Total views : 118

Data Analysis between Various Symmetric Encryption Algorithms on Wireless Security

Affiliations

  • Department of Computer Science, Dr. N. G. P Arts and Science College, Coimbatore – 641048, Tamil Nadu,, India
  • Department of Computer science, Government Arts College, Coimbatore – 641018, Tamil Nadu,, India

Abstract


Security on the wireless networks is the problem analyzed in this paper based on various symmetric encryption algorithms. This research work is mainly designed to achieve safety measures in wireless network. Symmetrical encrypting algorithms use identical keys for processing. This research works analysis data security based on Advanced Encryption Standard (AES) and Rivest Cipher (RC4) encryption algorithms on various platforms and calculates the performance based on time and memory consumption. The given text was encrypted and decrypted using various key sizes and concluded that compared with RC4, AES is more secure for both encryption and decryption while data transmission. The research analysis have been carried for 16 byte data and proved that AES is approximately 3 times faster than RC4 algorithm for encryption, similarly the decryption is double that of encryption. The memory space require for AES is more than RC4 because AES consist of more routines to calculate values for each rounds. This helps the users to choose the encryption techniques depending on their environment and the need for data protection while transmission.

Keywords

Authentication, Advanced Encryption Algorithm, Rivest Cipher4, Wireless Security, WEP, WPA.

Full Text:

 |  (PDF views: 119)

References


  • Wi-Fi Alliance. “Wi-Fi Protected Access – Overview”. URL: http://www.wi-fi.com/OpenSection/pdf/Wi- Fi_Protected_Access_Overview.pdf
  • Stallings W. Cryptography and network security: Principles and practice. Prentice Hall, Upper Saddle River, New Jersey; 2003.
  • Knudsen LR. Truncated and higher order differentials. Fast Software Encryption, LNCS 1008, Preneel B editors. Springer-Verlag; 1995. p. 196–211.
  • Borisov N, Goldberg I, Wagner D. Intercepting mobile communications: The insecurity of 802.11. 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy; 2001 July 16–21.
  • Mousa A, Hamad A. Evaluation of the RC4 algorithm for data encryption. International Journal of Computer Science and Application. 2006 Jun; 3(2):44–56.
  • Wong S. The evolution of wireless security in 802.11 networks: WEP, WPA and 802.11 standards. GIAC Security Essentials Certification (GSEC) Practical; 2003.
  • Daemen J, Rijmen V. AES Proposal: Rijndael. The Rijndael Block Cipher. 1999 Sep 3; 2:4–45.
  • Daemen J, Knudsen LR, Rijmen V. The block cipher square. In: Biham E editors. International Workshop on Fast Software Encryption, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg. 1997; 1267:149–65.
  • Lee A. Guideline for implementing cryptography in the federal government. National Institute of Standards and Technology (NIST) Special Publication 800-21, Gaithersburg, MD, United States; 1999 Nov.
  • Barka ES, Mohamed EE, Hayawi K. End-to- end security solutions for WLAN: A performance analysis for the underlying encryption algorithms in the lightweight devices. In the Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC), Vancouver, British Columbia, Canada; 2006 July 3–6. p. 1295–300.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.