Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography
نویسنده
چکیده
In the era of information technology, security is essential to transmit confidential information (like credit card details, banking transactions etc) over the unsecured network like internet. It is possibility that the information that is being transferred through network of computers or internet being read by other people. For this we need an efficient and secure way to protect our data. Cryptographic algorithms play a vital role in providing data security. Cryptography algorithms are divided into Symmetric and Asymmetric key cryptography. Symmetric Cryptography is further divided into Block Ciphers and Stream ciphers. This paper discusses Performance and Efficiency Analysis of different block cipher algorithms (DES, 3DES, CAST-128, BLOWFISH, IDEA & RC2) of Symmetric Key Cryptography. Block cipher algorithms has been compared based on the following factors: input size of data (in the form of text, audio and video), encryption time, decryption time, throughput of encryption and decryption of each block ciphers and power consumption. If throughput value of a block cipher is increased then power consumption value of that cipher is decreased and vice versa. From Experimental results, we analysed performance and efficiency of these block cipher algorithms (DES, 3DES, CAST-128, BLOWFISH, IDEA & RC2). Keywords— Cryptography, Algorithms, Block, Stream ,Ciphers, Symmetric, Asymmetric, DES, 3DES, CAST-128, BLOWFISH, IDEA, RC2
منابع مشابه
Hybrid encryption/decryption technique using new public key and symmetric key algorithm
This research study proposes Hybrid Encryption System using new public key algorithm and private key algorithm. A hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetrickey cryptosystem. Here, we propose a provably two way secured data encryption system, which addresses the concerns of user’s privacy, authentication and accuracy....
متن کاملComparative Analysis of AES and RC4 Algorithms for Better Utilization
-In the today world, security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. But on the other hand, they consume significant amount of computing resources like CPU time, memory, encryption time etc. Normally, symmetric...
متن کاملComparison of two Public Key Cryptosystems
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...
متن کاملPACMA : An Adaptive Symmetric Cryptographic Algorithm for Parallel Computing Environments
Traditional symmetric cryptographic algorithms are designed considering the cryptographic complexities rather than the processing capacities of the modern computing systems. Hence the performances of these algorithms are inconsistent and vary enormously when implemented in different computing systems with different processing capabilities. Parallelized adaptive cryptographic algorithms that can...
متن کاملAmbiguous Multi-Symmetric Scheme and Applications
This paper introduces and evaluates the performance of a novel cipher scheme, Ambiguous Multi-Symmetric Cryptography (AMSC), which conceals multiple coherent plain-texts in one cipher-text. The cipher-text can be decrypted by different keys to produce different plain-texts. Security analysis showed that AMSC is secure against cipher-text only and known plain-text attacks. AMSC has the following...
متن کامل