Abstract

In modern communication systems, secret keys are used to secure sensitive information such as personal data, financial transactions and government secrets. However, the security of these systems is only as strong as the secrecy of the key utilized for encrypting and decrypting the data. The use of easy guessable or compromised keys can lead to unauthorized access, data breaches, and identity theft. Additionally, the distribution and management of secret keys present challenges such as key generation, key distribution, key revocation, and key renewal, which can be complex and costly. Therefore, finding secure and efficient methods to manage secret keys is crucial for ensuring the confidentiality, integrity, and availability of sensitive information in today's digital age. Therefore, to improve the security of the symmetric encryption algorithms, The new method to encrypt and decrypt the difference size files using multiple keys is proposed. In addition to investigate the impact of using multiple keys on the security and performance of symmetric algorithms. However, the multiple keys are generated previously using MD5 and SHA2. The chosen algorithms in this study are Blowfish and CAST, with chosen three modes of operation: CBC, CFB and CTR. The results presented in the paper demonstrated that the Blowfish algorithm with generated multiple keys outperforms in the CBC mode despite has the most encryption and decryption time-consuming and memory usage. Where the randomness of Blowfish with mode CBC and CTR is the best throughput then it follows Blowfish with mode CFB.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.