Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  A Comparative Study of Symmetric Key Encryption Algorithms  
  Authors : Amit Jain; Divya Bhatnagar
  Cite as:

 

Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of five of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2 and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, battery power consumption, different key size and finally encryption/decryption speed.

 

Published In : IJCSN Journal Volume 3, Issue 5

Date of Publication : October 2014

Pages : 298 - 303

Figures : 07

Tables : 03

Publication Link : A Comparative Study of Symmetric Key Encryption Algorithms

 

 

 

Amit Jain : is working as Assistant Professor in CSE Department at Sir Padampat Singhaniya University, Udaipur. He obtained M.Tech. Degree in Computer Science. His area of Research is “Information Security”. He has published 4 papers in International Conference and 10 papers in national conference. At present he is pursuing Ph.D. in Computer Science from Sir Padampat Singhania University, Udaipur.

Divya Bhatnagar : is presently working as Assistant Professor in the department of Computer Sc. & Engg. at Sir Padampat Singhania University, Udaipur, India. She was born in Gwalior, Madhya Pradesh, India. After completing her Master Degree in 1996 she received Post Graduate Diploma in Operations Management and thereafter, Doctoral Degree in Computer Application in 2012. She has a teaching and administration experience of 17 years in the field of Computer Science and Engineering, Computer Applications, IT, Management, and related fields. She has about 30 research publications in National, International Journals and Conferences. The major research areas of interest are data mining, neural network and privacy preserving data mining.

 

 

 

 

 

 

 

Encryption Techniques

Computer Security

AES

DES

RC2

RC6

This paper presents a performance evaluation of selected symmetric encryption algorithms. The selected algorithms are AES, DES, 3DES, RC6 and RC2. Several points can be concluded from the simulation results. First; there is no significant difference when the results are displayed for encryption or decryption. Secondly; in the case of changing packet size, it was concluded that RC6 has better performance than other common encryption algorithms used. Third; in the case of changing key size – it can be seen that higher key size leads to clear change in the battery and time consumption. Also, we find that 3DES still has low performance compared to algorithm DES.

 

 

 

 

 

 

 

 

 

[1] Ruangchaijatupon, P. Krishnamurthy, ''Encryption and Power Consumption in Wireless LANs-N’’, The 3rd IEEE Workshop on Wireless LANs, September 27-28, 2001, Newton, Massachusetts.

[2] Hardjono, ''Security In Wireless LANS And MANS',' Artech House Publishers 2005.

[3] W. Stallings, ''Cryptography and Network Security 4th Ed”, Prentice Hall, 2005, PP, 58-309.

[4] Coppersmith, D., "The Data Encryption Standard (DES) and Its Strength Against Attacks", IBM Journal of Research and Development, May 1994, PP 243 - 250.

[5] Bruce Schneier, “The Blowfish Encryption Algorithm”.

[6] K. Naik, D. S.L. Wei, “Software Implementation Strategies for Power-Conscious Systems”, Mobile Networks and Applications - 6, PP 291-305, 2001.

[7] Daemen, J. and Rijmen, V., "Rijndael: The Advanced Encryption Standard", Dr. Dobb's Journal, March 2001, PP. 137-139.

[8] N. El-Fishawy, "Quality of Encryption Measurement of Bitmap Images with RC6, MRC6 and Rijndael Block Cipher Algorithms", International Journal of Network Security, , Nov. 2007, PP. 241–251

[9] K. McKay, ''Trade-offs Between Energy and Security in Wireless Networks Thesis',' Worcester Polytechnic Institute, April 2005.

[10] R. Chandramouli, ''Battery power-aware encryption - ACM Transactions on Information and System Security (TISSEC)',' Volume 9, Issue 2, May. 2006.

[11] S.Hirani, ''Energy Consumption of Encryption Schemes in Wireless Devices Thesis”, university of Pittsburgh, April 9, 2003.

[12] "A Performance Comparison of Data Encryption Algorithms”, IEEE First International Conference, ICICT 2005, PP. 84- 89.

[13] Results of comparing tens of encryption algorithms using different settings - Crypto++ benchmark. Retrieved October 1, 2008, from: http://www.eskimo.com/~weidai/benchmarks.html

[14] S.Z.S. Idrus, S.A. Aljunid, S.M. Asi, ''Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008, PP 20-25.

[15] A.A. Tamimi, ''Performance Analysis of Data Encryption Algorithms”, Retrieved October 1, 2008 from http://www.cs.wustl.edu/~jain/cse567- 06/ftp/encryption_perf /index.html

[16] Sinha, A.P. Chandrakasan, JouleTrack, ''A Web Based Tool for Software Energy Profiling” proceedings of the 38th Design, NV, Las Vegas, US P.P. 220-225