Page 99 - IJEEE-2023-Vol19-ISSUE-1
P. 99
Baban & Hameed | 95
TABLE I only known in specific client and servers and the other is a
COMPARISON BETWEEN SOME SYMMETRIC ALGORITHMS [18, public key[21]. Since encryption ensures just the confidentiality
of the information being sent, a digital signature which is
19] another security technique ensures other security goals such as
non-repudiation, data authentication, and data integrity as
Symmetric Cryptography shown in figure 2. One–way-hash function (SHA256) is used
in the digital process which creates compressed data or digest
Algorithm Key Block Round Security Speed which is often unique and smaller than the plaintext and if any
DES Size Size level change made to the massage can be discovered from a different
RC2 (bits) (bits) Slow, hash result even if the same hash is used [22]. Definition of
AES but HMAC-SHA256 as:
64 64 16 Less speed
secure
40 depends
16 on key !"#$(&, () = !(&?,-./) ? !(& ? 2-./ ? ()) (1)
128,192
and 256 64 (Mixing) Less Fast which uses the following parameters:
+2 secure H = cryptographic hash function = SHA256
Fast, K = secret key
(Mashing) but m = message
speed ¦ = concatenation
128 10,12 ,14 Secure depends ? = exclusive OR
on key opad = outer padding
ipad = inner padding
Fig. 2: HMAC structure with Multi-Hash [23]
Fig. 1: The AES Algorithm's General Structure [7] V. INTRUSION DETECTION SYSTEM (IDS)
IV. THE KEYED-HASH MESSAGE AUTHENTICATION CODE The intrusion can be described as group of activities that
(HMAC) attempt to hack the confidentiality, integrity or availability of a
resource where the monitoring the events occurring in a
HMAC is used to check the integrity of data transmitted computer system or network and analyzing them for signatures
over or stored in an unreliable medium it is considered an any of intrusions and virulent attacks named by Intrusion
essential requirement in open computing and communications. detection. Intrusion Detection System (IDS) is a software or
Procedures that give integrity checks based on a private key hardware system to ensure the intrusion detection process
are generally named message authentication codes (MACs). automatically [24]. IDS is classified based on many various
Usually, message authentication codes are used between two criteria to the present day. A common criterion is the intrusion
sides that share a private key to authenticate information detection method and IDS is divided into two groups according
transmitted always the is MAC used with a hash function to intrusion detection method "anomaly detection" and " Pattern
together with a private key whereas the HMAC uses the private matching or misuse detection"[25].
key for the calculation and verification of the MACs[20].The
HMAC gives two types of keys one of them is a private key that VI. MISUSE DETECTION
The misuse detection process is also known as signature-
based detection. Signature based methodology works by
matching observed signatures to the signatures on record
which is can be a database or a list of known attack
signatures. Every signature seen on the monitored system
which matches the signatures on record is flagged as a
breaking of the security policy or as an attack. The signature-