Saturday, January 25, 2020

Comparison Of RC5 And RC6 Block

Comparison Of RC5 And RC6 Block Due to rapid growth in Internet and networks applications so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. So it is desirable to develop a systematic understanding of database security concerns and their solutions and to come up with a framework. Ideally, such a framework should give some assurance that all relevant security problems have been addressed, and it can possibly point out new security issues not previously considered. It is a goal of this extended abstract and the corresponding talk to contribute to developing such framework and identifying new research directions for fruitful collaborations of the database The information database security is dependent on many different mechanisms and techniques, such as data and user authentication, encryption, time-stamping, digital signatures, and other cryptographic mechanisms and protocols. access control, information flow control, operating system and network security. The cryptographic algorithm RC6 is an evolutionary improvement of RC5 and designed to meet the requirements of the Advanced Encryption Standard (AES). Like RC5, RC6 also makes essential use of data-dependent rotations. RC6 also has the feature of the use of four working registers instead of two, and the inclusion of integer multiplication as an additional primitive operation. The use of integer multiplication greatly enhances the diffusion achieved per round allowing for greater security, fewer rounds, and increased throughput. Keyword:cryptography,data security,secret key length ,block size,block cipher Introduction The word cryptography comes from the Greek word kryptos meaning hidden and graphia meaning writing. Cryptography thus literally means the art of secret writing. Cryptography is the science of devising methods which allow for information to be sent in a secure form in a way that the intended recipient would be able to retrieve the information so provides means of hiding (encryption) and recovering (decryption) information. A cipher in cryptography is an algorithm used for performing encryption decryption a series of well defined steps that can be followed as a procedure. In non-technical terms a cipher is the same thing as a code; however, the concepts are distinct in cryptography. The modern cipher work on either a fixed size of blocks of symbols, which is referred to as block cipher or the one which works on continuous stream of symbols called Stream cipher. Variety of encryption algorithms are available and used in information security. They can be classified into Symmetric (private) and Asymmetric (public) keys Encryption. In Symmetric keys encryption a key is used to encrypt and decrypt data. The key is to be distributed before transmission between entities. The role of it is very important for such system. If weak key is used in algorithm then data can be decrypted by anybody. Strength of Symmetric key encryption depends on the size of key used. For the same algorithm, encryption using longer key is harder to break than the one done using smaller key. There are many examples of strong and weak keys of cryptography algorithms like RC2, DES, 3DES, RC5, RC6, Blowfish, and AES. In Asymmetric key encryption method two keys are used one is private and another is public. Public key is used for encryption and private key is used for decryption. Public key is known to the public and private key is known only to the user. This removes the need of distribution of keys prior to the transmission. However public key encryption is based on mathematical function, computationally intensive and is less efficient for smaller mobile devices. Many encryption algorithms are widely available and used in information security. They can be categorized into Symmetric (private) and Asymmetric (public) keys encryption. In Symmetric keys encryption or secret key encryption, only one key is used to encrypt and decrypt data. The key should be distributed before transmission between entities. Keys play an important role. If weak key is used in algorithm then every one may decrypt the data. Strength of Symmetric key encryption depends on the size of key used. For the same algorithm, encryption using longer key is harder to break than the one done using smaller key. Commonly Used Encryption Techniques DES: (Data Encryption Standard), was the first (National Institute of Standards and Technology).DES is (64 bits key size with 64 bits block size). Since then, many attacks and methods recorded the drawbacks of DES, which made it an insecure block cipher [2] ,[4]. 3 DES: is an advanced version of DES; it is 64 bit block size with 192 bits key size. In this standard the encryption method is similar to the original DES but applied 3 times to increase the encryption level and the average safe time. But it is found that 3DES is slower than other block cipher methods [2]. RC2: is a block cipher with a size of 64-bits and have a variable key size that varies from 8 to128 bits. RC2 is vulnerable to a related-key attack using 234 chosen plaintexts [2]. Blowfish: is block cipher 64-bit block can be used as a replacement for the DES algorithm. It takes a variable length key, varying from 32 bits to 448 bits; default 128 bits. Blowfish is unpatented, license-free, and is available free for all uses. Blowfish has variants of 14 rounds or less. Blowfish is successor to Twofish [3]. AES: is a block cipher .Its key length ranges from 128, 192, to 256 bits; default 256. It encrypts data blocks of 128 bits in 10, 12 and 14 round depending on the key size. It is the fast and flexible encryption technique and can be explored on various platforms especially in small devices [6]. Also, AES has been carefully tested for many security applications [2], [4]. RC5: is a block cipher with a 64-bits block cipher with a variable key size that varies from 8 to128 bits. It is the fast and flexible encryption technique and can be explored on various platforms especially in small devices. While this is fast compared to most block ciphers, it is disappointingly slow compared to what might be expected, again pointing out the danger in estimating the speed of an algorithm from a high-level language without understanding the underlying processor limitations.