Document Type : Original Manuscript

Authors

Faculty of Marine Engineering, Khorramshahr University of Marine Science and Technology, Iran

Abstract

With growth of Technology, With growth of technology, the needs for data and information security over communication channels are necessary. Providing information security in marine environment includes communication between ships and also ships with ground station are one of the most important issues in information security. In order to provide Confidentiality, symmetric key cryptography algorithms such DES, 3DES, IDEA, RC6, Serpent and AES are presented by researchers. Different reports in literature are presented by researchers in order to compare the performance of these algorithms. Despite various considerations, the needs for deep comparison of these algorithms are needed. Therefore in this paper, deep consideration and comparison in the points of architecture, flexibility, security and speed of these algorithms are done. Based on the achieved results, the appropriate algorithm can be employed based on required flexibility, speed or desired levels of security. The result of implementation and comparison shows the advantages of AES algorithm in provided security and RC6 in speed of execution.

Keywords

Main Subjects

Anderson. R., Biham. E. and Knudsen. L. 1998. Serpent: A Proposal For The Advanced Encryption Standard. AES algorithm submission.
Chouinard, J, Y. 2002. Design of Secure Computer Systems CSI4138/CFG4394 Notes on the Data Standard (DES).
Deamen. J. and Rijmen. V. 1999. AES Proposal: Rijedeal. AES Algorithm submission.
Ebrahim, M., Khan, S. and Bin Khalid, U. 2013. Symmetric Algorithm Survey: A Comparative Analysis, International of Computer Applications:12-19.
Elbaz. L, and Bar-El. H. 2000. Strength Assessment of Encryption Algorithms. Advanced Embedded Security.
Elminaam. D, Abdul Kader. H, Ha, Zdhoud. M. 2008. Performance Evaluation of Symmetric Encryption Algorithm. IJCSNS: 280-286.
FIPS-Pub.46. 1977. Data Encryption Standard. National Bureau of Standards, U.S. Department of Commerce, Washington D.C.
Kaur. M, and Kaur. S. 2014. Survey of Various Encryption Techniques for Audio Data. IJARCSSE:1314-1317.
Lai. X. and Massey. J. 1990. A proposal for a new block encryption standard’’, In Proceedings of the EUROCRYPT 90 Conference:389- 404.
Masram. R., Shahare. V., Abraham. J., Moona. R. 2014. Analysis and Comparison of Symmetric Key Cryptographic Algorithm Based on Various File Features’’, IJNSA: 43-52.
Pc. A., Devassy. A., C George. S, and Devassy. A. 2013. Survey of Symmetric Cryptographic Algorithms. IOSR-JECE:65-75.
Rivest. R. L., Robshaw. M. J. B., Sidny. R. and YIN. Y.L. 1998. The  Block Cipher: 1-21.
Singh. N. and  Raina. J. 2011. Comparative Analysis of AES and RC4 Algorithms for Better Utilization. International Journal of Computer Trends and Technology:178-181.
Thakur. J, and Kumar. N. 2011. DES, AES and Blofish: Symmetric Key Cryptographic Algorithms Simulation Based Performance Analysis. International Journal of Emerging Technology and Advanced Engineering: 6-12.
Verma. P, Shekhar. J, Preey, Asthana. A. 2015. A Survey for Performance Analysis Various Cryptography Technique Digital Contents. IJCSMC:522
 
-