A Review and Comparative Analysis of Various Encryption Algorithms

被引:69
|
作者
Bhanot, Rajdeep [1 ]
Hans, Rahul [2 ]
机构
[1] DAV Univ Jalandhar, Comp Sci & Engn Dept, Jalandhar, Punjab, India
[2] DAV Univ Jalandhar, Dept CSE, Jalandhar Punjab, India
关键词
Security; Cryptograph; Algorithm; Key; Cipher; Security attacks; NIST etc;
D O I
10.14257/ijsia.2015.9.4.27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now days, Data security is very challenging issue that touches many areas including computers and communication. Recently, we came across many attacks on cyber security that have played with the confidentiality of the users. These attacks just broke all the security algorithms and affected the confidentiality, authentication, integrity, availability and identification of user data. Cryptography is one such way to make sure that confidentiality, authentication, integrity, availability and identification of user data can be maintained as well as security and privacy of data can be provided to the user. Encryption is the process of converting normal data or plaintext to something incomprehensible or cipher-text by applying mathematical transformations or formulae. These mathematical transformations or formulae used for encryption processes are called algorithms. We have analysed ten data encryption algorithms DES, Triple DES, RSA, AES, ECC, BLOWFISH, TWOFISH, THREEFISH, RC5 and IDEA etc. Among them DES, Triple DES, AES, RC5, BLOWFISH, TWOFISH, THREEFISH and IDEA are symmetric key cryptographic algorithms. RSA and ECC are asymmetric key cryptographic algorithms. In this paper, we have analysed various encryption algorithms on the basis of different parameters and compared them to choose the best data encryption algorithm so that we can use it in our future work.
引用
收藏
页码:289 / 306
页数:18
相关论文
共 50 条
  • [1] Comparative Analysis and Implementation of Image Encryption Algorithms
    Kaur, Rajinder
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (12): : 53 - 57
  • [2] Comparative Analysis of Some Typical Encryption Algorithms and Hash Algorithms
    Li, Jiaxun
    [J]. 2022 INTERNATIONAL CONFERENCE ON BIG DATA, INFORMATION AND COMPUTER NETWORK (BDICN 2022), 2022, : 27 - 30
  • [3] Performance Analysis of various Encryption Algorithms for usage in Multistage Encryption for Securing Data in Cloud
    Chennam, Krishna Keerthi
    Muddana, Lakshmi
    Aluvalu, Rajani Kanth
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 2030 - 2033
  • [4] Comparative Analysis of Joint Encryption and Watermarking Algorithms for Security of Biomedical Images
    Bansal, Siddhant
    Mehta, Garima
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 609 - 612
  • [5] Comparative Analysis of Different Implementations of Encryption Algorithms on FPGA Network Cards
    Smekal, David
    Hajny, Jan
    Martinasek, Zdenek
    [J]. IFAC PAPERSONLINE, 2018, 51 (06): : 312 - 317
  • [6] Performance Evaluation of Various Symmetric Encryption Algorithms
    Kansal, Shaify
    Mittal, Meenakshi
    [J]. 2014 INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2014, : 105 - 109
  • [7] Image Encryption using Various Transforms-A Brief Comparative Analysis
    Agrawal, Hemlata
    Kalot, Dimple
    Jain, Ankita
    Kahtri, Narendra
    [J]. 2014 ANNUAL INTERNATIONAL CONFERENCE ON EMERGING RESEARCH AREAS: MAGNETICS, MACHINES AND DRIVES (AICERA/ICMMD), 2014,
  • [8] Comparative Analysis for the New Generation of Encryption Algorithms Involved in NESSIE and CRYPTREC Projects
    Racuciu, Ciprian
    Grecu, Dan
    Medeleanu, Florin
    Jula, Nicolae
    Raducanu, Dan
    [J]. PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, MAN-MACHINE SYSTEMS AND CYBERNETICS (CIMMACS '08): RECENT ADVANCES IN COMPUTATIONAL INTELLIGENCE, MAN-MACHINE SYSTEMS AND CYBERNETICS, 2008, : 186 - +
  • [9] Survey on Various Performance Metrices for Lightweight Encryption Algorithms
    Chintala, Radhika Rani
    Venkateswarlu, Somu
    [J]. THIRD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND CAPSULE NETWORKS (ICIPCN 2022), 2022, 514 : 274 - 283
  • [10] Performance Analysis of Various Fuzzy Clustering Algorithms: A Review
    Gosain, Anjana
    Dahiya, Sonika
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 100 - 111