Performance of Various Algorithms Used in Cryptography
نویسنده
چکیده
Performance of cryptosystems is a very important process in measuring the performance of Cryptosystems. Communication is the basic process of exchanging information. The effectiveness of computer communication is mainly based on the security aspects. Security of information transmitted over the network is becoming tougher in spite of the availability of many cryptographic algorithms. This paper provides the various factors affecting the performance of Encryption algorithms .This paper also focuses on the factors which affects the security of the information transmitted over the networks. Since our main concern here is the performance of these algorithms under different settings, the presented comparison takes into consideration the behavior and the performance of the algorithm when different data loads are used. The security of algorithms and performance of a given algorithm depends on variety of parameters such as key size, block size, diffusion and confusion properties. This paper presents the analytical results of the cipher which were analyzed quantitatively based on the above mentioned parameters.
منابع مشابه
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملA Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کاملComparison of two Public Key Cryptosystems
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...
متن کاملLead-Lag Controllers Coefficients Tuning to Control Fuel Cell Based on PSO Algorithm
One of the most important Fuel cells (FCs) is Proton Exchange Membrane Fuel Cells (PEMFCs). The outputvoltage of this FC depends on current loads. This paper tries to introduce, implement and control the voltage ofPEMFC, during load variations. The output voltage of fuel cell should be constant during load variation. Toachieve this goal, a controller should be designed. Here, the Lead-Lag contr...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012