Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: ANALYSIS THE IMPACT OF SYMMETRIC CRYPTOGRAPHIC ALGORITHMS ON POWER CONSUMPTION
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
ANALYSIS THE IMPACT OF SYMMETRIC CRYPTOGRAPHIC ALGORITHMS ON POWER CONSUMPTION FOR VARIOUS DATA TYPES

Abstract

With the emergence of communication techniques as the human beings become advanced day by day these communication techniques also get some advancement or development day by day. After the emergence of internet the communication of data from one place to another is increasing day by day, because as we all know that internet is very fast mode of data transfer as compared to send your data through post with the help of post-office. As the data over the internet is increasing, it is very necessary that we must ensure to provide the best solution to offer the necessary protection against the data thefts & attacks. For that purpose we use many algorithms, and among these algorithms one of the best algorithms is Encryption algorithm, because it plays an important role in information security systems. But the main problems with such types of algorithms are that they consume a significant amount of computing resources such as CPU time, memory, and battery power. Power Consumption is not a big deal or big issue in case of wired environment but the computing resources in the wireless environment is limited and limited battery power available. As the technology advances it leads to a lot of changes in the processors and memory in the computers, by which they requires a lot of power, or in other words we can say that they needs power to boost up, but battery technology or battery backup technology is increasing at much slower rate, and this cause to forming a "battery gap". As it is like the heart of the electronic devices and as most of the equipment of electronics including computing devices and communication devices also requires a good battery backup. Today, as we all seen that Lap-tops, Palm-tops etc.are generally used instead of Desktop or PC and it is well known that all these are the wireless devices and for these devices the data communication also be wireless and on the contrary, the networking connection will also be wireless. From above as we seen, the increasing demand for services on wireless devices has pushed towards us into an important research which finding ways to overcome these limitation. The paper which I present of the behalf of thesis evaluate or analyze the six most common encryption algorithms namely AES (Rigndael), DES, 3DES, RC2, Blowfish and RC5. Now I’ll try my best to find out the method to analyze the trade-offs between energy and security. There are different approaches used to reduce the energy consumption of security protocols. A comparative study also I planned to be conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed.