CFP last date
15 October 2024
Call for Paper
November Edition
IJAIS solicits high quality original research papers for the upcoming November edition of the journal. The last date of research paper submission is 15 October 2024

Submit your paper
Know more
Reseach Article

Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel

by Kazeem B. Adedeji, John O. Famoriji
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 8
Year of Publication: 2014
Authors: Kazeem B. Adedeji, John O. Famoriji
10.5120/ijais14-451221

Kazeem B. Adedeji, John O. Famoriji . Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel. International Journal of Applied Information Systems. 7, 8 ( September 2014), 6-10. DOI=10.5120/ijais14-451221

@article{ 10.5120/ijais14-451221,
author = { Kazeem B. Adedeji, John O. Famoriji },
title = { Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel },
journal = { International Journal of Applied Information Systems },
issue_date = { September 2014 },
volume = { 7 },
number = { 8 },
month = { September },
year = { 2014 },
issn = { 2249-0868 },
pages = { 6-10 },
numpages = {9},
url = { https://www.ijais.org/archives/volume7/number8/673-1221/ },
doi = { 10.5120/ijais14-451221 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T18:55:24.191943+05:30
%A Kazeem B. Adedeji
%A John O. Famoriji
%T Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 7
%N 8
%P 6-10
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Key size of an algorithm is an important aspect of cryptographic technique as high key bits is considered more secure than low key bits. Different research work has been conducted to have secure and reliable protection techniques for transmitting data over a communication networks. This paper shows the effects of varying the key size on Advanced Encryption Standard (AES) algorithm for encryption of data. AES algorithm with key sizes of 128 bits, 192 bits and 256 bits were considered. The performance of the system were examined based on the encryption and decryption time, throughput, average data rate and the central processing units (CPU) power consumption. Consequently, AES with key size of 128 bits has a lower encryption time, higher throughput and low CPU power consumption than AES with 192 bits and 256 bits keys.

References
  1. A. R. Choudhar and A. Sekelsky," Securing IPv6 network infrastructure: A new security model", IEEE International conference on Technologies for Homeland Security, 2013.
  2. A. Naser, H. Fatemeh, and K. Riza, "Developing a new hybrid cipher using AES, RC4 and SERPENT for encryption and Decryption", International Journal of Computer Applications Vol. 69, No. 8, 2013.
  3. S. William, 2005 "Cryptography and Network Security", 4th Edition, Prentice-Hall Inc. , pp. 58-309.
  4. V. S. Janakiraman, R. Ganesan, and M. Gobi M, "Hybrid Cryptographic Algorithm for Robust Network Security", ICGST-CNIR, Vol. 7, 2007.
  5. A. Himani and S. Marisha, "Implementation and analysis of various Symmetric Cryptosystems", Indian Journal of Science and Technology, Vol. 13, 2012, pp. 1173-1176.
  6. Parliamentary Office of Science & Technology Post note, 2006 "Data Encryption", No. 270, p 2
  7. K. M. Anand, and S. Karthikeyan, "Investigating the efficiency of Blowfish and Rejindael (AES) Algorithms", International Journal of Computer netweorks and Information Security, Vol. 2, 2012, pp. 22-28.
  8. G. A. Marin, Network Security basics, IEEE Security and Privacy, 1(3), 2005, p 68. .
  9. M. Edney, "Real 802. 11 Security: Wi-Fi Protected Access and 802. 11i", Addison Wesley Inc. , New York, 2003, p. 7
  10. Prasithsangaree, P. and Krishnamurthy, P. (2003) "Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs", IEEE GLOBECOM, pp. 1445-1449.
  11. Lenstra A. K. and Verheul E. R, " Selecting Cryptographic Key sizes", Journal of Cryptography, vol. 14 No. 4, pp. 255-293, 2001.
  12. M. Serge, and E. T. Stafford, "Cryptanalysis of Rc4 like Ciphers". In Proceedings, Workshop in Selected Areas of Cryptography, SAC '98. 1998.
  13. R. P. Jignesh, S. B. Rajesh, and K. Vikas, "Hybrid Security Algorithm for Data Transmission using AES-DES", International Journal of Applied Information Systems, Vol. 2, 2012, USA, pp. 15-19.
  14. Eric C. (2007), "Advanced Encryption Standard", Backshore Communications, United States.
  15. K. Aman, J. Sudesh, and M. Sunil, "Comparative Analysis between DES and RSA Algorithm", International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, 2012, pp. 386-389.
Index Terms

Computer Science
Information Sciences

Keywords

AES Average data rate CPU power consumption Cryptography Encryption Key Throughput.