Abstract
Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication. This paper is devoted to the security and attack aspects of cryptographic techniques. The simulation based information content test such as Entropy, Floating Frequency, Histogram, N-gram, Autocorrelation and Periodicity on ciphers is done. The simulation based Randomness test such as Frequency test, Pokers test, Serial test, Long run test on ciphers are done using CrypTool. Finally, we have benchmarked proposed MAES cryptographic algorithm in search for the best compromise in security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kahate, A.: Cryptography and Network security. Tata Mc Graw Hill Publishing Company Limited (2003)
Lincke, S.J., Hollan, A.: Network Security: Focus on Security, Skills, and Stability. In: Proceedings of 37th ASEE/IEEE Frontiers in Education Conference
Zhang, L., White, G.B.: Anomaly Detection for Application Level Network Attacks Using Payload Keywords. In: Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007 (2007)
Khalifa, O.O., Rafiqul Islam, M., Khan, S., Shebani, M.S.: Communications Cryptography. In: Proceedings RF and Microwave Conference, RFM 2004 (2004)
Nadeem, A., Younus Javed, M.: A performance comparison of data Encryption Algorithm. In: Global Telecommunications Conference Workshops, Globe COM Workshops 2004. IEEE, Los Alamitos (2004)
Wang, Y., Hu, M.: Timing Evaluation of known cryptographic Algorithm. In: International Conference on Computational Intelligence and security (2009)
Singh, Y., Choba, Y.: Information Theory Tests based Performance Evaluation of Cryptographic Techniques. In: Proceedings of International Journal of Information Theory and Knowledge Management, vol. 1(2), pp. 475–483.
Khaddour, M., Wang, Z., Hammami, O.: Student Member, IEEE, Student Member, IEEE and Member, IEEE , Performance Evaluation and Analysis of Parallel Software Implementations of TDES on a16-PE Embedded Multiprocessor Platform. In: Proceedings of 2009 ESRGroups, France (2009)
Ahmad, M., Izharuddin: Randomness Evaluation of Stream Cipher for Secure Mobile Communication. In: Proceedings in 1st International Conference on Parallel, Distributed and Grid Computing, PDGC - 2010 (2010)
Orner, S., Mansoor, S.S.P.: Performance analysis of Stream and Block cipher algorithms. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE (2010)
Ammar, A., El Sherbini, A., Ashour, I., Shiple, M.: Random Data Encryption Algorithm. In: Twenty Second National Radio Science Conference (NRSC 2005), Cairo-Egypt, March 15-17 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kalra, R., Singhal, A., Kaler, R., Singhal, P. (2011). Performance Analysis of Proposed MAES Cryptographic Techniques. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds) High Performance Architecture and Grid Computing. HPAGC 2011. Communications in Computer and Information Science, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22577-2_43
Download citation
DOI: https://doi.org/10.1007/978-3-642-22577-2_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22576-5
Online ISBN: 978-3-642-22577-2
eBook Packages: Computer ScienceComputer Science (R0)