronic storage started being more widespread during the early 1980’s, but it wasn’t until the 1990s that RAM and Hard Drive Storage begin to be cheap enough for the average person. Back in 1981 the price for one MB of Hard Drive storage space was $340! Most people couldn’t afford a computer back in the 1980’s because of the huge cost. Through the 1980’s the cost per MB fell from around $340 during 1981 then to $40 per MB in 1988, and finally to $9 per MB in 1990. The cost of one Bit of ram in 1981 was 0.000425 cents, in 1988 it was 0.000005 cents, in 1995 it was 0.000000158 cents, in 2000 the cost per Bit…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    CIS 110 Assign 2

    • 551 Words
    • 1 Page

    2. What does the future look like for storage devices. What will they look like? What type of…

    • 551 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Professional Letter It280

    • 311 Words
    • 2 Pages

    After analyzing the capability of a DVD-ROM and an external mass storage device I have concluded that the best and most effective way to store data is with an external device. The reasons are that an external mass storage device is faster and has more capability to store more data than a DVD-ROM.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Electronic storage of an organisation’s information can take various forms depending upon the size and specific industry. The benefit of electronic information storage systems is the lack of physical space that they require. Information stored electronically is also very easily backed up by a central server.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Since its introduction, the hard disk drive has become the most common form of mass storage for personal computers. Manufacturers have made immense strides in drive capacity, size, and performance. Today, 3.5-inch, gigabyte drives capable of storing and accessing one billion bytes of data…

    • 757 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Mr. Osama

    • 3738 Words
    • 15 Pages

    D I F F E R E N T V O I C E • Re t e n t i o n T h ro u g h Re d e m p t i o n…

    • 3738 Words
    • 15 Pages
    Better Essays
  • Powerful Essays

    AQR Case

    • 3166 Words
    • 13 Pages

    a r e p u r c h a s i n g f u n d s w i t h t h e a s s i s t a n c e o f f i n a n c i a l a d v i s o r s . T h e l a t t e r, t h e F i n a n c i a l C h a n n e l ,…

    • 3166 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Kkd Case Study

    • 860 Words
    • 4 Pages

    Question 1: Analysts are predicting that Krispy Kreme will be able to perform highly effectively and continue to grow rapidly in the coming two years. Do you agree with their analysis? If so, why? If not, why not?…

    • 860 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    12. According to the notes and lecture, what is the most secure and efficient way to back-up data? –a storage device.…

    • 741 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    In this tram paper we try to focus on wireless security and threats. Now a day wireless networking is get fame day by day and mostly user prefer or like wireless network because it easy to use. WLAN wireless local area network popularity gained is due to many reasons such as ease of installation flexibility mobility reduced cost of ownership and scalability.…

    • 948 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In upcoming days income had decided to change it infrastructure system with more reliable and powerful system for security reason and future information they are planning to set storage system…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    it255

    • 721 Words
    • 3 Pages

    Security in today’s world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this seminar work, we discuss the applications of encryption techniques in database security. This is an area of substantial interest in database because we know that, the use of database is becoming very important in today’s enterprise and databases contains information that is major enterprise asset. This research work discuses the application of various encryption techniques in database security, and how encryption is used at different levels to provide the security.…

    • 721 Words
    • 3 Pages
    Better Essays