A Review and Comparative Analysis of Various Encryption Algorithms

被引:69
|
作者
Bhanot, Rajdeep [1 ]
Hans, Rahul [2 ]
机构
[1] DAV Univ Jalandhar, Comp Sci & Engn Dept, Jalandhar, Punjab, India
[2] DAV Univ Jalandhar, Dept CSE, Jalandhar Punjab, India
关键词
Security; Cryptograph; Algorithm; Key; Cipher; Security attacks; NIST etc;
D O I
10.14257/ijsia.2015.9.4.27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now days, Data security is very challenging issue that touches many areas including computers and communication. Recently, we came across many attacks on cyber security that have played with the confidentiality of the users. These attacks just broke all the security algorithms and affected the confidentiality, authentication, integrity, availability and identification of user data. Cryptography is one such way to make sure that confidentiality, authentication, integrity, availability and identification of user data can be maintained as well as security and privacy of data can be provided to the user. Encryption is the process of converting normal data or plaintext to something incomprehensible or cipher-text by applying mathematical transformations or formulae. These mathematical transformations or formulae used for encryption processes are called algorithms. We have analysed ten data encryption algorithms DES, Triple DES, RSA, AES, ECC, BLOWFISH, TWOFISH, THREEFISH, RC5 and IDEA etc. Among them DES, Triple DES, AES, RC5, BLOWFISH, TWOFISH, THREEFISH and IDEA are symmetric key cryptographic algorithms. RSA and ECC are asymmetric key cryptographic algorithms. In this paper, we have analysed various encryption algorithms on the basis of different parameters and compared them to choose the best data encryption algorithm so that we can use it in our future work.
引用
收藏
页码:289 / 306
页数:18
相关论文
共 50 条
  • [21] A Comparative Analysis of Various Adaptive Equalizer Algorithms for different Frequency Scenario
    Sharma, Neha
    Mishra, Samir
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [22] Comparative Analysis of Support Vector Machine: Employing Various Optimization Algorithms
    Khalid, M. A. R.
    Alwaqdani, Majid
    Farquad, M. A. H.
    [J]. 2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 171 - 174
  • [23] A COMPARATIVE-ANALYSIS OF VARIOUS LEAST-SQUARES IDENTIFICATION ALGORITHMS
    GRAUPE, D
    JAIN, VK
    SALAHI, J
    [J]. AUTOMATICA, 1980, 16 (06) : 663 - 681
  • [24] Performance Analysis of Symmetric Encryption Algorithms for their Encryption and Decryption Time
    Advani, Nilesh Amarbhai
    Gonsai, Atul M.
    [J]. PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 359 - 362
  • [25] Analysis and Comparison of Image Encryption Algorithms
    Oeztuerk, Ismet
    Sogukpinar, Ibrahim
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 26 - 30
  • [26] Analysis of Various Task Scheduling Algorithms in Cloud Environment: Review
    Panwar, Neelam
    Rauthan, Manmohan Singh
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 255 - 261
  • [27] Performance Analysis of Encryption Algorithms on Smartwatches
    Centeno, Joseph Kyle M.
    Chhabra, Prabhmehar S.
    Fianza, Chynna L.
    Montes-Austria, Isabel
    Ocampo, Roel
    [J]. PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE, 2018, : 0162 - 0166
  • [28] Comparison of Various Routing and Compression Algorithms: A Comparative Study of Various Algorithms in Wireless Networking
    Preet, Shiv
    Luhach, Ashish Kr.
    Luhach, Ravindra
    [J]. SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 128 - 134
  • [29] A COMPARATIVE STUDY OF PERFORMANCE BASED CRYPTO ANALYSIS FEATURES FOR STANDARD DATA ENCRYPTION ALGORITHMS WITH (MODDES)
    Chelluri, A. R. Krishna
    Ghosh, D.
    Chattopadhyay, Pinaki
    Gope, Prosanta
    [J]. ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 164 - 168
  • [30] Comparative evaluation of fully homomorphic encryption algorithms in cloud environment
    Mittal, Sonam
    Ramkumar, K. R.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2023, 15 (04) : 333 - 347