Back
 JIS  Vol.11 No.3 , July 2020
Comparative Study of Different Cryptographic Algorithms
Abstract: With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of data user can be maintained as well as security and privacy of data provided to the user. Symmetric key cryptography is a part of the cryptographic technique which ensures high security and confidentiality of data transmitted through the communication channel using a common key for both encryption and decryption. In this paper I have analyzed comparative encryption algorithms in performance, three most useful algorithms: Data Encryption Standard (DES), Triple DES (3DES) also known as Triple Data Encryption Algorithm (TDEA), and Advanced Encryption Standard (AES). They have been analyzed on their ability to secure data, time taken to encrypt data and throughput the algorithm requires. The performance of different algorithms differs according to the inputs.
Cite this paper: Hamouda, B. (2020) Comparative Study of Different Cryptographic Algorithms. Journal of Information Security, 11, 138-148. doi: 10.4236/jis.2020.113009.
References

[1]   Kumar, A.Y. (2013) Comparative Study of Different Symmetric Key. International Journal of Application or Innovation in Engineering & Management, 2, 204-206.

[2]   Abd Elminaam, D., Abdual Kader, H.M. and Hadhoud, M.M. (2010) Evaluation of the Performance of Symmetric Encryption Algorithms. International Journal of Network Security, 10, 216-222.

[3]   Karule, K.P. and Nagrale, N.V. (2016) Comparative Analysis of Encryption Algorithms for Various Types of Data Files for Data Security. International Journal of Scientific Engineering and Applied Science, 2, 495-498.

[4]   Pavithra, S. and Ramadevi, E. (2012) Study and Performance Analysis of Cryptography Algorithms. International Journal of Advanced Research in Computer Engineering & Technology, 1, 84.

[5]   Stallings, W. (2014) Cryptography and Network Security Principles and Practice. Sixth Edition, Prentice Hall, Upper Saddle River.

[6]   Forouzan, B.A. (2007) Cryptography and Network Security. Special Indian Edition, Tata McGraw-Hill Publishing Company Limited, New Delhi.

[7]   Mathur, M. and Kesarwani, A. (2013) Comparison between DES, 3DES, RC2, RC6, Blowfish and AES. Proceedings of National Conference on New Horizons in IT, NCNHIT, Mumbai, September 2013, 143-148.

[8]   Alanazi, H.O., Zaidan, A.A., Jalab, H.A., Shabbir, M. and Al-Nabhani, Y. (2010) New Comparative Study between DES, 3DES and AES within Nine Factors. Journal of Computing, 2, 152-157.

[9]   Bala, T. and Kumar, Y. (2015) Asymmetric Algorithms and Symmetric Algorithms: A Review. Proceedings on International Conference on Advancements in Engineering and Technology ICAET, August 2015, 1-4.

[10]   Verma, A., Guha, P. and Mishra, S. (2016) Comparative Study of Different Cryptographic Algorithms. International Journal of Emerging Trends & Technology in Computer Science, 5, 58-63.

[11]   Taqa, A., Zaidan, A.A. and Zaidan, B.B. (2009) New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm. International Journal of Computer and Electrical Engineering, 1, 566-571.
https://doi.org/10.7763/IJCEE.2009.V1.87

[12]   Abomhara, M., Zakaria, O., Khalifa, O.O., Zaidan, A.A. and Zaidan, B.B. (2010) Enhancing Selective Encryption for H.264/AVC Using Advance Encryption Standard. International Journal of Computer and Electrical Engineering, 2, 223-229.
https://doi.org/10.7763/IJCEE.2010.V2.141

[13]   Naji, A.W., Hameed, S.A., Zaidan, B.B., Al-Khateeb, W.F., Khalifa, O.O., Zaidan, A.A. and Gunawan, T.S. (2009) Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advance Encryption Standard and Distortion Techniques. International Journal of Computer Science and Information Security, 3, 73-78.

[14]   Alanazi, H., Jalab, H.A., Zaidan, A.A. and Zaidan, B.B. (2010) New Frame Work of Hidden Data with in Non-Multimedia File. International Journal of Computer and Network Security, 2, 46-54.

[15]   Jeeva, A.L., Palanisamy, V. and Kanagaram, K. (2012) Comparative Analysis of Performance Efficiency and Security Measures of Some Encryption Algorithms. International Journal of Engineering Research and Applications, 2, 3033-3037.

[16]   Sivakumar, R., Balakumar, B. and Arivu Pandeeswaran, V. (2018) A Study of Encryption Algorithms (DES, 3DES and AES) for Information Security. International Research Journal of Engineering and Technology, 5, 4133-4137.

 
 
Top