Abstract :
Information security is the combination of policies, rules and practices to prevent any unauthorized access or attacks that causes corruption to data, information, and computing services. Information security techniques and programs are built around the core objective to secure data and information by adapting encryption algorithms methods. Encryption algorithm methods impeded in the information security programs or encryption software tools enforce more security by encrypting and decrypting data and information. Encryption algorithm methods are based on algorithms that scramble data and information by converting them into unreadable text. There are various encryption methods used in various encryption software tools. The more encryption algorithm methods used within the encryption software tool, the more security provided on data and information effective data and information security. In this paper, the most used encryption algorithm methods are analyzed and evaluated based on their usage in encryption software tools to determine the most encryption algorithm method that is used ensure more security on data and information.
Keywords :
Cipher Text, Cryptography, Encryption, Encryption algorithms, Information Security, Security algorithms.References :
- Cervantes, A., Sloan, T., Hernandez-Castro, J., & Isasi, P. (2018). System steganalysis with automatic fingerprint extraction. PLOS/One, 13(7).
- El-Fishawy, N. &Abu Zaid, O. (2007). Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms. International Journal of Network Security, 5(3), 241–251.
- Fearn, N. (April 26, 2018). The best encryption software tools of 2018. TechradarPro, from https://www.techradar.com/news/top-5-best-encryption-tools
- Gupta, M. & Sharma, A. (2018). A Review Article on Cyber Security, Web Security and Cyber Crime. University Research Resource Journal, 1(2), 70-74.
- IBM. (2018). Size considerations for public and private keys, IBM Knowledge Center, from https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.3.0/com.ibm.zos.v2r3.icha700/keysizec.htm
- Jain, J. & Pal, P. (2017). A Recent Study over Cyber Security and its Elements. International Journal of Advanced Research in Computer Science, 8(3), 791- 793.
- Johnston, N. (Jan 8, 2019). The Best Encryption Software. ToptenReviews, from https://www.toptenreviews.com/software/security/best-encryption-software/
- Joshi, M. & Karkade, R. (2015). Network Security with Cryptography. International Journal of Computer Science and Mobile Computing, 4(1), 201-204.
- Kiran, J., Anusha, M., kumar, A., & Kavya, M. (2016). Cryptography: The Sciene of Secure Communication. International Journal of Computer Science and Network Security (IJCSNS), 16(4), 129-134.
- Kumari, S. (2017). A research Paper on Cryptography Encryption and Compression Techniques. International Journal of Engineering and Computer Science, 6(4), 20915-20919.
- Ma, C., Chandy, J., & Shi, Z. (2017). Algebraic Side-Channel Attack on Twofish. Journal of Internet Services and Information Security (JISIS), 7(2) 32-43.
- Manes, C. (June 12, 2015). The top 24 free tools for data encryption. TechTalk from https://techtalk.gfi.com/the-top-24-free-tools-for-data-encryption/
- Maqsood, F., Ahmad, M., Ali, M., & Shah, M. (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal of Advanced Computer Science and Applications (IJACSA), 8 (6), 442-448.
- Mathur, M. & Kesarwani, A. (2013). Comparison between DES, 3DES, RC2, RC6, BLOWFISH and AES. Proceedings of National Conference on New Horizons in IT (NCNHIT 2013), 143-148.
- Mehta, P., Bansal, M., & Upadhyaya, A. (2015). Stream Cipher and Block Cipher Based Performance Analysis of Symmetric Cryptography Algorithms: AES and DES. International Journal of Modern Trends in ENgneering and Research, 2(7), 262-366.
- Ramaporkalai, T. (2017). Security Algorithms in Cloud Computing. International Journal of Computer Science Trenda and Technology (IJCST), 5(2), 500-503
- Ratnadewi, Adhie, R., Hutama, Y., Ahmar, A., & Setiawan, M. (2018). Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC). IOP Conf. Series: Journal of Physics: Conf. Series 954 012009, 1-9.
- Rijnteu, I. (March 13, 2018). 9+ Free Encryption Software Tools To Protect Your Data. Heimdal Security, from https://heimdalsecurity.com/blog/9-free-encryption-software-tools/
- Roozbahani, F. & Azad, R. (2015). Security Solutions against Computer Networks Threats. International Journal of Advanced Networking and Applications, 7(1), 2576-2581.
- Rubenking, N. (July 17, 2018). The Best Encryption Software for 2019. PC, from https://www.pcmag.com/article/347066/the-best-encryption-software
- Sawant, A., Nitnaware, V., & Deshpande, A. (2018). Advanced Encryption Standard Block Cipher Algorithm. International Journal of Electronics, Electrical and Computational System (IJEECS), 7(3), 366-371.
- Senyoa, P. K., Addaeb, E., & Boatenga, R. (2018). Cloud computing research: A review of research themes, frameworks, methods and future research directions. International Journal of Information Management, 38(1), 128–139.
