Paper 2 - : February 2021
Paper 2 - : February 2021
net/publication/348976913
Paper 2 -
CITATIONS READS
0 2
1 author:
Fursan Thabit
Swami Ramanand Teerth Marathwada University
8 PUBLICATIONS 1 CITATION
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Fursan Thabit on 02 February 2021.
A. Avalanche Test
B. Visual Assessment
C. Correlation Analysis
D. Statistical Analysis
E. Time Complexity
F. Execution Time (Encryption time - Decryption time)
G. Image histogram
H. Image Entropy
• Avalanche Test
A very well-known parameter that is used to analyzed an encryption algorithm’s
protection (randomness). Avalanche Test analysis is conducted in order to verify
the sensitivity of the encryption scheme in order to change the initial conditions. It
means that an entirely different cipher-text should be generated by a minor shift in
the encryption key.
• Correlation Analysis
The association between encrypted data and original data is measured in this
analysis. Encrypted data with zero overlap can preferably result in a strong
encryption technique.
• Visual Assessment
It must be achieved on an encrypted output. If an attacker has the potential to
deduce any significant information by visually analyzing the encrypted result, so
in the first stage itself, the scheme is said to be abortive.
• Statistical Analysis
This analysis is conducted to determine the uncertainty characteristics of encrypted
files. The relation between encrypted data and original data is seen by the
evaluation of correlation coefficients.
• Key-Space Analysis (Brute-Force Attack)
Encryption programmers can be particularly resilient to very subtle modifications
to the key used in the encryption process.
• Time Complexity
An attacker needs to locate 2128 potential keys with a key size of 128 bits.
Therefore, on average, the time complexity of 2128 complexity of finding the
right key is O (1).
• Execution time
One of the important parameters to be considered in the development of an
encryption algorithm, along with security, is the execution time
• Image histogram
The image histogram is a newly used parameter that indicates the randomness of
the distribution of encrypted image details.
• Image Entropy
Digital images, assembled to form a visual perception of images, are a mixture of
discrete valued pixels. The simplest parameter used to analyze the randomness of
the encrypted image is the image entropy index
Experimental Analysis Results
The experiments analysis is conducted on plain text as well as on image data. The
original and encrypted images for NLCA-128 are shown . The complete description of
the experiments and their outcomes are discussed below.
In this section, the performance analysis process of some symmetric Key algorithms
such RC4, HIGH, SF, AES, SIT, DES and proposed algorithm in the various parameters
(Avalanche Analysis, Correlation Analysis, Keys-pace analysis, Linear and Differential
Cryptanalysis, Information entropy analysis, Execution time analysis). The results have
been obtained by running the experiments with the varying file sizes demonstrating the
effect of algorithm change. Table 6 shows the experimental results of encryption
algorithms, and shows that all algorithms use the same text files for five experiments.
By analysing the table, NLCA is taking less encryption time, and RC4 is also taking less
time for encryption while as AES and the 3DES is taking more time for encryption and
the memory usage examination all algorithms in which, NLCA, IDEA, SIT, and TEA
are having significantly less memory usage while RC4 is taking the maximum memory
of all the algorithms.
No name Avalan Key Code RAM Differential Correl entrop Executi
che space Size Cryptanalysis ation y on time
analysi analysi NCPR UACI analysi analysi (s)
s s s s
1 SEA[35 - 1570 176 -- -- 0.0072 7.4436 2.67
] 248,294
2 HIGH[ - 2*128 13716 288 -- -- 0.0016 7.9971 1.615
36]
6 DES[34 0.6756 256 bits 1407 18.2 99.598 33.550 0.9677 7.997 1.89
]