Wednesday, 4 March 2009

Wseas Transactions

New Subscription to Wseas Transactions

The following information was submitted:

Transactions: WSEAS TRANSACTIONS ON COMPUTER RESEARCH
Transactions ID Number: 32-304
Full Name: Usama Naseer
Position: Researcher
Age: ON
Sex: Male
Address: D-890 Satellite Town Rawalpindi, Islamabad
Country: PAKISTAN
Tel: 923215016006
Tel prefix:
Fax:
E-mail address: 5016006@gmail.com
Other E-mails: 5016006@gmail.com
Title of the Paper: How to Evaluate Cryptographic Algorithms
Authors as they appear in the Paper: Usama Naseer, Mureed Hussain
Email addresses of all the authors: 5016006@gmail.com
Number of paper pages: 10
Abstract: Today there is a need for techniques to secure important information and to communicate securely with one another. National Institute of Standards and Technology (NIST) resolved this issue by introducing encryption/decryption algorithms such as Data Encryption Standard (DES) and Advance Encryption Standard (AES). DES was replaced by AES due to outdated design and standards. AES has been updated with five finalists but still there is a need for an ideal candidate. The main characteristics are to identify and differentiate one encryption algorithm from another on the basis of its design, implementation, efficiency and its ability to secure the protected data against attacks. The aim of this paper is to survey the techniques of evaluation of strength and weakness of different cryptographic algorithms to find out the ideal cryptographic algorithm. The comparison has been taken place by several methods, tests, implementations on different software and hardware platforms!
, by processing different sizes of key and data blocks to evaluate the algorithm's security, randomness, minimum secure rounds against attacks, encryption/decryption speed and efficiency. The AES finalists (RC6, MARS, Rijndael, Serpent and Two fish) are now gaining fast acceptance around the world. That's why this paper is more focused on AES finalists to evaluate its suitability according to above mentioned characteristics and to find out the trade off between these characteristics. The ideal candidate must have to fulfill these characteristics to proof its strength against attacks.
Keywords: How to Evaluate Cryptographic Algorithms
EXTENSION of the file: .doc
Special (Invited) Session:
Organizer of the Session:
How Did you learn about congress:
IP ADDRESS: 203.99.182.58