Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Performance Analysis of SAFER+ and Triple DES security algorithms
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Performance Analysis of SAFER+ and Triple DES security algorithms for Bluetooth Security Systems
Abstract

In this paper, comparison of the SAFER+encryption algorithm and Triple DES algorithm forBluetooth security systems is done. Performance of theabove security algorithms are evaluated based on theefficiency of the algorithm. The whole design wascaptured entirely in matlab. In order to check theefficiency of the algorithm, noise is being added to theencrypted data and the output is seen to be obtainedwithout any incorrectness which justifies the level ofsecurity. On comparison, Triple DES algorithm proves tobe better for implementation in Bluetooth devices than theSAFER+ algorithm.
Key words: Secure And Fast Encryption Routine, TripleData Encryption Standard, Pseudo Hadamard Transform,Encryption and Decryption
.1. Introduction
Bluetooth is an open standard for short-range radiofrequency (RF) communication. Bluetooth technology isused primarily to establish wireless personal areanetworks (WPAN), commonly referred to as ad hoc orpeer-to-peer (P2P) networks. Bluetooth technology hasbeen integrated into many types of business and consumerdevices, including cellular phones, personal digitalassistants (PDA), laptops, automobiles, printers, andheadsets. This allows users to form ad hoc networksbetween a wide variety of devices to transfer voice anddata. This document provides an overview of Bluetoothtechnology and discusses related security concerns. Therehave been several versions of Bluetooth, with the mostrecent being 2.0 + Enhanced Data Rate (EDR) (November2004) and 2.1 + EDR (July 2007). While 2.0 + EDRprovided faster transmission speeds than previousversions (up to 3 Mbits/second), 2.1 + EDR provides asignificant security improvement for link key generationand management in the form of Secure Simple Pairing(SSP).This publication addresses the security of these versionsof Bluetooth, as well as the earlier versions 1.1 and 1.2.Bluetooth technology and associated devices aresusceptible to general wireless networking threats, such asdenial of service attacks, eavesdropping, man-in-themiddleattacks, message modification, and resourcemisappropriation. They are also threatened by morespecific Bluetooth-related attacks that target knownvulnerabilities in Bluetooth implementations andspecifications. Attacks against improperly securedBluetooth implementations can provide attackers withunauthorized access to sensitive information andunauthorized usage of Bluetooth devices and othersystems or networks to which the devices are connected.There are several security algorithms available to ensurethe security in wireless network devices. Some of themajor methods are AES, DES, Triple DES, IDEA,BLOWFISH, SAFER+, RC2 to RC5. The SAFER+algorithm is based on the existing SAFER family ofciphers. Although SAFER+ is the most widely usedalgorithm, it seems to have some vulnerabilities. Ourobjective is to compare the Triple DES algorithm andSAFER+ algorithm for the Bluetooth security systems.The Triple DES algorithm uses multiple stages ofpermutation and substitution, results in a more complexalgorithm, which increases the difficulty of cryptanalysis.This shows that TRIPLE DES algorithm proves to be abetter one for the implementation in Bluetooth devicesthan SAFER+ algorithm.In this paper, section 2 describes the overview ofBluetooth technology, section 3 deals with Bluetoothsecurity. The SAFER+ algorithm is explained in section 4.Section 5 describes the TDES algorithm.
2. Bluetooth Technology
Bluetooth operates at 2.4 GHz frequency in the free ISMband(Industrial, scientific, and Medical) by usingfrequency hopping. Bluetooth frequency hopping uses amaximum of 79 different Baseband frequencies to avoidchannels that suffer from interference.


Download full report
http://paper.ijcsns07_book/200902/20090253.pdf