Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  A Comparative Study of Cryptographic Algorithms  
  Authors : Manzoor Hussain Dar; Pardeep Mittal; Vinod Kumar
  Cite as:

 

Cryptography is the art and science of keeping massages secure. It is the study of techniques related to aspects of information security such as information privacy, integrity, authentication and non-repudiation. Cryptography is almost synonymous with encryption i.e. the conversion of plain text to a cryptic text to secure it against unauthorized users. Encryption techniques are typically divided into two generic types: symmetric key encryption and asymmetric key encryption. Encryption methods in which both the sender and receiver share the same key are referred to as symmetric key encryption schemes. Encryption methods in which encryption and decryption are performed using the different keys, one a public key and one a private key are referred to as asymmetric key encryption schemes. This paper provides a performance comparison between four popular and commonly used encryption algorithms: DES, 3DES, AES, and RSA. DES, 3DES, and AES are symmetric key encryption algorithms while as RSA is an asymmetric key encryption algorithm.

 

Published In : IJCSN Journal Volume 3, Issue 3

Date of Publication : 01 June 2014

Pages : 01 - 04

Figures : --

Tables : 01

Publication Link : A Comparative Study of Cryptographic Algorithms

 

 

 

Manzoor Hussain Dar : is a M. Tech. Scholar (Computer Sc. & Engineering), in the Dept. of Computer Science & Applications, Kurukshetra University, Kurukshetra. His research interests lies in Algorithms, Machine Learning, Systems Programming and Network Security.

Pardeep Mittal : is working as an Assistant Professor in the Department of Computer Science & Applications, Kurukshetra University, Kurukshetra with a teaching experience of fifteen years. His research interest includes Networking, Optimization, Network Security, Simulation, Genetic Algorithms and Compilers. He has published thirteen research papers in international and national journals, conferences and seminars. He has attended many workshops and faculty development programme.

Vinod Kumar : is working as an Assistant Professor in the Dept. of Computer Science & Applications, Kurukshetra University, Kurukshetra with a teaching and technical experience of sixteen years. His research interests includes Medical Image Mining, Data Mining, Web Mining and in the field of Networking. He has published various research papers in international journals and conferences. He has attended many workshops and faculty development program. He is a good counsellor and motivator to the cancer patients from last eighteen years.

 

 

 

 

 

 

 

Cryptography

DES

3DES

AES

RSA

This papers presents a comparative study of various encryption algorithms on various parameters. The selected algorithms are DES, 3DES, AES, and RSA. It can be concluded from the above study that AES has better performance than DES and 3DES. RSA is the most popular asymmetric encryption algorithm which provides security to various business applications. RSA gets its security from the difficulty of factoring large prime numbers. Howverer it requires large key size for providing good security which makes it quite slow.

 

 

 

 

 

 

 

 

 

[1] Stalling,W., “Cryptographyan Network Security: Principles and Practices”. Prentice Hall, 2010.

[2] Elminaam, D.S.A., Kader, H.M.A., Hadhoud, M.M., “Evaluation of the Performance of Symmetric Encryption Algorithms”, International Journal of Network Security, Vol.10, No.3, PP.216–222, May 2010.

[3] Naji, A.W., Zaidan, A.A., Zaidan, B.B., Khalifa, O.O., “Novel Approach of Hidden Data”, International Journal of Computer Science and Information Security, 2009.

[4] Posch, K.C., Posch, R., “Designing a New Encryption Method for Optimum Parallel Performance”, IEEE First International Conference on Algorithms and Architectures for Parallel Processing, Brisbane, Australia 1995.

[5] Kiesler, T., Harn, L., “Cryptographic Master Key Generation Scheme and its Applications to Public Key Distribution”, IEEE Proceedings E-computers and Digital Techniques, 1992.

[6] Rouse, M., “Data Encryption Standard”, 2006.

[7] Avinash, K., “Block Ciphers and the DES”. http://www.engineering.purdue.edu/kak/compsec/.../lectur e3.pdf.

[8] Triple DES Encryption. Tropical Software, 2014. http://www.tropsoft.com/strongenc/des.htm(accessed February, 9, 2014).

[9] Engelfriet, A., DES Encryption Algorithm. http://www.iusmentis.com/technology/encryption/des(acc essed February, 10, 2014).

[10] DES Encryption. Tropical Software. 2014. http://www.tropoft.com/strongenc/des.htm (accessed February, 10, 2014)

[11] Kaufman, C., Perlman, R., Speciner, M., “Network Security: Private Communication in a Public World”. 2nd ed. Upper Saddle River, N J.: Prentice Hall PTR, 2002.

[12] Rijndael. Knowledgerush. 2009. http://www.easybib.com/cite/form/website (accessed February, 10, 2014).

[13] Advanced Encryption Standard (AES). http://csrc.nist.gov/publications/fips/fips-197.pdf (accessed February, 10, 2014).

[14] Paar, C., Pelzi, J., “Understanding Cryptography: A Textbook for Students and Practioners”, ISBN 978-3-642- 04 101-3, 2010.

[15] Daemen, J., Rijmen, V., “AES Proposal:Rijndael”. Sept. 3, 1999.http://www.comms.scitech.sussex.ac.uk/fft/crypo/rij ndael.pdf (accessed February, 9, 2014).

[16] Evgeny, M., The RSA Algorithm. June 2009. http://www.math.washington.edu. (accessed February,11, 2012).