EST
  • Home
  • Archives
  • Volume 7
  • Number 8
  • Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 8

Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
 

PrintEmail

journal image
 Download
1299
  • Kazeem B. Adedeji and John O. Famoriji 2014. Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel. International Journal of Applied Information Systems. 7, 8 (September 2014), 6-10. DOI=http://dx.doi.org/10.5120/ijais451221
  • @article{10.5120/ijais2017451568,
    author = {Kazeem B. Adedeji and John O. Famoriji},
    title = {Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel},
    journal = {International Journal of Applied Information Systems},
    issue_date = {September 2014},
    volume = {7},
    number = {},
    month = {September},
    year = {2014},
    issn = {},
    pages = {6-10},
    numpages = {},
    url = {/archives/volume7/number8/673-1221},
    doi = { 10.5120/ijais14-451221},
    publisher = { xA9 2013 by IJAIS Journal},
    address = {}
    }
    
  • %1 451221
    %A Kazeem B.  Adedeji
    %A John O.  Famoriji
    %T Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel
    %J International Journal of Applied Information Systems
    %@ 
    %V 7
    %N 
    %P 6-10
    %D 2014
    %I  xA9 2013 by IJAIS Journal
    

Abstract

Key size of an algorithm is an important aspect of cryptographic technique as high key bits is considered more secure than low key bits. Different research work has been conducted to have secure and reliable protection techniques for transmitting data over a communication networks. This paper shows the effects of varying the key size on Advanced Encryption Standard (AES) algorithm for encryption of data. AES algorithm with key sizes of 128 bits, 192 bits and 256 bits were considered. The performance of the system were examined based on the encryption and decryption time, throughput, average data rate and the central processing units (CPU) power consumption. Consequently, AES with key size of 128 bits has a lower encryption time, higher throughput and low CPU power consumption than AES with 192 bits and 256 bits keys.

References

  1. A. R. Choudhar and A. Sekelsky," Securing IPv6 network infrastructure: A new security model", IEEE International conference on Technologies for Homeland Security, 2013.
  2. A. Naser, H. Fatemeh, and K. Riza, "Developing a new hybrid cipher using AES, RC4 and SERPENT for encryption and Decryption", International Journal of Computer Applications Vol. 69, No. 8, 2013.
  3. S. William, 2005 "Cryptography and Network Security", 4th Edition, Prentice-Hall Inc. , pp. 58-309.
  4. V. S. Janakiraman, R. Ganesan, and M. Gobi M, "Hybrid Cryptographic Algorithm for Robust Network Security", ICGST-CNIR, Vol. 7, 2007.
  5. A. Himani and S. Marisha, "Implementation and analysis of various Symmetric Cryptosystems", Indian Journal of Science and Technology, Vol. 13, 2012, pp. 1173-1176.
  6. Parliamentary Office of Science & Technology Post note, 2006 "Data Encryption", No. 270, p 2
  7. K. M. Anand, and S. Karthikeyan, "Investigating the efficiency of Blowfish and Rejindael (AES) Algorithms", International Journal of Computer netweorks and Information Security, Vol. 2, 2012, pp. 22-28.
  8. G. A. Marin, Network Security basics, IEEE Security and Privacy, 1(3), 2005, p 68. .
  9. M. Edney, "Real 802. 11 Security: Wi-Fi Protected Access and 802. 11i", Addison Wesley Inc. , New York, 2003, p. 7
  10. Prasithsangaree, P. and Krishnamurthy, P. (2003) "Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs", IEEE GLOBECOM, pp. 1445-1449.
  11. Lenstra A. K. and Verheul E. R, " Selecting Cryptographic Key sizes", Journal of Cryptography, vol. 14 No. 4, pp. 255-293, 2001.
  12. M. Serge, and E. T. Stafford, "Cryptanalysis of Rc4 like Ciphers". In Proceedings, Workshop in Selected Areas of Cryptography, SAC '98. 1998.
  13. R. P. Jignesh, S. B. Rajesh, and K. Vikas, "Hybrid Security Algorithm for Data Transmission using AES-DES", International Journal of Applied Information Systems, Vol. 2, 2012, USA, pp. 15-19.
  14. Eric C. (2007), "Advanced Encryption Standard", Backshore Communications, United States.
  15. K. Aman, J. Sudesh, and M. Sunil, "Comparative Analysis between DES and RSA Algorithm", International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, 2012, pp. 386-389.

Keywords

AES, Average data rate, CPU power consumption, Cryptography, Encryption, Key, Throughput.

Index Terms

Computer Science
Information Sciences