(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 6, September2010
implemented due to the following factors against whichseveral security measures had to be taken up:1.Reading data2.Manipulating and modifying data3.Illegal use of files4.Corrosion of data files5.Distortion of data transmissionThe main issue of (1) is
secrecy and confidentiality
has always played an important role indiplomatic and military matters. Often Information muststore or transferred from one place to another without beingexposed to an opponent or enemy. Key management is alsorelated to
. This deals with generating,distributing and storing keys. Items (2-4) are primarilyconcerned with
. Often the expression
isused as a measure of genuineness of data. Also computerfiles and networks must be protected against intruders andUnauthorized. Item 5 is different aspect of the security of theinformation.
AES algorithms are symmetric cipher algorithmswith variable key sizes and blocks, also with number of rounds to encrypt and decrypt the data than DES algorithms.There are numerous algorithms in AES. From them we havechosen the following algorithms for finding the performanceanalysis on time, memory, key sizes, key setup time,encryption, and decryption and so on.The Chosen algorithms are as:
MARS encryption algorithm
TABLE I. G
MARSExtendedFeistel32Variable Rotation,MultiplicationNon Cryptic RoundsRC6Feistel20Variable Rotation,MultiplicationRijndaelSquare10,12,14SerpentSP Network32BitsliceTwofishFeistel16
No operational modes are currently defined for theAES cipher. The Cipher Block Chaining (CBC) mode iswell-defined and well-understood for symmetric ciphers, andis currently required for all other ESP ciphers. This articlespecifies the use of the AES cipher and the other finalists inCBC mode within ESP. This mode requires an
(IV) that is the same size as the block size. Use of arandomly generated IV prevents generation of identicalcipher text from packets which have identical data that spansthe first block of the cipher algorithm's block size.The IV is XOR'd with the first plaintext block before it isencrypted. Then for successive blocks, the previous ciphertext block is XOR'd with the current plaintext, before it isencrypted. For the use of CBC mode in ESP with 64-bitciphers.
Some cipher algorithms allow for variable sized keys,while others only allow specific, pre-defined key sizes. Thelength of the key typically correlates with the strength of thealgorithm; thus larger keys are usually harder to break thanshorter ones. This article stipulates that all key sizes MUSTbe a multiple of 8 bits.The default key size that implementations MUST support128 bits. In addition, all of the ciphers accept key sizes of 192 and 256 bits.
TABLE II. K
MARS128 –448*128RC6Variable up to 2040128Rijndael128,192,256128SerpentVariable up to 256**128Two fishVariable up to 256***128
MARS key lengths must be multiples of 32 bits.** Serpent keys are always padded to 256 bits. Thepadding consists of a "1" bit followed by "0" bits.*** Twofish keys, other than the default sizes, are alwayspadded with "0" bits up to the next default size.
Some cipher algorithms have weak keys or keys thatMUST not be used due to their interaction with some aspectof the cipher's definition. If weak keys are discovered for theAES or any of the other finalists, then weak keys SHOULDbe checked for and discarded when using manual keymanagement. When using dynamic key management, weak key checks SHOULD NOT be performed as they are seen asan unnecessary added code complexity that could weaken theintended security.
4)Block Size and Padding
All of the algorithms described in this document use ablock size of sixteen octets (128 bits), mandatory for theAES. Some of the algorithms can handle larger block sizesas well. Padding is required by the algorithms to maintain a16-octet (128-bit) blocksize. Padding MUST be added, suchthat the data to be encrypted has a length that is a multiple of 16 octets. Because of the algorithm specific paddingrequirement, no additional padding is required to ensure thatthe cipher text terminates on a 4-octet boundary (i.e.maintaining a 16-octet blocksize guaranteesthat the ESP Pad