Research Article
BibTex RIS Cite
Year 2020, Volume: 6 Issue: 2, 13 - 24, 31.10.2020
https://doi.org/10.19072/ijet.755570

Abstract

References

  • N. Alhalafi, and P. Veeraraghavan, “Privacy and Security Challenges and Solutions in IOT: A review”, Int. Conf. on Smart Power & Internet Energy Systems, Melbourne, Australia, pp 1-5, 25 April 2019.
  • V. Shree, Z. Antony, and N. Jayapandia,” Enhanced Data Security Architecture in Enterprise Network”, Springer Int. Conf. on Computer Networks, Big data and IoT, India , pp. 857-864, Dec. 2019.
  • M. B. Yassein, et al., “Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithm”, Int. Conf. on Engineering and Technology, Antalya, Turkey, 2017.
  • W.N.A. Ruzai, M.R.K. Ariffin, M.A. Asbullah, Z. Mahad, and A. Nawaw, “On the Improvement Attack Upon Some Variants of RSA Cryptosystem via the Continued Fractions Method”, IEEE Access, Vol. 8, pp.1-10, April, 2020.
  • A. Alabaichi, F. Ahmed, and R. Mahmod, “Security Analysis of Blowfish algorithm”, IEEE Second Int. Conf. on Informatics & Applications (ICIA), Poland, pp. 12-18, 23 Sept. 2013.
  • S. Mukherjee, D. Ganguly, and S. Naskar, “A New Generation Cryptographic Technique”, International Journal of Computer Theory and Engineering, Vol. 1, No. 3, pp. 284-287, August 2009.
  • G. Mustafa, et al., “A Review of Data Security and Cryptographic Techniques in IoT based devices”, The 2nd Int. Conf. on Future Networks & Distributed Systems, Amman, Jordan, June 26–27, 2018.
  • D. L. Kumar, A. R. Reddy, and S. A. K. Jilani, “Implementation of 128-bit AES algorithm in MATLAB”, International Journal of Engineering Trends and Technology, Vol. 33 No. 3, pp. 126-129, March 2016.
  • S. Chandra, et al., “A comparative survey of symmetric and asymmetric key cryptography”, IEEE Int. Conf. on Electronics, Communication and Computational Engineering, India, pp. 83-93, 2014.
  • J. Messy, H. Kh and K. Kuregian, Nomination of SAFER+ as a candidate algorithm for the AES, 1998. http://csrc.nist.gov/archive/aes/round1.
  • B. J. Babu, D. K. M. Tech, and R. V. V. Krishna, “Design of SAFER+ Encryption Algorithm for Bluetooth Transmission”, International Journal of Innovative Technology and Research, Vol. No.3, Issue 1, pp. 1864 – 1867, Dec. 2015.
  • A. Schubert, and W. Anheier, “Efficient VLSİ implementation of modern symmetric block ciphers”, 6th IEEE Int. Conf. on Electronics, Circuits and Systems, Vol. 2, Cyprus, pp. 757-760, Sept. 1999,
  • M. K. Mahmood, F. M. Al-Naima, “Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries”, Wireless Sensor Network, Vol. 2, pp. 520-527, July 2010.
  • M.K. Mahmood, L. S. Abdulla, A. H. Mohsin, and H. A. Abdulla, “ MATLAB Implementation of 128-key length SAFER+ Cipher System”, Int. Journal of Engineering Research and Application, Vol. 7, İssue 2, pp. 49-55, Feb. 2017.

Secure and Fast Encryption Routine+: Evaluation by Software Application

Year 2020, Volume: 6 Issue: 2, 13 - 24, 31.10.2020
https://doi.org/10.19072/ijet.755570

Abstract

Nowadays, the Internet era and its components are based on the collection, exchange, and storage of information which represent a sever security concern. Many cipher algorithms have been developed, evaluated, and implemented to increase the protection of data for various applications. The most known strategy of data securing has been the implementation of symmetrical key encryption standards. Secrecy, robustness, reliability, and software/ hardware implementation, are among the most important properties of good cipher standard. In this work, text, data and image encryption/decryption are performed by a MATLAB software implementation of the symmetric key block standard realized using the Secure and Fast Encryption Routine (SAFER+) algorithm with 128 key length option. The results show good performances in encryption/ decryption speed through a set of original procedures to simplify the achievement of nonlinear functions adopted by SAFER+ structure. 

