Abstract

Over a few years, there is rapid increase of exchange of data over the net has brought data confidentiality and its privacy to the fore front. Data confidentiality can be achieved by implementing cryptography algorithms during transmission of data which confirms that data remains secure and protected over an insecure network channel. In order to ensure data confidentiality and privacy, cryptography service encryption is used which makes data in unreadable form while the reverse process rearranges data in readable form and known as decryption. All encryption algorithms are intended to provide confidentiality to data, but their performance varies depending on many variables such as key size, type, number of rounds, complexity and data size used. In addition, although some encryption algorithms outperform others, they have been found to be prone to particular attacks. This paper reviews and summarizes the various common hybrid cascaded n-tier encryption models. Additionally, this paper compares and analyzes the performance of common hybrid cascaded 2-tier and 3-tier encryption models obtained during simulation based on encryption/decryption time, avalanche effect and throughput. The models compared with AES are 2-tier models (AES-TWOFISH, AES-BLOWFISH, TWOFISH-AES, BLOWFISH-AES, AES-SERPENT and SERPENT-TWOFISH) and 3-tier models (DES-BLOWFISH-AES, AES-TWOFISH-SERPENT and SERPENT-TWOFISH-AES). The hybrid cascaded model like AES-TWOFISH, AES-BLOWFISH and SERPENT-TWOFISH-AES are better hybrid models with respect to throughput and avalanche effect.

Highlights

  • Days, we are in the information overflow over internet, where we are producing, storing and distributing a variety of digital data every day

  • Confidentiality of data entails securing data from unwanted disclosure or fraud. It can be accomplished by data encryption and decryption with the aid of cryptography

  • Cryptography helps to protect sensitive data or records on a hard disc or as it is sent by an unreliable medium of communication

Read more

Summary

Introduction

We are in the information overflow over internet, where we are producing, storing and distributing a variety of digital data every day. The hybrid model involving cascaded encryption (multiple ciphers) can enhance the security of a cryptographic system, especially if the different algorithms along with different keys are autonomously chosen and used. The hybrid model provides better security features for small commands used in robotic commands They have used asymmetric algorithm for encrypting robotic command due to its small size. Oishi et al, 2016 have designed cascaded hybrid algorithm of BLOWFISH and Rivest Cipher 6 (RC6) for Wi-Fi security They have observed that proposed algorithm takes provides better efficiency like BLOWFISH with respect to encryption decryption processing time and secured as AES. These models mainly perform cascaded encryption using different algorithms to increase the complexity in generating ciphertext

Tier 2 Tier
Tier 2 Tier 2 Tier 3 Tier 3 Tier
Experimental Setup and Performance Analysis
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.