Open Access   Article Go Back

Comparative Analysis on Different parameters of Encryption Algorithms for Information Security

Md.A. Mushtaque1

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-4 , Page no. 76-82, Apr-2014

Online published on Apr 30, 2014

Copyright © Md.A. Mushtaque . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Md.A. Mushtaque, “Comparative Analysis on Different parameters of Encryption Algorithms for Information Security,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.76-82, 2014.

MLA Style Citation: Md.A. Mushtaque "Comparative Analysis on Different parameters of Encryption Algorithms for Information Security." International Journal of Computer Sciences and Engineering 2.4 (2014): 76-82.

APA Style Citation: Md.A. Mushtaque, (2014). Comparative Analysis on Different parameters of Encryption Algorithms for Information Security. International Journal of Computer Sciences and Engineering, 2(4), 76-82.

BibTex Style Citation:
@article{Mushtaque_2014,
author = {Md.A. Mushtaque},
title = {Comparative Analysis on Different parameters of Encryption Algorithms for Information Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2014},
volume = {2},
Issue = {4},
month = {4},
year = {2014},
issn = {2347-2693},
pages = {76-82},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=112},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=112
TI - Comparative Analysis on Different parameters of Encryption Algorithms for Information Security
T2 - International Journal of Computer Sciences and Engineering
AU - Md.A. Mushtaque
PY - 2014
DA - 2014/04/30
PB - IJCSE, Indore, INDIA
SP - 76-82
IS - 4
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
4030 3432 downloads 3540 downloads
  
  
           

Abstract

In this era information security is a very important issue in every field such as Government Agencies (CBI, FBI), Research Organization, E-commerce and etc. where internet is being used. We want to secure our data from unauthorized user. Cryptography is a technique to secure data on the network from unauthorized user. There are different types of a cryptography algorithm (a) symmetric and (b) asymmetric has been designed. To secure data it is necessary to know which algorithm provides better security, efficiency, accuracy and effectiveness. This paper presents the complete analysis of various symmetric key encryption algorithms (DES, 3DES, CAST-128, MARS, IDEA, Blowfish, AES, and RC6) based on different parameters such as: Architecture, Scalability, Security, Flexibility, and limitations.

Key-Words / Index Term

Symmetric Key, Information Security, Performance Matrices, Encryption, AES, DES, 3DES, CAST-128, MARS, IDEA, Blowfish, RC6

References

[1] A. K. Mandal, C. Parakash and M. A. Tiwari, �Performance Evaluation of Cryptographic Algorithms: DES and AES�, 2012 IEEE Student�s Conference on Electrical, Electronics and Computer Science.
[2] V. Singh and S. K. Dubey, �Analyzing Space Complexity Of Various Encryption Algorithms�, International Journal of Computer Engineering and Technology (IJCET), Volume 4, Issue 1, January- February (2013).
[3] Tingyuan Nie, Yansheng Li and Chuanwang Song, �Performance Evaluation for CAST and RC5 Encryption Algorithms�, International Conference on Computing, Control and Industrial Engineering, IEEE, 2010.
[4] E. Thambiraja, G. Ramesh and Dr. R. Umarani " A Survey on Various Most Common Encryption Techniques", IJARCSSE, Volume 2, Issue 7, July 2012.
[5] A.Ramesh and Dr.A.Suruliandi, �Performance Analysis of Encryption Algorithms for Information Security�, International Conference on Circuits, Power and Computing Technologies [ICCPCT-2013], IEEE, 2013.
[6] Md Asif Mushtaque, H. Dhiman, S. Hussain and Shivangi Maheshwari,�Evaluation of DES, TDES, AES, Blowfish and Twofish Encryption Algorithm Based on Space Complexity�, International Journal of Engineering Research & Technology (IJERT), Vol. 3 Issue 4, April � 2014.
[7] Tingyuan Nie, Yansheng Li and Chuanwang Song, �International Conference on Computing, Control and Industrial Engineering�, IEEE, 2010.
[8] Harmanpreet Singh, Amritpal Singh Danewalia, Deepak Chopra and Naveen Kumar N, "Randomly Generated Algorithms and Dynamic Connections", ISROSET-International Journal of Scientific Research in Network Security and Communication, Volume-02, Issue-01, Page No (1-4), Jan -Feb 2014.
[9] Kirti Aggarwal, Jaspal Kaur Saini, Harsh K. Verma, �Performance Evaluation of RC6, Blowfish, DES, IDEA, CAST-128 Block Ciphers�, International Journal of Computer Applications (0975 � 8887), April 2013, Volume 68� No.25, pp. 10-16.
[10] E. Thambiraja, G. Ramesh and Dr. R. Umarani� A Survey on Various Most Common Encryption Techniques�, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, July 2012.
[11] Z. Zahang and Shiliang sun, �Image encryption algorithm based on logistic chaotic system and s-boxes scrambling�, Image and Signal Processing (CISP), 4th International Congress on (Volume: 1),2011 .
[12] �Practical-Cryptology-and-Web-Security�, http://www.scribd.com/doc/126378371/Practical-Cryptology-and-Web-Security, accessed on 5th april 2014.
[13] Michal Halas, Ivan Bestak, Milos Orgon, and Adrian Kovac, �Performance Measurement of Encryption Algorithms and Their Effect on Real Running in PLC Networks�, IEEE, 2012.
[14] Fei Shao, Zinan Chang and Yi Zhang, �AES Encryption Algorithm Based on the High Performance Computing of GPU�, Second International Conference on Communication Software and Networks DOI 10.1109/ICCSN.2010.124, IEEE, 2010.
[15] Shashi Mehrotra Seth, Rajan Mishra, �Comparative Analysis of Encryption Algorithms for Data Communication�, IJCST , Vol. 2, Iss ue 2, June 2011.
[16] Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani, �NewComparative Study between DES, 3DES and AES�, journal of computing, volume 2, issue 3, march 2010.
[17] Md Imran Alam and Mohammad Rafeek Khan,� Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography�, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, October 2013.