[5] RC6: is block cipher derived from RC5. It was designed to meet the requirements of the Advanced Encryption Standard competition. RC6 proper has a block size of 128 bits and supports key sizes of 128, 192 and 256 bits. Some references consider RC6 as Advanced Encryption Standard [2].[7] In the present work, a comparison is carried out between RC 5 and RC 6. In the later part an attempt is made to compare different encryption techniques based on energy, change of packet size, change of key size. Performance Comparison between RC5 and RC6 symmetric key algorithms: RC5 is a parameterized algorithm with a variable block size, a variable key size, and a variable number of rounds. Allowable choices for the block size are 32 bits (for experimentation and evaluation purposes only), 64 bits (for use a drop-in replacement for DES), and 128 bits. The number of rounds can range from 0 to 255, while the key can range from 0 bits to 2040 bits in size. Such built-in variability provides flexibility at all levels of security and efficiency. There are three routines in RC5: key expansion, encryption, and decryption. In the key-expansion routine, the user-provided secret key is expanded to fill a key table whose size depends on the number of rounds. The key table is then used in both encryption and decryption. The encryption routine consists of three primitive operations: integer addition, bitwise XOR, and variable rotation. The exceptional simplicity of RC5 makes it easy to implement and analyze. Indeed, like the RSA system, the encryption steps of RC5 can be written on the back of an envelope. The heavy use of data-dependent rotations and the mixture of different operations provide the security of RC5. In particular, the use of data-dependent rotations helps defeat differential and linear cryptanalysis. As technology improves, and as the true strength of RC5 algorithms becomes better understood through analysis, the most appropriate parameter values can be chosen. The choice of r affects both encryption speed and security. For some applications, high speed may be the most critical requirement-one wishes for the best security obtainable within a given encryption time requirement. Choosing a small value of r (say r = 6) may provide some security, albeit modest, within the given speed constraint RC6 is a block cipher based on RC5 and designed by Rivest, Sidney, and Yin for RSA Security. Like RC5, RC6 is a parameterized algorithm where the block size, the key size, and the number of rounds are variable; again, the upper limit on the key size is 2040 bits. The main goal for the inventors has been to meet the requirements of the AES. There are two main new features in RC6 compared to RC5: the inclusion of integer multiplication and the use of four b/4-bit working registers instead of two b/2-bit registers as in RC5 (b is the block size). Integer multiplication is used to increase the diffusion achieved per round so that fewer rounds are needed and the speed of the cipher can be increased. The reason for using four working registers instead of two is technical rather than theoretical. Namely, the default block size of the AES is 128 bits; while RC5 deals with 64-bit operations when using this block size, 32-bit operations are preferable given the intended architecture of the AES . However, RC6 may remain a trademark of RSA Security. RC5 using 128-bit encryption is still considered one of the safest encryption methods. A comparative analysis between the block cipher RC5, and RC6 is performed to provide some measurements on the encryption and decryption. Effects of several parameters such as number of rounds, block size, and the length of secret key on the performance evaluation criteria are investigated. Table No. I shows the results of a study between RC5 and RC6 block cipher for different design parameters such as word size, block size, number of rounds and secret key size. It is already known that as the no of rounds and the secret key length increases the security of encrypted data is more. Here the RC6 have a clear upper hand. Parameters Rc5 Rc6 W (word size in bits) 16,32,64 16,32,64 R (no. of rounds) 0,1,2,..255 0,1,2,..255 B (key length in bytes) 0,1,2,..255 0,1,2,..255 Block size in words 2w 4w Block size in bits 32,64,128 64,128,256 Max block size in bits 128 256 No. of keys derived 2r + 2 2r + 4 Used operation +,-,Ġ¦,>> +,-,Ġ¦, *, >> Table no. I Comparison between RC5 RC6 block cipher at different design parameters.[1][6] A comparison for the throughput of encryption and decryption as a function of secret key length is shown in Table II Also as far as throughput in a encryption algorithm is concerned, it depends upon the length of secret key length used for encrypting the data. It is also very clear that RC6 gives more throughput .The table shows the throughput for both RC5 and RC6 algorithm at various key lengths with 32 bit word size and 20 no. of rounds kept constant but high security requires large number of rounds, so there is a trade off between high security and high throughput. [1],[6] The effect of number of rounds on both the throughput (Th) for RC5 and RC6 is given in Table no. III. The block size and secret key length are both constant, w = 32 and b = 16 and same is shown on graph. The result shows that with a constant word size and constant key length RC6 has more throughput than RC5 . However the throughput of encryption and decryption decreases with increasing number of rounds and vice versa. High throughput requires less number of rounds, Conclusion The article describes about a detailed comparative study for the well-known block ciphers RC5 and RC6. The comparison is made based on several design parameters of the two algorithms among which are word size, number of rounds and length of secret key. Effect of number of rounds, secret key length and data block size on encryption time and system throughput is also studied. The comparison also shows that RC6 cipher achieve maximum throughput and minimum encryption time compared with RC5 The RC6 block cipher offers a simple, compact, and flexible block cipher. It can be easily implemented for encryption. We believe that on all counts RC6 is most suitable to be chosen as the AES

