Open Access   Article Go Back

Identifying High Performing Symmetric Key Algorithms in Transferring Data into Cloud

Ashok Sharma1

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-12 , Page no. 326-328, Dec-2017

Online published on Dec 31, 2017

Copyright © Ashok Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ashok Sharma, “Identifying High Performing Symmetric Key Algorithms in Transferring Data into Cloud,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.326-328, 2017.

MLA Style Citation: Ashok Sharma "Identifying High Performing Symmetric Key Algorithms in Transferring Data into Cloud." International Journal of Computer Sciences and Engineering 5.12 (2017): 326-328.

APA Style Citation: Ashok Sharma, (2017). Identifying High Performing Symmetric Key Algorithms in Transferring Data into Cloud. International Journal of Computer Sciences and Engineering, 5(12), 326-328.

BibTex Style Citation:
@article{Sharma_2017,
author = {Ashok Sharma},
title = {Identifying High Performing Symmetric Key Algorithms in Transferring Data into Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2017},
volume = {5},
Issue = {12},
month = {12},
year = {2017},
issn = {2347-2693},
pages = {326-328},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5252},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5252
TI - Identifying High Performing Symmetric Key Algorithms in Transferring Data into Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - Ashok Sharma
PY - 2017
DA - 2017/12/31
PB - IJCSE, Indore, INDIA
SP - 326-328
IS - 12
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
134 218 downloads 106 downloads
  
  
           

Abstract

The drastic amount of data is transferred into public cloud at every moment and securing data while transferring into cloud has become a tradition and in this paper we present scope of improvement for using optimized symmetric key algorithm for cloud environment. After careful investigation AES, 3DES, RC6, Twofish, Blowfish algorithms, In this paper, we proposed an approach to select optimized algorithm for deciding the use of efficient algorithm in cloud depending upon the outcomes of investigations carried. The future work can be carried out in the direction of replacement of conventional key expansion routine with the genetic concept routine in the identified algorithm.

Key-Words / Index Term

Conventional Key Expansion, AES, Blowfish, Twofish, Genetic Operation

References

[1] Ashok Sharma, Ramjeevan Singh Thakur, Shaliesh Jaloree, “Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud”, International Journal of Scientific Research in Computer Science and Engineering,Vol.4(5), pp.5-11, 2016 ISSN: 2320-7639.
[2] Ashok Sharma, Ramjeevan Singh Thakur, Shaliesh Jaloree, “Investigation of Efficient Cryptic Algorithm for Video files Encryption in Cloud”, International Journal of Scientific Research in Computer Science and Engineering,Vol.4(6) pp.8-14, 2016 ISSN: 2320-7639.
[3] Yaseen I , Sahasrabuddhe H., “A Genetic Algorithm for the Cryptanalysis of Chor Rivest Knapsack Public Key Crypto System (PKC)” in proceeding of third International Conference on Computational Intelligence and Multimedia Application, September 23-26, New Delhi 1999.
[4] Mathews R., “The use of Genetic Algorithm in Cryptanalysis”, Cryptologia, Vol.17(4), 1993.
[5] Spillman R, “The Use a Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers” Cryptologia, Vol.17(1), 1993
[6] Bagnall A, “The Application of Genetic Algorithm Cryptanalysis”, Master Degree Thesis in School of Information Systems, University of East Anglia 1996
[7] McKeon G. and Rayward-Smith V., “The Cryptanalysis of a Three Rotor Machine Using Genetic Algorithm” available at http://citeseer.nj.nec.com/162166.html
[8] http://dip.sun.ac.za/~vuuren/papers/genetic.ps.
[9] Rashed Abdali, “Using Modified Genetic Algorithm to Replace AES Key Expansion Algorithms”, Journal of Applied Mathematical Sciences, Vol.7 (144), pp.7161-7171, 2013.