CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

SECURED ENCRYPTION - Concept and Challenge

by Govind Singh Tanwar, Ganesh Singh, Vishal Gaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 2 - Number 3
Year of Publication: 2010
Authors: Govind Singh Tanwar, Ganesh Singh, Vishal Gaur
10.5120/637-892

Govind Singh Tanwar, Ganesh Singh, Vishal Gaur . SECURED ENCRYPTION - Concept and Challenge. International Journal of Computer Applications. 2, 3 ( May 2010), 89-94. DOI=10.5120/637-892

@article{ 10.5120/637-892,
author = { Govind Singh Tanwar, Ganesh Singh, Vishal Gaur },
title = { SECURED ENCRYPTION - Concept and Challenge },
journal = { International Journal of Computer Applications },
issue_date = { May 2010 },
volume = { 2 },
number = { 3 },
month = { May },
year = { 2010 },
issn = { 0975-8887 },
pages = { 89-94 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume2/number3/637-892/ },
doi = { 10.5120/637-892 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:49:59.442920+05:30
%A Govind Singh Tanwar
%A Ganesh Singh
%A Vishal Gaur
%T SECURED ENCRYPTION - Concept and Challenge
%J International Journal of Computer Applications
%@ 0975-8887
%V 2
%N 3
%P 89-94
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper contains a complications related to access systems and their functionality. Several cryptographic algorithms were implemented using the public library Lib-Tom-Crypt and benchmarked on an ARM7-processor platform. The common coding schemes in use were ECC and RSA (asymmetric coding schemes), AES, 3DES and two fish (symmetric algorithms). The benchmark considered both code size and speed of the algorithms. The two asymmetric algorithms, ECC and RSA, are possible to be used in an ARM7 based access system. Although, both technologies can be configured to finish the calculations within a reasonable time-frame of 10 Sec.

References
  1. Linus Fredriksson and Martin Gyllensten. Modellering av delvis kända bilder med hjälpav bilder. URL:http://www.divaportal.org/diva/getDocument?urn_nbn_se_liu_diva-67241__fulltext.pdf, 2007.
  2. Securitas AB. Passersystem - generelltom passersystem. URL: http://www.securitassystems.se/97888027-1404-4b55-b007-5c51bb545b26.fodoc, 2007.
  3. Bruce Schneier. Attack trees - modeling security threats. URL:http://www.schneier.com/paper-ttacktrees-ddj-ft.html, 1999.
  4. Bruce Schneier Niels Ferguson. Practical Cryptography. Number ISBN 0-471-22357-3.
  5. David Kahn. The Code-Breakers. Number ISBN 0-684-83130-9.
  6. Keshava P. Subramanya. Brute force searches in cryptography. URL:http://www.cs.ucsb.edu/~keshava/bruteforce/bruteforce.html, 2007.
  7. National Institute of Standards, Technology, and the agency of Commerce Department´s Technology Administration. Commerce department announces winner of global information security competition. URL: http://www.nist.gov/public_affairs/releases/g00-176.htm, 2007.
  8. Federal Information Processing Standards Publications. Announcing the advanced encryption standard (aes), fips 197. URL:http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf, 2001.
  9. National Institute of Standards and Morris Dworkin Technology. Recommendation for block cipher modes of operation methods and techniques, nist special publication 800-38a. URL: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Public ARM7-processor ECC RSA