Open Access Open Access  Restricted Access Subscription Access

Implementation and Analysis of Various Symmetric Cryptosystems


Affiliations
1 E & Tc. Department, SSCET, Bhilai-490020, Chhattisgarh, India
 

This paper implements some of the widely used symmetric encryption techniques i.e. data encryption standard (DES), triple data encryption standard (3DES), advanced encryption standard (AES), BLOWFISH and RC4 in MATLAB software. After the implementation, these techniques are compared on some points. These points are avalanche effect due to one bit variation in plaintext keeping the key constant, avalanche effect due to one bit variation in key keeping the plaintext constant, memory required for implementation and simulation time required for different message lengths.

Keywords

DES, 3DES, AES, Blowfish, RC4, Encryption, Decryption, Ciphertext, Deciphertext, Plaintext
User

  • Brian A. Carter, Ari Kassin and Tanja Magoc (2007) Symmetric cryptosystems and symmetric key management. CiteSeerX. 10.1.1.135.1231.
  • Grover D (1998) Forensic copyright protection. The computer Law & Security Report, 14, 121–122.
  • Pratap R (2004) Getting started with MATLAB, 6. Oxford University Press.
  • Schneier B (1993) Description of a new variablelength key, 64-bit block Cipher (Blowfish), Springer- Verlag, 191-204.
  • Schweighofer E (1997) Downloading information filtering and copyright. Info. & Commun. Technol. Law, 6 (2) 121-135.

Abstract Views: 498

PDF Views: 147




  • Implementation and Analysis of Various Symmetric Cryptosystems

Abstract Views: 498  |  PDF Views: 147

Authors

Himani Agrawal
E & Tc. Department, SSCET, Bhilai-490020, Chhattisgarh, India
Monisha Sharma
E & Tc. Department, SSCET, Bhilai-490020, Chhattisgarh, India

Abstract


This paper implements some of the widely used symmetric encryption techniques i.e. data encryption standard (DES), triple data encryption standard (3DES), advanced encryption standard (AES), BLOWFISH and RC4 in MATLAB software. After the implementation, these techniques are compared on some points. These points are avalanche effect due to one bit variation in plaintext keeping the key constant, avalanche effect due to one bit variation in key keeping the plaintext constant, memory required for implementation and simulation time required for different message lengths.

Keywords


DES, 3DES, AES, Blowfish, RC4, Encryption, Decryption, Ciphertext, Deciphertext, Plaintext

References





DOI: https://doi.org/10.17485/ijst%2F2010%2Fv3i12%2F29854