IMPROVE THE CLOUD DATA SECURITY ARCHITECTURE USING SYMMETRIC KEY ALGORITHM

##plugins.themes.bootstrap3.article.main##

KARTHIKEYAN s

Abstract

There exist several types of cryptographic systems. In symmetric cryptography, both sending and receiving parties share the same secret key. While symmetric cryptography is computationally efficient, it requires that the shared secret key is distributed to all recipients in a secure way. Public-key cryptography, also known as asymmetric cryptography, uses two keys: a public key that can be freely shared and a private key, which is mathematically tied to the public key. In public-key signature schemes, the creator of the content uses the private key to sign the content. Afterwards the public key and the signature are distributed along with the content, allowing the recipient to verify the content's authenticity. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This thesis provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, and Blowfish. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm.

##plugins.themes.bootstrap3.article.details##

Section
Articles