Biblio
Filters: Keyword is Weak keys [Clear All Filters]
Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis. 2019 2nd International Conference on Computer Applications Information Security (ICCAIS). :1–6.
.
2019. In most applications, security attributes are pretty difficult to meet but it becomes even a bigger challenge when talking about Grid Computing. To secure data passes in Grid Systems, we need a professional scheme that does not affect the overall performance of the grid system. Therefore, we previously developed a new security scheme “ULTRA GRIDSEC” that is used to accelerate the performance of the symmetric key encryption algorithms for both stream and block cipher encryption algorithms. The scheme is used to accelerate the security of data pass between elements of our newly developed pure peer-to-peer desktop grid framework, “HIMAN”. It also enhances the security of the encrypted data resulted from the scheme and prevents the problem of weak keys of the encryption algorithms. This paper covers the analysis and evaluation of this scheme showing the different factors affecting the scheme performance, and covers the efficiency of the scheme from the security prospective. The experimental results are highlighted for two types of encryption algorithms, TDES as an example for the block cipher algorithms, and RC4 as an example for the stream cipher algorithms. The scheme speeds up the former algorithm by 202.12% and the latter one by 439.7%. These accelerations are also based on the running machine's capabilities.
GISKOP: A Modified Key Scheduling Operation of International Data Encryption Algorithm Using Serpent Key Scheduling. Proceedings of the 2nd International Conference on Computing and Big Data. :53–57.
.
2019. Cryptography is a method of storing and transmitting data in a particular form. Only those for whom it is intended can read, use it, and return it back to the original data by using various techniques. The International Data Encryption Algorithm "IDEA" is a block cipher that works with 64-bit plaintext block and ciphertext blocks and it has a 128-bit input key. This paper describe the designing and implementation of a modified key schedule operation of IDEA called GISKOP. It uses the same number of rounds and output transformation that operates using 128 bit user input plaintext and a modified way of key scheduling operation of 256 bit keys. The modified algorithm uses Serpent key scheduling operation to derive the different sub keys to be used in each rounds. The algorithm was implemented to provide better security on user's password within the Document Management System to protect user's data within the cloud database. It has gone through initial testing and evaluations with very encouraging results.