Friday, January 17, 2020

Minicase Prairie Stores Essay

What is the Rate of Return Percentage? In the mini-case, Mr. Breezeway indicated two kinds of percentage to determine the required return. One of them is the companies’ return on book equity (% 15) and the other one is the investment return percentage in the rural supermarket industry (% 11) which shows that investors in rural supermarket chains, with risks similar to Prairie Home Stores, expected to earn about % 11 percent on average. Since the companies’ rate of return determined by the rate of return offered by other equally risky stocks, then it should be % 11. The Rapid Growth Scenario Step 1: Being able to calculate the present value of the companies’ stocks, we should first calculate the present value of the companies’ dividends. Years 2016-2021= 0à ·(1.11) + 0à ·(1.11)2 +0à ·(1.11)3 +0à ·(1.11)4 +14à ·(1.11)5 +14.7à ·(1.11)6 = 8.31+7.86 = 16.17 $ Present value of the dividends between 2016-2021 Step 2 : In step 2, we should estimate the Prairie Stores’ stock price at the horizon year (2021), when growth rate has settled down. According to mini-case, after 2019 the company will resume its normal growth. Since the investment plan is going to continue 6 years, we should choose the year 2021 as a horizon year. Growth rate: plowback ratio Ãâ€" return on equity (Given in the notes) Plowback ratio = Retained earnings à · Earnings (2021) = 7.4 million à · 22 million = 0.33 % 33 Return on equity = Earnings à · Book value, start of the year (2021) = 22 million à · 146.9 million = 0.15 % 15 Growth rate = % 33 Ãâ€" % 15 = % 5 Div 2022 = 1.05 Ãâ€"14.7P2021 = Dividend 2022 à · r – g = 15.44 $ = 15.44 million à · 0.11- 0.05 = 257.33 million Step 3 :Being able to find the present value of total stocks ( at the beginning of 2016), first we should discount the 2021 total stock value by 6 years and we should also add the present value of dividends to this amount. P0 = 16.17 $ + 257.33 à · (1.11)6 = 153.75 million $ Present Value of the Stock Per share = 153.75 million à · 400,000 (Outstanding shares) = 384.37 $ If the company did go public, its share price should be $384.37 for per share with the rapid growth scenario. The Constant Growth Scenario: Growth rate: plowback ratio Ãâ€" return on equity (Given in the notes) Plowback ratio = Retained earnings à · Earnings (2016) = 4/12 = % 33 Return on equity = Earnings à · Book value, start of the year (2016) = 12 à · 80 = % 15 Growth rate = % 33 Ãâ€" % 15 = % 5 P0 = Div2016 à · r – g Per Share Value = 133.33 million à · 400,000 = 8 million à · 0.11 – 0.05 = 333.33 $ = 133.33 million If the company did go public, its share price should be $333.33 for per share with the constant growth scenario. Conclusion: If I were Ms. Firewater, I would recommend the rapid growth scenario because with the rapid growth scenario the companies’ present per share value higher than it could have been with the constant rate scenario. In addition, this investment decision depends on shareholders’ opinion. As we know, some of the shareholders are dependent on the generous regular dividends. As a result, these shareholders might have not wanted to choose the rapid grow scenario. On the other hand, the shareholders who have more interest with the companies’ future stock value, will probably choose the rapid growth scenario. Mr. Breezeway’s advise not to sell the companies’ per stock for $200 was right. Any price under $333.33 for per share will be not acceptable for me, if I am dependant on the dividend income. On the other hand, If I were not need the dividend income and want to sell my shares, I would not accept any price under $384.37 for per share.

