Performance Evaluation of Symmetric Encryption Algorithms

被引:0
|
作者
Elminaaml, Diaa Salama Abdul. [1 ]
Kader, Hatem Mohamed Abdul [2 ]
Hadhoud, Mohie Mohamed [2 ]
机构
[1] Higher Technol Inst, Fac Comp & Informat, 10th Ramadan City, Egypt
[2] Menoufia Univ, Fac Comp & Informat, Shibin Al Kawm, Egypt
关键词
Encryption techniques; Computer security; AES; DES; RC2; 3DES; Blowfish; RC6;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm.
引用
收藏
页码:280 / 286
页数:7
相关论文
共 50 条
  • [21] Performance Analysis of Encryption Algorithms on Smartwatches
    Centeno, Joseph Kyle M.
    Chhabra, Prabhmehar S.
    Fianza, Chynna L.
    Montes-Austria, Isabel
    Ocampo, Roel
    PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE, 2018, : 0162 - 0166
  • [22] Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms
    Nisanci, Gorkem
    Flikkema, Paul G.
    Yalcin, Tolga
    CRYPTOGRAPHY, 2022, 6 (03)
  • [23] Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms
    Yassein, Muneer Bani
    Aljawarneh, Shadi
    Qawasmeh, Ethar
    Mardini, Wail
    Khamayseh, Yaser
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICET), 2017,
  • [24] Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption
    Hussien F.T.A.
    Khairi T.W.A.
    International Journal of Interactive Mobile Technologies, 2023, 17 (10) : 193 - 211
  • [25] Digital Watermarking Image Compression Method Based on Symmetric Encryption Algorithms
    Tan, Yanli
    Zhao, Yongqiang
    SYMMETRY-BASEL, 2019, 11 (12):
  • [26] REQUIREMENTS FOR SYMMETRIC BLOCK ENCRYPTION ALGORITHMS DEVELOPED FOR SOFTWARE AND HARDWARE IMPLEMENTATION
    Kapalova, N. A.
    Sakan, K. S.
    Haumen, A.
    Suleimenov, O. T.
    JOURNAL OF MATHEMATICS MECHANICS AND COMPUTER SCIENCE, 2021, 112 (04): : 134 - 147
  • [27] Two layer Encryption Schemes for Symmetric algorithms using DNA Sequences
    Vantigaru, Siddaramappa
    Basavaraj, Ramesh Krishnarajanagar
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2019, 14 (04): : 953 - 964
  • [28] Performance analysis of AES and MARS encryption algorithms
    Mohan, H.S.
    Raji Reddy, A
    International Journal of Computer Science Issues, 2011, 8 (4 4-1): : 363 - 368
  • [30] Performance impact of addressing modes on encryption algorithms
    Fiskiran, AM
    Lee, RB
    2001 INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, ICCD 2001, PROCEEDINGS, 2001, : 542 - 545