Open Access Open Access  Restricted Access Subscription or Fee Access

A Study on Various Cryptographic Algorithms and their Scope and Improvement towards Future Security Needs

K. Gayathri, S. Sivachandiran

Abstract


Over the years, numerous cryptographic algorithms have been developed and used in many different protocols and functions. Cryptography is by no means static. Steady advances in computing and in the science of cryptanalysis have made it necessary to adopt newer, stronger algorithms and larger key sizes. Older algorithms are supported in current products to ensure backward compatibility and interoperability. However, some older algorithms and key sizes no longer provide adequate protection from modern threats and should be replaced. This paper summarizes the security of cryptographic algorithms and parameters, gives concrete recommendations regarding which cryptography should be used and which cryptography should be replaced, and describes alternatives and mitigations.


Keywords


Cryptography, Key Sizes, Security, Protocols, Functions, Science of Cryptanalysis

Full Text:

PDF

References


Qian Yu ; Zhang, C.N., “ RC4 State and Its Applications ,Privacy, Security and Trust (PST), Page(s): 264 – 269,2011

.QianYu ; Zhang, C.N. ; Orumiehchiha, M.A. ; Hua Li,“RC4-BHF An Improved RC4-Based Hash Function” Computer and Information Technology (CIT) , Page(s): 322 - 326, 2012

Datta, K.; Shrivastav, V. ; Sengupta, I. ; Rahaman, H. ,“Reversible Logic Implementation of AES Algorithm”, Design & Technology of Integrated Systems in Nanoscale Era (DTIS), Page(s): 140 – 144, 2013.

.http://searchsecurity.techtarget.com/definition/Data- Encryption-Standard

http://www.truecrypt.org/docs/aes

http://searchsecurity.techtarget.com/definition/Diffie-Hellman-key-exchange

TingyuanNieTeng Zhang,” A study of DES and Blowfish encryption algorithm”, Tencon IEEE Conference, 2009.

Monika Agrawal, Pradeep Mishra,” A Comparative Survey on Symmetric Key Encryption Techniques,” International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, PP877-882.

Alaoui, S. M. E. Y., Cayrel, P. L., El Bansarkhani, R., & Hoffmann, G. (2013). Code -based identification and signature schemes in software. In Security Engineering and Intelligence Informatics (pp. 122-136). Springer Berlin Heidelberg.

J.W. Bos, C. Costello, M. Naehrig, and D. Stebila. Post-quantum key exchange for the TLS protocol from the ring learning with errors problem.

Buchmann, Dahmen, and Hülsing, “XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions

C. Bennett, E. Bernstein, G. Brassard, U. Vazirani. Strengths and weaknesses of quantum computation. SIAM Journal on Computing.

M. Ben-Or, M. Horodecki, D. Leung, D.Mayers, J. Oppenheim. The universal composable security of quantum key distribution. In Theory of Cryptography

Eli Biham, Bruno Huttner, and Tal Mor. Quantum cryptographic network based on quantum memories

T. E. Chapuran et al. Optical networking for quantum key distribution and quantum communications.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.