Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel

@article{BAdedeji2014InvestigatingTE,
  title={Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel},
  author={Kazeem B.Adedeji and J. O. Famoriji},
  journal={International Journal of Applied Information Systems},
  year={2014},
  volume={7},
  pages={6-10}
}
Key size of an algorithm is an important aspect of cryptographic technique as high key bits is considered more secure than low key bits. Different research work has been conducted to have secure and reliable protection techniques for transmitting data over a communication networks. This paper shows the effects of varying the key size on Advanced Encryption Standard (AES) algorithm for encryption of data. AES algorithm with key sizes of 128 bits, 192 bits and 256 bits were considered. The… 

References

SHOWING 1-10 OF 16 REFERENCES
Hybrid Security Algorithms for Data Transmission using AES-DES
TLDR
The current paper presents the design and implementation of a hybrid based 128 bit key AES-DES algorithm as a security enhancement.
Analysis of energy consumption of RC4 and AES algorithms in wireless LANs
TLDR
This paper provides the results of experiments with AES and RC4, two symmetric key algorithms that are commonly suggested or used in WLANs and shows that RC4 is more suitable for large packets and AES for small packets.
Implementation and analysis of various symmetric cryptosystems
This paper implements some of the widely used symmetric encryption techniques i.e. data encryption standard (DES), triple data encryption standard (3DES), advanced encryption standard (AES), BLOWFISH
Advanced Encryption Standard
TLDR
The Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government and is the first publicly accessible and open cipher approved by the NSA for top secret information.
Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms
TLDR
This paper mainly focuses on two commonly used symmetric encryption algorithms such as Blowfish and Rejindael, which are compared and performance is evaluated.
Developing a new Hybrid Cipher using AES, RC4 and SERPENT for Encryption and Decryption
TLDR
A new cipher combining the characteristics of AES, Serpent and Rc4 is generated which is more secure than the original ciphers and resistant against most attacks.
Cryptanalysis of RC4-like Ciphers
TLDR
This analysis shows that, although the full-size RC4 remains secure against known attacks, keystreams are distinguishable from randomly generated bit streams, and the RC4 key can be recovered if a significant fraction of the full cycle of keystream bits is generated.
Network Security Basics
  • G. Marin
  • Computer Science
    IEEE Secur. Priv.
  • 2005
TLDR
This article focuses on the practical networking aspects of security, which include computer intrusion detection, traffic analysis, and network monitoring, and principally entail a networking perspective.
Selecting Cryptographic Key Sizes
TLDR
In this article the authors give guidelines for the determination of cryptographic key sizes based on a set of explicitly formulated hypotheses, combined with existing data points about the cryptosystems.
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
TLDR
This chapter discusses the relationship between Wi-Fi and IEEE 802.1X, EAP, and RADIUS, and how the Layers are Implemented, and the importance of Access Control for Dial-in Users.
...
1
2
...