References

  • N. Alhalafi, and P. Veeraraghavan, “Privacy and Security Challenges and Solutions in IOT: A review”, Int. Conf. on Smart Power & Internet Energy Systems, Melbourne, Australia, pp 1-5, 25 April 2019.
  • V. Shree, Z. Antony, and N. Jayapandia,” Enhanced Data Security Architecture in Enterprise Network”, Springer Int. Conf. on Computer Networks, Big data and IoT, India , pp. 857-864, Dec. 2019.
  • M. B. Yassein, et al., “Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithm”, Int. Conf. on Engineering and Technology, Antalya, Turkey, 2017.
  • W.N.A. Ruzai, M.R.K. Ariffin, M.A. Asbullah, Z. Mahad, and A. Nawaw, “On the Improvement Attack Upon Some Variants of RSA Cryptosystem via the Continued Fractions Method”, IEEE Access, Vol. 8, pp.1-10, April, 2020.
  • A. Alabaichi, F. Ahmed, and R. Mahmod, “Security Analysis of Blowfish algorithm”, IEEE Second Int. Conf. on Informatics & Applications (ICIA), Poland, pp. 12-18, 23 Sept. 2013.
  • S. Mukherjee, D. Ganguly, and S. Naskar, “A New Generation Cryptographic Technique”, International Journal of Computer Theory and Engineering, Vol. 1, No. 3, pp. 284-287, August 2009.
  • G. Mustafa, et al., “A Review of Data Security and Cryptographic Techniques in IoT based devices”, The 2nd Int. Conf. on Future Networks & Distributed Systems, Amman, Jordan, June 26–27, 2018.
  • D. L. Kumar, A. R. Reddy, and S. A. K. Jilani, “Implementation of 128-bit AES algorithm in MATLAB”, International Journal of Engineering Trends and Technology, Vol. 33 No. 3, pp. 126-129, March 2016.
  • S. Chandra, et al., “A comparative survey of symmetric and asymmetric key cryptography”, IEEE Int. Conf. on Electronics, Communication and Computational Engineering, India, pp. 83-93, 2014.
  • J. Messy, H. Kh and K. Kuregian, Nomination of SAFER+ as a candidate algorithm for the AES, 1998. http://csrc.nist.gov/archive/aes/round1.
  • B. J. Babu, D. K. M. Tech, and R. V. V. Krishna, “Design of SAFER+ Encryption Algorithm for Bluetooth Transmission”, International Journal of Innovative Technology and Research, Vol. No.3, Issue 1, pp. 1864 – 1867, Dec. 2015.
  • A. Schubert, and W. Anheier, “Efficient VLSİ implementation of modern symmetric block ciphers”, 6th IEEE Int. Conf. on Electronics, Circuits and Systems, Vol. 2, Cyprus, pp. 757-760, Sept. 1999,
  • M. K. Mahmood, F. M. Al-Naima, “Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries”, Wireless Sensor Network, Vol. 2, pp. 520-527, July 2010.
  • M.K. Mahmood, L. S. Abdulla, A. H. Mohsin, and H. A. Abdulla, “ MATLAB Implementation of 128-key length SAFER+ Cipher System”, Int. Journal of Engineering Research and Application, Vol. 7, İssue 2, pp. 49-55, Feb. 2017.
There are 14 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Makaleler
Authors

M. Faruk Şahin

Musarıa Karım Mahmood

Indrıt Myderrizi 0000-0002-2112-7911

Publication Date October 31, 2020
Acceptance Date August 24, 2020
Published in Issue Year 2020 Volume: 6 Issue: 2

Cite

APA Şahin, M. F., Mahmood, M. K., & Myderrizi, I. (2020). Secure and Fast Encryption Routine+: Evaluation by Software Application. International Journal of Engineering Technologies IJET, 6(2), 13-24. https://doi.org/10.19072/ijet.755570
AMA Şahin MF, Mahmood MK, Myderrizi I. Secure and Fast Encryption Routine+: Evaluation by Software Application. IJET. October 2020;6(2):13-24. doi:10.19072/ijet.755570
Chicago Şahin, M. Faruk, Musarıa Karım Mahmood, and Indrıt Myderrizi. “Secure and Fast Encryption Routine+: Evaluation by Software Application”. International Journal of Engineering Technologies IJET 6, no. 2 (October 2020): 13-24. https://doi.org/10.19072/ijet.755570.
EndNote Şahin MF, Mahmood MK, Myderrizi I (October 1, 2020) Secure and Fast Encryption Routine+: Evaluation by Software Application. International Journal of Engineering Technologies IJET 6 2 13–24.
IEEE M. F. Şahin, M. K. Mahmood, and I. Myderrizi, “Secure and Fast Encryption Routine+: Evaluation by Software Application”, IJET, vol. 6, no. 2, pp. 13–24, 2020, doi: 10.19072/ijet.755570.
ISNAD Şahin, M. Faruk et al. “Secure and Fast Encryption Routine+: Evaluation by Software Application”. International Journal of Engineering Technologies IJET 6/2 (October 2020), 13-24. https://doi.org/10.19072/ijet.755570.
JAMA Şahin MF, Mahmood MK, Myderrizi I. Secure and Fast Encryption Routine+: Evaluation by Software Application. IJET. 2020;6:13–24.
MLA Şahin, M. Faruk et al. “Secure and Fast Encryption Routine+: Evaluation by Software Application”. International Journal of Engineering Technologies IJET, vol. 6, no. 2, 2020, pp. 13-24, doi:10.19072/ijet.755570.
Vancouver Şahin MF, Mahmood MK, Myderrizi I. Secure and Fast Encryption Routine+: Evaluation by Software Application. IJET. 2020;6(2):13-24.

88x31.png Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)