We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Performance Analysis of BEST and NJJSAA

by Prachi Saxena, Sini Shibhu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 72 - Number 13
Year of Publication: 2013
Authors: Prachi Saxena, Sini Shibhu
10.5120/12555-9138

Prachi Saxena, Sini Shibhu . Performance Analysis of BEST and NJJSAA. International Journal of Computer Applications. 72, 13 ( June 2013), 33-37. DOI=10.5120/12555-9138

@article{ 10.5120/12555-9138,
author = { Prachi Saxena, Sini Shibhu },
title = { Performance Analysis of BEST and NJJSAA },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 72 },
number = { 13 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume72/number13/12555-9138/ },
doi = { 10.5120/12555-9138 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:37:50.695497+05:30
%A Prachi Saxena
%A Sini Shibhu
%T Performance Analysis of BEST and NJJSAA
%J International Journal of Computer Applications
%@ 0975-8887
%V 72
%N 13
%P 33-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapid growing of internet, information security becomes significant to protect secret and personal data. Encryption algorithm plays an important role for data security. In this paper, authors have evaluated the performance of two symmetric key encryption algorithms: BEST and NJJSAA used for data encryption and Analysed the encryption security, evaluated encryption speed for both algorithms. Experimental results show that BEST algorithm runs faster than NJJSAA algorithm while NJJSAA provide more security than BEST on the basis of Avalanche Effect.

References
  1. Akhil Kaushik, Manoj Bamela and AnantKumar "Block Encryption Standard for Transfer of Data" IEEE International Conference on Networking and Information Technology 2010
  2. Neeraj Khanna, Joel James,Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath : "New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm" Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130.
  3. Dragos Trinca, "Sequential and Parallel Cascaded Convolution Encryption with Local Propagation: Toward Future Directions in Cryptography", Proceedings of The third International Conference on information Technology-New Generations. (ITNG. 06), 0-7695-2497- 4 / 2006, IEEE Computer Society.
  4. Ashwak M. AL-Abiachi, Faudziah Ahmad, Ku Ruhana A Competitive Study of Cryptography Techniques over Block Cipher" IEEE UKSim 13th International Conference on Modelling and Simulation 2011.
  5. Data Encryption Standard http://csrc. nist. gov/publications/fips/fips 46-3 /fips- 46-3. pdf
  6. Advanced Encryption Standard http://csrc. nist. gov/publications/fips/fips197/fips- 97. pdf
  7. Adam J. Elbirt, Christof Paar. "An Instruction-Level Distributed Processor for Symmetric-Key Cryptography" IEEE Transactions on Parallel and distributed Systems, Vol. 16, No. 5, May 2005.
  8. G. RAMESH and Prof. Dr. R. UMARANI "UMARAM: A Novel Fast Encryption Algorithm for Data Security in Local Area Network" IEEE ICCCCT'2010
  9. M. Blaze, W. Diffie, R. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Weiner, "Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security," http://www. schneier. com/paper-keylength. html, January 1996.
  10. J. D. Guttman and M. E. Nadel, "What Needs Securing", in Proc. CSFW, 1988, pp. 34-57.
  11. L. A. Gordon and M. P. Loeb, "The economics of information security investment", presented at ACM Trans. Inf. Syst. Secur. , 2002, pp. 438-457.
  12. A. Sorkin, "Lucifer, a Cryptographic Algorithm," Cryptologia, Vol. 8, no. 1,pp. 22-41, Jan. 1984.
  13. "Data Encryption Standard", Federal Information Processing Standards Publication 46-3, Oct. 1999. M. E. SMID and D. K. Branstad. "The data encryption standard: Past and Future" in Proc. IEEE, Vol. 76, no. 5, pp. 550-559, May 1988. Paul Van De Zande, "The Day DES Died," http://www. sans. org/reading_room/whitepapers/vpns/day-des-died_722.
  14. E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystems", presented at J. Cryptology, 1991, pp. 3-72.
  15. D. Coppersmith, "The Data Encryption Standard (DES) and its strength against attacks", presented at IBMJournal of Research and Development, 1994, pp. 243-250.
  16. D. Denning, "The Data Encryption Standard: Fifteen Years of Public Scrutiny," in Proc. Sixth Annual Computer Security Applications Conference, pp. 10-15, Dec. 1990.
  17. M. Matsui, "The First Experimental Cryptanalysis of the Data Encryption Standard", in Proc. CRYPTO, 1994, pp. 1-11.
Index Terms

Computer Science
Information Sciences

Keywords

Computer Security Encryption Decryption Algorithm Symmetric Key BEST NJJSA