A Robust Approach for Mixed Technique of Data Encryption Between DES and RC4 Algorithm
DOI:
https://doi.org/10.31642/JoKMC/2018/030206Keywords:
RC4, DES, combined DES & RC4, combined Approach, Data Encryption, complexity.Abstract
In this research, the well-known encryption algorithms in the encryption Systems, namely DES & RC4 and the advantages and disadvantages of each algorithm are reviewed and evaluated. These two algorithms are combined to produce of new algorithm which is more efficient unscrambling due to the increasing of the level of complexity that make it highly resistance to several attacks. The new algorithm is implemented to show its efficiency in term of time complexity, (i.e. Breaking the code will be much more complicated than if it would have been occurring through the use of each algorithm individually), this process can be achieved with a very small time difference (approximately neglected in the encryption process(. When this algorithm is applied and tested in practice the following result has been obtained: When a block is encrypted using the DES algorithm, the time spent may be (0.000034) milliseconds, but when using the new algorithm to encrypt the same block, the time taken will be about (0.000042) milliseconds. To encrypt 1024 blocks using the DES algorithm, it will take a time of (0.0406),while by using the new algorithm the time taken for encryption is only (0.051). This gives very little increase in time compared to increasing of complexity obtained. Since the new algorithm combining from the two previous, ones allows us to encrypt each block with a key differs from the other one (i.e. each block is encrypted with a different key depending on the preceding block), making it very difficult to break the code leading to an increase in security and information protection against decoding.Downloads
References
W. Stallings, 2005, "THE RC4 STREAM ENCRYPTIION ALGORIITHM", Available online at www.IEEE.com.
A. Mousa, and A. Hamad, 2006, "Evaluation of the RC4 Algorithm for Data Encryption", International journal of computer sciences and applications.
A. .Jeeva, V. Palanisamy, and K. Kanagaram, 2012, "COMPARATIVE ANALYSIS OF PERFORMANCE EFFICIENCY AND SECURITY MEASURES OF SOME ENCRYPTION ALGORITHMS ",International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 3, May-Jun 2012, pp.3033-3037.
Q. Galvane and B. Uzel, 2012, "Cryptography - RC4 Algorithm".
L. Stošić and M. Bogdanović, 2012, "RC4 stream cipher and possible attacks on WEP", (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 3, 2012. DOI: https://doi.org/10.14569/IJACSA.2012.030319
S. Kruti and B. Gambhava, 2012, "New Approach of Data Encryption Standard Algorithm", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March.
S. Singh, S. K. Maakar and S. Kumar, 2013, "A Performance Analysis of DES and RSA Cryptography", International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org, Volume 2, Issue 3, May–June 2013 ISSN 2278-6856.
D. and B. Kapoor, 2014, "State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher", International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.4, DOI:10.5121/ijcsa.2014.4403, Department of Computer Science Engineering, Chitkara University, Himachal Pradesh, India. DOI: https://doi.org/10.5121/ijcsa.2014.4403
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Tameem Hameed Obaida, Dhafar Hamed Abd
This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.