Thursday, January 9, 2020

Au Fur et à Mesure French Expression Explained

The French expression  Au fur et à   mesure [o fu ray a m(eu) zur] literally translates to  at the rate and in measure.  It is used to mean  as, while, or gradually and has a normal  register. Translation and Explanation The expression is a perfect, if extreme, example of why you cant translate word for word from one language to another. In this case, English speakers need but a single word to express something for which the French commonly use five. Fur is an old word meaning rate, and mesure means measure or measurement. It must be said, however, that as is less precise than au fur et à   mesure, which indicates not only a shared time-frame for two events  but also a consistency of speed: a gradual progression. A subtle nuance, certainly, but one that helps to explain why the French expression is so much longer. It also means that au fur et à   mesure is less flexible: you can only use it for active, progressive actions such as washing dishes or spending money. Examples Je fais la vaisselle au fur et à   mesure quil dà ©barrasse la table.I do the dishes as he clears the table.Au fur et à   mesure que la fà ªte se rapproche, ma sÅ“ur sinquià ¨te.As the party draws nearer, my sister is getting (more and more) impatient.Le suspense ma tenu en haleine au fur et à   mesure de la lecture du livre.The suspense kept me spellbound throughout the book.Passe-moi les verres au fur et à   mesure.Pass me the glasses as you go (around the table picking them up). Note that you cant use au fur et à   mesure with passive actions such as watching TV, listening to the radio, or taking a bath. To talk about a passive action that occurs at the same time as another action, use tandis que.

