Skip to main content

Performance Analysis of Proposed MAES Cryptographic Techniques

  • Conference paper
High Performance Architecture and Grid Computing (HPAGC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 169))

  • 3103 Accesses

Abstract

Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication. This paper is devoted to the security and attack aspects of cryptographic techniques. The simulation based information content test such as Entropy, Floating Frequency, Histogram, N-gram, Autocorrelation and Periodicity on ciphers is done. The simulation based Randomness test such as Frequency test, Pokers test, Serial test, Long run test on ciphers are done using CrypTool. Finally, we have benchmarked proposed MAES cryptographic algorithm in search for the best compromise in security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kahate, A.: Cryptography and Network security. Tata Mc Graw Hill Publishing Company Limited (2003)

    Google Scholar 

  2. Lincke, S.J., Hollan, A.: Network Security: Focus on Security, Skills, and Stability. In: Proceedings of 37th ASEE/IEEE Frontiers in Education Conference

    Google Scholar 

  3. Zhang, L., White, G.B.: Anomaly Detection for Application Level Network Attacks Using Payload Keywords. In: Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007 (2007)

    Google Scholar 

  4. Khalifa, O.O., Rafiqul Islam, M., Khan, S., Shebani, M.S.: Communications Cryptography. In: Proceedings RF and Microwave Conference, RFM 2004 (2004)

    Google Scholar 

  5. Nadeem, A., Younus Javed, M.: A performance comparison of data Encryption Algorithm. In: Global Telecommunications Conference Workshops, Globe COM Workshops 2004. IEEE, Los Alamitos (2004)

    Google Scholar 

  6. Wang, Y., Hu, M.: Timing Evaluation of known cryptographic Algorithm. In: International Conference on Computational Intelligence and security (2009)

    Google Scholar 

  7. Singh, Y., Choba, Y.: Information Theory Tests based Performance Evaluation of Cryptographic Techniques. In: Proceedings of International Journal of Information Theory and Knowledge Management, vol. 1(2), pp. 475–483.

    Google Scholar 

  8. Khaddour, M., Wang, Z., Hammami, O.: Student Member, IEEE, Student Member, IEEE and Member, IEEE , Performance Evaluation and Analysis of Parallel Software Implementations of TDES on a16-PE Embedded Multiprocessor Platform. In: Proceedings of 2009 ESRGroups, France (2009)

    Google Scholar 

  9. Ahmad, M., Izharuddin: Randomness Evaluation of Stream Cipher for Secure Mobile Communication. In: Proceedings in 1st International Conference on Parallel, Distributed and Grid Computing, PDGC - 2010 (2010)

    Google Scholar 

  10. Orner, S., Mansoor, S.S.P.: Performance analysis of Stream and Block cipher algorithms. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE (2010)

    Google Scholar 

  11. Ammar, A., El Sherbini, A., Ashour, I., Shiple, M.: Random Data Encryption Algorithm. In: Twenty Second National Radio Science Conference (NRSC 2005), Cairo-Egypt, March 15-17 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kalra, R., Singhal, A., Kaler, R., Singhal, P. (2011). Performance Analysis of Proposed MAES Cryptographic Techniques. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds) High Performance Architecture and Grid Computing. HPAGC 2011. Communications in Computer and Information Science, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22577-2_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22577-2_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22576-5

  • Online ISBN: 978-3-642-22577-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics