Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms

نویسندگان

  • Harsh Kumar Verma
  • Ravindra Kumar Singh
  • Ronald L. Rivest
  • M. J. B. Robshaw
  • Bruce Schneier
  • John Kelsey
  • Doug Whiting
  • Chris Hall
  • Niels Ferguson
  • Shun-Lung Su
  • Lih-Chyau Wuu
  • Jhih-Wei Jhang
چکیده

In this paper, Performance analysis of RC6, Twofish and Rijndael block cipher algorithms have been done on the basis of execution time and resource utilization. CPU utilization and memory utilization both are considered for determining resource utilization. These algorithms are parameterized algorithm and were designed to meet the requirements of the Advanced Encryption Standard (AES) competition and selected among five finalists of that competition. These three algorithms have a variable block size and a variable key size in their structure and encrypt four w-bits at a time. Allowable choices for w are 16 bits, 32 bits, and 64 bits. Twofish and Rijndael have same structure for encryption and decryption while RC6 have different. RC6, Twofish and Rijndael have 20, 16 and 10 rounds respectively. Performances of these three algorithms have been evaluated on key size of 128-bits, 192-bit and 256-bit in this paper.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review of a New Distinguishing Attack Using Block Cipher with a Neural Network

This paper describes a new distinguishing type attack to identify block ciphers, which grounded in a neural network, by means of a linguistic approach and an information retrieval approach, from patterns which is found on a ciphertexts set collection. The ideas were performed on a set of ciphertexts, which were encrypted by the finalist algorithms of AES contest: MARS, RC6, Rijndael, Serpent an...

متن کامل

Performance of the AES Candidate Algorithms in Java

We analyze the five remaining AES candidate algorithms MARS, RC6, Rijndael, Serpent, and Twofish as well as DES, Triple DES, and IDEA by examining independently developed Java implementations. We give performance measurement results on several platforms, list the memory requirements, and present a subjective estimate for the implementation difficulty of the algorithms. Our results indicate that...

متن کامل

Provably Secure Encryption Algorithm based on Feistel Structure

In 1997 The National Institute of Standards and Technology (NIST) started a process to select a symmetric-key encryption algorithm instead of DES. NIST determined the evaluation criteria that would be used to compare the candidate algorithms depending on the analyses and comments received, NIST selected five finalist algorithms (RC6, MARS, Rijndael, Serpent and Twofish). At the end, NIST select...

متن کامل

Fast Software Implementations of SC2000

The block cipher SC2000 was recently proposed by a research group of Fujitsu Laboratories as a candidate cipher for the CRYPTREC and NESSIE projects. The cipher was designed so that it would be highly flexible and fast on many platforms. In this paper we show that the cipher is really fast on the Pentium III and AMD platforms: Our C implementation of SC2000 on Pentium III is only second to the ...

متن کامل

Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms

RC6, MRC6, and Rijndael are three block cipher algorithms. Different types of Bitmap images are encrypted with each of the three encryption algorithms. Visual inspection is not enough on judging the quality of encrypted images. So, other measuring factors are considered based on: measuring the maximum deviation between the original and the encrypted images, measuring the correlation coefficient...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012