Identifying High Performing Symmetric Key Algorithms in Transferring Data into Cloud
Keywords:
Conventional Key Expansion, AES, Blowfish, Twofish, Genetic OperationAbstract
The drastic amount of data is transferred into public cloud at every moment and securing data while transferring into cloud has become a tradition and in this paper we present scope of improvement for using optimized symmetric key algorithm for cloud environment. After careful investigation AES, 3DES, RC6, Twofish, Blowfish algorithms, In this paper, we proposed an approach to select optimized algorithm for deciding the use of efficient algorithm in cloud depending upon the outcomes of investigations carried. The future work can be carried out in the direction of replacement of conventional key expansion routine with the genetic concept routine in the identified algorithm.
References
Ashok Sharma, Ramjeevan Singh Thakur, Shaliesh Jaloree, “Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud”, International Journal of Scientific Research in Computer Science and Engineering,Vol.4(5), pp.5-11, 2016 ISSN: 2320-7639.
Ashok Sharma, Ramjeevan Singh Thakur, Shaliesh Jaloree, “Investigation of Efficient Cryptic Algorithm for Video files Encryption in Cloud”, International Journal of Scientific Research in Computer Science and Engineering,Vol.4(6) pp.8-14, 2016 ISSN: 2320-7639.
Yaseen I , Sahasrabuddhe H., “A Genetic Algorithm for the Cryptanalysis of Chor Rivest Knapsack Public Key Crypto System (PKC)” in proceeding of third International Conference on Computational Intelligence and Multimedia Application, September 23-26, New Delhi 1999.
Mathews R., “The use of Genetic Algorithm in Cryptanalysis”, Cryptologia, Vol.17(4), 1993.
Spillman R, “The Use a Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers” Cryptologia, Vol.17(1), 1993
Bagnall A, “The Application of Genetic Algorithm Cryptanalysis”, Master Degree Thesis in School of Information Systems, University of East Anglia 1996
McKeon G. and Rayward-Smith V., “The Cryptanalysis of a Three Rotor Machine Using Genetic Algorithm” available at http://citeseer.nj.nec.com/162166.html
http://dip.sun.ac.za/~vuuren/papers/genetic.ps.
Rashed Abdali, “Using Modified Genetic Algorithm to Replace AES Key Expansion Algorithms”, Journal of Applied Mathematical Sciences, Vol.7 (144), pp.7161-7171, 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