- Shaleynikov, A. (Oct 13, 2018). The Top 6 Encryption Tools. D Zone, from https://dzone.com/articles/top-6-encryption-software-tools
- Singh, G. & Spriya. (2013). A Study of Encryption Algorithms (RSA, DES, 3DES, and AES) for information security. International Journal of Computer Applications, 67(19), 33-38
- Sloan, T., & Hernandez-Castro, J. (2018). Dismantling OpenPuff PDF steganography. ELSEVIER ScienceDirect, 25 (2018), 90-96.
- Lyasota, Z. (August, 2018). A Guide to Digital Signature Algorithms. Security Zone, from https://dzone.com/articles/digital-signature-1
- Subramanya, S. & Byung, K. (2006). Digital Signatures. IEEE Potentials. 5-8
- Sivaraman, K. (2017). A Comparision Study of RSA and DSA Algorithm in Mobile Cloud Computing. International Journal of Pure and Applied Mathematics, 116(8), 247-253.
- Ebrahim, M., Khan, S. & Khalid, U. (2013). Symmetric Algorithm Survey: a Comparative Analysis. International Journal of Computer Applications, 61(20), 12-19.
- Nazlee, A., Hussin, F., & Ali, N. (2009). Serpent Encryption Algorithm Implementation on Compute Unified Device Architecture (CUDA). Proceedings of 2009 Student Conference on Research and Development (SCOReD 2009), 1-4.
- Naeemabadi, M., Ordoubadi, B., Dehnavi, A., Bahaadinbeigy, K. (2015). Comparison of Serpent, Twofish and Rijndael encryption algorithms in tele-ophthalmology system. Advances in Natural and Applied Sciences, 9(1), 137-149.
- Sumagita, M. & Riadi, I. (2018). Analysis of Secure Hash Algorithm (SHA) 512 for Encryption Process on Web Based Application, 7(4), 373-381.
- Ibrahim, R., Hussain, A., & Kadhim, R. (2015). Implementation of Secure Hash Algorithm Sha-1 by Labview. International Journal of Computer Science and Mobile Computing, 4(3), 61-67.
- Sahu, A. & Ghosh, S. (2017). Review Paper on Secure Hash Algorithm with Its Variants. International Journal of Technical Innovation in Modern Engineering & Science (IJTIMES), 3(5), 1-7.
- Menéndez, M. (2014). How to encrypt a USB storage device with ‘Linux Unified Key Setup’ (LUKS). Miguel Menéndez Pro, from https://miguelmenendez.pro/en/blog/2014/10/encrypt-usb-storage-device-linux-unified-key-setup-luks/
- Sorenson, H. (2001). An Introduction to OpenSSL Part One. Symmantic.Connect, from https://www.symantec.com/connect/articles/introduction-openssl-part-one?page=1
- Rackspace Support (2016). Generate RSA keys with SSH by using PuTTYgen. Rackspace, from https://support.rackspace.com/how-to/generating-rsa-keys-with-ssh-puttygen/
- Constantin, L. (2017). LastPass is scrambling to fix another serious vulnerability. PCWorld, from https://www.pcworld.com/article/3185731/security/lastpass-is-scrambling-to-fix-another-serious-vulnerability.html
- Gibson, S. (2019). Proven security model. LastPass, from https://www.lastpass.com/enterprise/security
- Walfield, N. (2017). An Advanced Introduction to GnuPG. g10 Code GmbH. 1-130.
- Poddebniak, D., Dresen, C., M ̈uller, J., Ising, F., Schinzel, S., Friedberger, S., Somorovsky, J., & Schwenk, J. (2018). Efail: Breaking S/MIME and OpenPGP Email Encryption usingExfiltration Channels. SEC’18 Proceedings of the 27th USENIX Conference on Security Symposium. 549-566.
- Tech148865. (2012). Encrypt or Decrypt Files and Folders with PGP Zip (Windows). Symantec, from https://support.symantec.com/en_US/article.TECH148865.html
- Banakar, V., Shah, A., Shastri, S., & Chidambaram, V. (2019). nalyzing the Impact of GDPR Compliance on Storage Systems. University of Texas at Austin, 1-7.
- Fisher, C. (n.d). STunnel security for Oracle Replace Database TLS for Simplified Best Practice Compliance, from http://syro.org/systemd/otunnel.html.
- Kaelin, M. (2018). Protect sensitive data with these five free encryption apps. TechRepublic, from https://www.techrepublic.com/article/protect-personal-and-sensitive-data-with-these-five-free-encryption-apps/
- Cobb, N. (2013). A Problem Solving Approach to Enterprise FileVault 2 Management and Integration. Western Kentucky University Topscholar, Masters Theses &Specialist Projects. Paper 1296.
- Olson, R. (2012). Performance differences in encryption software versus storage devices. Linnaeus University, School of computer science, physics, and Mathematics, 1-40.
- Greenwald, G. (2014). Why privacy matters. TED Talk, from https://www.privacytools.io/