Wednesday, January 1, 2020

The And Its Effect On Society - 1427 Words

Throughout the ages, the centuries that have passed, there have always been those that have suffered in silence or amidst the pity of others, and there has always been the question of whether the suffering makes us stronger as a person and leads to success, or damages us and we never truly recover. It is true, we are all different, stigmas affect us in various ways and can either aid us or hinder us; however, one thing that unites us is our courage, our belief, and our will, the will that will either make us or break us. Strength, it can be more than brute force, it is more than brute force, it is also courage and determination; when those are extinguished, I fear strength has died and in its place is spawned a type of pestilence, a strength known as pessimistic strength, a cavern in which all of the defeated gather and dwell on their failures. Being pessimistic is the effortless way out, it is the path that is lined without light and without success; being optimistic is the stronger way out, it is the path that is lined without darkness and without fear of failing; optimism often times brings with it failure, but those who are strong know that failure is a necessary part of success, those who are strong know that success requires never giving in to pessimism, and they know, above all, that success comes because failure has first graced them and they never gave up, no matter what the circumstance. There have been many who have suffered and found success, one such example isShow MoreRelatedSociety s Effect On Society1419 Words   |  6 PagesSociety has a set way of perceiving everyone in the world. There are set things and places in which we all â€Å"belong† to and if we do not fit that then we somehow find ourselves isolated from the normal population. People dream and long for the day where they can fulfill the â€Å"American† dream where they settle down with someone of the opposite gender, fall in love, get married, and eventually try for a baby. People wait for nine-months of long and hard obstacles to finally meet their baby boy or babyRead MoreThe And Its Effect On Society1343 Words   |  6 PagesIn any society encompassed by varying ideologies, change is inevitable. This inescapable component is one that results from an exposure to different truths and realities in life. As we are under the pressure of change, we tend to develop a certain set of belie fs and our comprehension of things are altered. In government, for example, what we perceive to be morally just is all dependent upon how the laws function. We must first understand the role of the government. Essentially, the government assumesRead MoreThe And Its Effects On Society1410 Words   |  6 Pagesupon time, and many ages ago, there was an ancient planet called Kaspaar. This land was so old, no inhabitant alive could remember the year of the creation of the world. This land is much like ours. We could even live there, in fact, with no ill effects. The way it looks, though, is very different from Earth. It may have mountains similar to ours, but its turquoise waters teem with rainbow-colored fish, and that fair planet’s bluish lands bristles with life. There is intelligent life, called aquilaRead MoreThe And Its Effects On Society1703 Words   |  7 PagesNewly materialized from the production line, the young Dalek solider found a place amongst his comrades. It was a place in which he would unhesitatingly fight to rid the universe of all inferior races and conquer planet after planet for the superior Daleks. â€Å"EXTERMINATE! EXTERMINATE!† the army chanted as they prepared to make contact with the planet called Earth. Their mission was to destroy all life forms on earth, particularly humans. Unlike Daleks, human beings frail organic flesh was exposedRead MoreThe And Its Effects On Society Essay1432 Words   |  6 Pagesare confronted with a deep type of fear in reaction to the bizarre rituals of their new host culture (Hollander, 2013). The symbols that represent the ideals of an individual’s individuality; in comparison, these immigrants are used to a collective society. Immigrants are overwhelmed with survivor’s remorse for having escaped and protected themselves (Hollander, 2013). These refugees frequently confront symptoms, which include bewilderment, misperception, severe self-distrust, nightmares, sleeplessnessRead MoreThe And Its Effects On Society1072 Words   |  5 PagesNearly four people obtain a voice each second, of each day. Likewise, approximately two people lose their own voices within the same second. Society and people, tend to overlook the intangible treasures in life. Such as freedom, or family. But nearly everyone tends to forget the power they hold within themselves. We are all granted a gift when we first enter this earth, a gift often wasted. Even if born mute, our voice is not simply heard through speech. In the moments of hardships, there are individualsRead MoreThe Effects Of Drugs And Its Effects On Society1670 Words   |  7 PagesMany people don’t consider the real effects of drugs when they are about to use it. In today’s society, there are various types of drugs or substances that are either on the legal or illegal side. Just because a substance is legal does not make it beneficial and vice versa. The main categories of drugs are stimulants, depressants, and hallucinogens. The drug category that I would like to focus on is stimulants. The most heavily and frequently used stimulant, which is caffeine. Never does it crossRead MoreThe Effects Of Drugs And Its Effects On Society1221 Words   |  5 Pagesteenager who have lost of pressure from their school and parents, they want to try some thing can make them stress out. Use drug can make them stress out, so they can not stop using drug.You might be feeling pressure from your friends, other people, or society as a whole through movies, music or advertising to use drugs or drink alcohol. Saying no to drugs and alcohol when people around you are using them can be tough. But sometimes the easiest way to fight pressure is to be honest and simply say no. ByRead MoreThe Effects Of Anorexia And Its Effects On Society774 Words   |  4 Pagessystem in Western culture, there is often a large degree of confusion and extremely different practices. We have talked about many things in class that the Western culture has probably created. The obsession with perfection and body image in our society has caused many problems, one of which being anorexia. Anorexia is not just about having no fat or feeling overweight. Organs start shutting down and hair grows in places that it doesn’t normally grow to insulate the body. It can be very dangerousRead MoreThe And Its Effects On Society1933 Words   |  8 PagesThe caption is haunting and have been floating around the internet captures poignancy of the moments probably sums up the realism of existence! The final utterances of the boy at the tender age of 3 years before departing from this world surely alerts that encountering death is inevitable prospect of every human. Whilst death forms part and parcel of the cradle to grave cycle and consumes thousands every second of the day it also raises the question of the afterlife in store for humans. Humans by