![]() | Only 14 pages are availabe for public view |
Abstract Recently, the transmission of a large quantity of data via the Internet or further computer networks over communication media has been advanced. Network Security was the most important component in information security since it is accountable for securing all data delivered over networked computers. The aim of this thesis is to increase the security of Blowfish and CAST128 encryption algorithms using DNA and genetic procedures. The two elementary properties of a good cipher; confusion and diffusion were strongly related to the essential characteristics of the proposed algorithm. This encryption algorithm needs to examine and assess the efficiency of the algorithms used for encryption. Consequently, some security and performance issues have been offered typically for data encryption methods. These considerations are used for checking the level of security and useful in judging the quality of encryption algorithms. The security analysis for data encryption displays that the avalanche effect of the proposed algorithm is higher than that of blowfish algorithm. The frequency analysis of suggested algorithm more secure than blowfish algorithm and the strict avalanche criterion of this algorithm is satisfing the condition of completeness and high avalanche effect. Furthermore, the proposed algorithm satisfied the randomness test. Also, the security analysis of the proposed CAST128 algorithm gives high avalanche effect. The frequency analysis of proposed algorithm more secure than CAST128 algorithm and the suggested algorithm satisfied the condition of strict avalanche criterion. The thesis is organized as follows: Chapter 1: Explains the aim and benefits of this work. It also includes a brief summary of the thesis work. Chapter 2: Provides a detail description of the cryptographic systems and defines fundamental concepts of cryptography systems for data encryption. Next, classify different types of ciphers and Categories of cryptography systems are illustrated; symmetric key cryptography and Asymmetric key cryptography. Moreover, stream and block ciphers are presented. Finally, the cryptanalysis attacks are mentioned and the concept of Kerchief’s principle and Shannon theory is introduced. Chapter 3: Introduces a detailed description of the cryptographic systems, following; some of the encryption and decryption algorithms in cryptography, such as DES, AES, Blowfish, and CAST128 algorithms. Chapter 4: Introduces the fundamental concept of DNA in cryptography and the stages of genetic algorithm used in the proposed algorithm. Chapter 5: Gives a detailed description of the proposed algorithms for both blowfish and CAST128 algorithm with their modification. Next, the security measurement will be presented such as avalanche effect, language statistics, and strict avalanche criterion analysis. Furthermore, the randomness test will be applied. Chapter 6: Includes the conclusion of the whole thesis with the future scope of the research so that further research work can be carried out on this topic. |