CALCULATING CONFUSION AND DIFFUSION OF SYMMETRIC CRYPTOGRAPHIC ALGORITHMS

Published 30 Aug 2019 •  vol 12  •  no 8  • 


Authors:

 

N. Thirupathi Rao, Department of Computer Science and Engineering, Vignan’s Institute of Information Technology (A), India
B. Dinesh Reddy, Department of Computer Science and Engineering, Vignan’s Institute of Information Technology (A), India
Debnath Bhattacharyya, Department of Computer Science and Engineering, Vignan’s Institute of Information Technology (A), India
Mukku Harisree, Department of Computer Science and Engineering, Vignan’s Institute of Information Technology (A), India

Abstract:

 

Confusion and Diffusion are the two important tasks to be performed while any application in cryptography is used in now a day. Several cryptographic algorithms are present in literature and their performances were analyzed and presented in various articles. The combination of both the cryptographic algorithms and the confusion and diffusion functionality was not done so far. In the current article an attempt has been made to accomplish this by choosing two algorithms like the AES and the DES. Calculating Confusion and Diffusion of Cryptographic Functions with the Message passing based approach to calculate confusion and diffusion of various cryptographic hash functions. Confusion states the relationship between cipher-text and key. It represents the dependency of bits in key to the bits of cipher-text. It is average of number of bits changed in cipher text when minimum number of bits changed in key. Similarly Diffusion states the relationship between cipher-text and plain text. The performance of these two algorithms was given in detail in the results and discussions section in detail.

Keywords:

 

Confusion, Diffusion, Cryptography, Functions, Processing

References:

 

[1] https://www.cybrary.it/study-guides/comptia-casp/confusion-and-diffusion-and-their-role-in-cryptography/ [Last Accessed on 10-06-2019].
[2] https://techdifferences.com/difference-between-confusion-and-diffusion.html[Last Accessed on 10-06-2019].
[3] https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm[Last Accessed on 10-06-2019].
[4] https://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard[Last Accessed on 10-06-2019].
[5] https://www.tutorialspoint.com/cryptography/data_encryption_standard.htm[Last Accessed on 10-06-2019].
[6] Youssouf Mahamat koukou, Siti Hajar Othman, Maheyzah MD Siraj. Herve Nkiama “Comparative Study Of AES, Blowfish, CAST-128 And DES Encryption Algorithm”, IOSR Journal of Engineering (IOSRJEN), Vol. 06, Issue 06, 2016, Pp.01-07.
[7] Shaza Rihan, Ahmed Khalid Salih “A Performance Comparison of Encryption Algorithms AES and DES”,  International Journal of Engineering Research, Vol.4, No.12, 2015, Pp.151-154.
[8] A blog written on entitled “AES vs. DES Encryption: Why Advanced Encryption Standard (AES) has replaced DES, 3DES and TDEA” by Townsend Security, 2018.
[9] Mohammed Nazeh Abdul Wahid*, Abdulrahman Ali, Babak Esparham and Mohamed Marwan, “A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention”, Journal of Computer Science Applications and Information Technology, 2018, Vol.3, No.2, Pp.1-7.
[10] Kyongjin Kim. “Analysis of Cryptography Techniques over Block Cipher” International Journal of Security Technology for Smart Device. Vol. 3. No. 2. Oct. 2016.GVPress. pp:7-14.
[11] Pallavi Agarwal, "Secure Node Communication with Cryptographic Algorithm in Vehicular Ad Hoc Networks", International Journal of Advanced Science and Technology, SERSC Australia, ISSN: 2005-4238 (Print); 2207-6360 (Online), Vol. 109, December (2017), pp. 1-12.
[12] Dennis Agyemanh Nana Gookyi and Kwangki Ryoo, "The Design and Implementation of a Hardware Crypto Core for Securing Pervasive Devices", International Journal of Control and Automation, SERSC Australia, ISSN: 2005-4297 (Print); 2207-6387 (Online), Vol. 11, No. 7, July (2018), pp.97-108.
[13] Rahul Saha, G. Geetha, Gulshan Kumar and Hye-Jim Kim, "Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations", International Journal of Grid and Distributed Computing, SERSC Australia, ISSN: 2005-4262 (Print); 2207-6379 (Online), Vol.10, No.11, November (2017), pp. 79-98.
[14] Zhou Xue Guang, Li Zhong Yuan, Wang HaoTian and Qv ChengQin, "Niederreiter Cascade Combination Cryptosystem Based on the Double Public Keys", International Journal of Security and Its Applications, SERSC Australia, ISSN: 1738-9976 (Print); 2207-9629 (Online), Vol.9, No.7, July (2015), Pp. 49-58.
[15] Pallavi Agarwal and Neha Bhardwa, "Overview of Trust Management in VANET and Various Cryptography Fundamentals", International Journal of Future Generation Communication and Networking, SERSC Australia, ISSN: 2233-7857 (Print); 2207-9645 (Online), Vol. 9, No. 6, June (2016), Pp. 137-144.
[16] Li-bo Zhang and Ben-qiang Yang, "An Efficient Cryptosystem for Medical Image Encryption", International Journal of Signal Processing, Image Processing and Pattern Recognition, SERSC Australia, Vol.8, No.7, July (2015), Pp. 327-340.

Citations:

 

APA:
Rao, N. T., Reddy, B. D., Bhattacharyya, D., & Harisree, M. (2019). Calculating Confusion and Diffusion of Symmetric Cryptographic Algorithms. International Journal of Control and Automation (IJCA), ISSN: 2005-4297 (Print); 2207-6387 (Online), NADIA, 12(8), 97-110. doi: 10.33832/ijca.2019.12.8.09.

MLA:
Rao, N. Thirupathi, et al. “Calculating Confusion and Diffusion of Symmetric Cryptographic Algorithms.” International Journal of Control and Automation, ISSN: 2005-4297 (Print); 2207-6387 (Online), NADIA, vol. 12, no. 8, 2019, pp. 97-110. IJCA, http://article.nadiapub.com/IJCA/vol12_no8/9.html.

IEEE:
[1] N. Thirupathi Rao, B. Dinesh Reddy, D. Bhattacharyya, and M. Harisree, "Calculating Confusion and Diffusion of Symmetric Cryptographic Algorithms." International Journal of Control and Automation (IJCA), ISSN: 2005-4297 (Print); 2207-6387 (Online), NADIA, vol. 12, no. 8, pp. 97-110, Aug 2019.