Abstract
Over a few years, there is rapid increase of exchange of data over the net has brought data confidentiality and its privacy to the fore front. Data confidentiality can be achieved by implementing cryptography algorithms during transmission of data which confirms that data remains secure and protected over an insecure network channel. In order to ensure data confidentiality and privacy, cryptography service encryption is used which makes data in unreadable form while the reverse process rearranges data in readable form and known as decryption. All encryption algorithms are intended to provide confidentiality to data, but their performance varies depending on many variables such as key size, type, number of rounds, complexity and data size used. In addition, although some encryption algorithms outperform others, they have been found to be prone to particular attacks. This paper reviews and summarizes the various common hybrid cascaded n-tier encryption models. Additionally, this paper compares and analyzes the performance of common hybrid cascaded 2-tier and 3-tier encryption models obtained during simulation based on encryption/decryption time, avalanche effect and throughput. The models compared with AES are 2-tier models (AES-TWOFISH, AES-BLOWFISH, TWOFISH-AES, BLOWFISH-AES, AES-SERPENT and SERPENT-TWOFISH) and 3-tier models (DES-BLOWFISH-AES, AES-TWOFISH-SERPENT and SERPENT-TWOFISH-AES). The hybrid cascaded model like AES-TWOFISH, AES-BLOWFISH and SERPENT-TWOFISH-AES are better hybrid models with respect to throughput and avalanche effect.
Highlights
Days, we are in the information overflow over internet, where we are producing, storing and distributing a variety of digital data every day
Confidentiality of data entails securing data from unwanted disclosure or fraud. It can be accomplished by data encryption and decryption with the aid of cryptography
Cryptography helps to protect sensitive data or records on a hard disc or as it is sent by an unreliable medium of communication
Summary
We are in the information overflow over internet, where we are producing, storing and distributing a variety of digital data every day. The hybrid model involving cascaded encryption (multiple ciphers) can enhance the security of a cryptographic system, especially if the different algorithms along with different keys are autonomously chosen and used. The hybrid model provides better security features for small commands used in robotic commands They have used asymmetric algorithm for encrypting robotic command due to its small size. Oishi et al, 2016 have designed cascaded hybrid algorithm of BLOWFISH and Rivest Cipher 6 (RC6) for Wi-Fi security They have observed that proposed algorithm takes provides better efficiency like BLOWFISH with respect to encryption decryption processing time and secured as AES. These models mainly perform cascaded encryption using different algorithms to increase the complexity in generating ciphertext
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Turkish Journal of Computer and Mathematics Education (TURCOMAT)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.