21-09-2016, 12:46 PM
1455555085-BasePaper.DOCX (Size: 64.83 KB / Downloads: 6)
A B S T R A C T
Data security is the challenging issue of today that touches many areas including computers and communication. Modern cyber security attacks have surely played with the affects of the users. Cryptography is one such technique to create certain that, authentication, integrity, availability, confidentiality and identification of user data can be maintained as well as security and privacy of data can be provided to the user. The cryptography techniques and various algorithms are used to provide the needed security to the applications. This paper provides a comparison between some symmetric and asymmetric techniques. The factors are achieving an effectiveness, flexibility and security, which is a face of researchers. As a result, the better solution to the symmetric key encryption and the asymmetric key encryption is provided.
I. INTRODUCTION
The high growth in the networking technology leads a common culture for interchanging of the data very drastically. Hence it is more accessible of copy of data and reconstruct by hackers. Thus the information has to be secured though transmit it, Sensitive information like ATM cards, banking dealings and public security numbers require to be secured. Different encryption techniques are used to protect the confidential data from unauthorized use. Encryption is a very general method for promoting the information security. The development of encryption is moving towards a prospect of endless possibilities. Each day new methods of encryption techniques are discovered. This paper proposed some recent existing encryption techniques and their security issues.
A. Cryptography
Cryptography is the art and science of protecting information from unwanted person and converting it into a form undistinguishable by its attackers though stored and transmitted. The main aim of cryptography is keeping data secure form unauthorized persons. Data cryptography mostly is the scramble of the content of data, such as text data, image related data and audio, video related data to compose the data illegible, imperceptible or unintelligible during communication or storage called Encryption process. The reverse of data encryption process is called data Decryption.
1. Confidentiality
Nobody can read the message not including the future receiver. Information in computer information is transmitted and has to be contact only by the authorized party and not by unauthorized person [1].
2. Authentication
This process is proving a one's identity. The information received by system then checks the identity of the sender that whether the information is incoming from a authorized person or unauthorized person or wrong identity.
3. Integrity
Only the authorized party is modifying the transmitted information or message. Nobody can change the given message.
4. Non Repudiation
This is a mechanism to prove that the sender really sent this message. So if any sender denies that he doesn’t send the message; this method not allows doing such type of action to sender.
5. Access Control
Only the authorized parties are capable to contact the given information.
C. SECURITY AGAINST ATTACK:
Cryptanalysis is an art and science of breaking the encrypted codes that are created by applying some cryptographic algorithm. Cryptanalysis attacks can classify the following:
1. Cipher text-only attack
In cipher-text only attack, the attacker has a part of the cipher text using available information, the attacker tries to find out the corresponding key and decrypt the plain-text [2].
2. Known-plaintext attack
The known- plaintext attack (KPA) is an attack model for cryptanalytic wherever the criminal has samples of each the plain-text and its encrypted version cipher-text. These will be revealing any secret data like secret keys and code books.
3. Chosen-plaintext attack
A chosen- plain-text attack (CPA) is an associate attack model for cryptography that presumes the potential to decide on arbitrary plain-text to be encrypted and procure the corresponding cipher-text.
4. Chosen-cipher text attack
A chosen- cipher-text attack (CCA) is an attack model for scientific discipline within which the cryptologist gathers data, a minimum of partially, by selecting a cipher-text and getting its decipherment beneath an unknown key.
5. Chosen-text attack
A chosen text attack is a combination of choosing plain-text and chosen cipher-text attack [2].
6. Brute-force attack
This type of attack is a passive attack. The attacker can try all the possibilities of the key until the message is not broken. this is the very slow attack. Suppose that message is encrypted using the 56-bit key then the attacker can try all the possibilities up to 255 bit [1].
7. Dictionary attack
The extension to the Brute-force attack is the Dictionary attack. In the Dictionary attack, it will try also same possibilities but take only those key bit whose chances of success is more [1].
8. Timing attack
Timing Attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. Each consistent operation in a computer takes time to perform [1].
9. Man-in-the-middle attack
This is the type of active attack. This differs from the above in that it involves tricking individuals into compromise their keys. The attacker is placed in the two parties through communication channel who wish to exchange their keys for secure communication [1].
II. RELATED WORK
In this section, the various methodologies and techniques for the encryption techniques used by various papers are provided.
In this paper [3] Mohit Mittal proposed a Performance Evaluation of different Cryptographic Algorithms On the basis of parameter taken as time various cryptographic algorithms are evaluated on different hardware’s Such as intel i5 , intel i3 , intel dual core ,intel atom.