Performance Evaluation of Symmetric Encryption Algorithms

被引:0
|
作者
Elminaaml, Diaa Salama Abdul. [1 ]
Kader, Hatem Mohamed Abdul [2 ]
Hadhoud, Mohie Mohamed [2 ]
机构
[1] Higher Technol Inst, Fac Comp & Informat, 10th Ramadan City, Egypt
[2] Menoufia Univ, Fac Comp & Informat, Shibin Al Kawm, Egypt
关键词
Encryption techniques; Computer security; AES; DES; RC2; 3DES; Blowfish; RC6;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm.
引用
收藏
页码:280 / 286
页数:7
相关论文
共 50 条
  • [31] Performance Analysis of Encryption Algorithms on Mobile Devices
    Montoya, Alber O. B.
    Munoz, Mario A. G.
    Kofuji, Sergio T.
    2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
  • [32] Performance Analysis of Encryption Algorithms for Information Security
    Ramesh, A.
    Suruliandi, A.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 840 - 844
  • [33] The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms
    Tutubalin, Pavel Innokentievich
    Mokshin, Vladimir Vasilevich
    2017 SECOND RUSSIA AND PACIFIC CONFERENCE ON COMPUTER TECHNOLOGY AND APPLICATIONS (RPC 2017), 2017, : 180 - 183
  • [34] Power evaluation methods for data encryption algorithms
    Nie, Tingyuan
    Zhou, Lijian
    Lu, Zhe-Ming
    IET SOFTWARE, 2014, 8 (01) : 12 - 18
  • [35] A New Symmetric Key Encryption Algorithm With Higher Performance
    Murtaza, Abid
    Pirzada, Syed Jahanzeb Hussain
    Liu Jianwei
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET), 2019,
  • [36] A Performance Evaluation of CAN Encryption
    Chen, Hanlin
    Yang, Baijian
    2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 140 - 149
  • [37] Performance Evaluation of Symmetric Cryptographic Algorithms in resource constrained hardware for Wireless Sensor Networks
    Gonzalez-Arango, Juan C.
    Ocampo-Munera, Diana C.
    Castano-Londono, Luis
    Goez-Sanchez, David
    Velasquez-Velez, Ricardo
    IEEE LATIN AMERICA TRANSACTIONS, 2021, 19 (10) : 1632 - 1639
  • [38] algoTRIC: Symmetric and Asymmetric Encryption Algorithms for Cryptography - A Comparative Analysis in AI Era
    Kshetri, Naresh
    Rahman, Mir Mehedi
    Rana, Md Masud
    Osama, Omar Faruq
    Hutson, James
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (12)
  • [39] Symmetric encryption algorithms using chaotic and non-chaotic generators: A review
    Radwan, Ahmed G.
    AbdElHaleem, Sherif H.
    Abd-El-Hafiz, Salwa K.
    JOURNAL OF ADVANCED RESEARCH, 2016, 7 (02) : 193 - 208
  • [40] Evaluation of formatpreserving encryption algorithms for critical infrastructure protection
    Agbeyibor, Richard
    Butts, Jonathan
    Grimaila, Michael
    Mills, Robert
    IFIP Advances in Information and Communication Technology, 2014, 441 : 245 - 261