Full Paper View Go Back

Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms

SO. OKOLIE1 , BT. ADETOBA2

1 Department of Computer Science, Babcock University, Remo, Nigeria.
2 Department of Computer Science, Babcock University, Remo, Nigeria.

Correspondence should be addressed to: okolies@babcock.edu.ng.


Section:Research Paper, Product Type: Journal
Vol.4 , Issue.3 , pp.1-6, Jun-2016

Online published on Jun 27, 2016


Copyright © SO. OKOLIE, BT. ADETOBA . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: SO. OKOLIE, BT. ADETOBA, “Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms,” International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.3, pp.1-6, 2016.

MLA Style Citation: SO. OKOLIE, BT. ADETOBA "Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms." International Journal of Scientific Research in Network Security and Communication 4.3 (2016): 1-6.

APA Style Citation: SO. OKOLIE, BT. ADETOBA, (2016). Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms. International Journal of Scientific Research in Network Security and Communication, 4(3), 1-6.

BibTex Style Citation:
@article{OKOLIE_2016,
author = {SO. OKOLIE, BT. ADETOBA},
title = {Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2016},
volume = {4},
Issue = {3},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {1-6},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=233},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=233
TI - Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms
T2 - International Journal of Scientific Research in Network Security and Communication
AU - SO. OKOLIE, BT. ADETOBA
PY - 2016
DA - 2016/06/27
PB - IJCSE, Indore, INDIA
SP - 1-6
IS - 3
VL - 4
SN - 2347-2693
ER -

2117 Views    1398 Downloads    1415 Downloads
  
  

Abstract :
Security of data in data communication has become an important issue over the years. Consequently, various encryption schemes have come up as a solution, thus making encryption play an important role in information security system. These encryption schemes use some algorithms to scramble data into unreadable text which can only be decoded or decrypted by those that possesses the associated key. These algorithms consume significant amount of computing resources such as CPU time and storage (memory and primary storage). This paper therefore performs comparative analysis of four symmetric key encryption algorithms; AES, DES, 3DES and Blowfish by considering four parameters, encryption time, decryption time, memory usages and number of output bytes. Experimental results using Data Security Model Analyser was used in analysing the effectiveness of each of these algorithms.

Key-Words / Index Term :
Encryption, Performance characteristics, AES, DES, 3DES, Blowfish

References :

[1] A. Jeeva, V. Palanisamy, K. Kanagaram, “Comparative analysis of performance efficiency and security measures of some encryption algorithms”, International Journal of Engineering Research and Applications, Vol.2, Issue.3, pp.3033-3037, 2012.
Google Scholar

[2] DS. Marshall, JP. Harold, “ Cryptography Tutorial: Computer and Network Security”, IEEE Computer Society Press, California, pp.24-32, 1987.
Google Scholar

[3] A. Diaasalama, HatemMohamadAbdual K, MH. Mohly, “Evaluating the performance of symmetric encyrption algorithms”, Internatiional Journal of Network Security, Vol. 10, Issue.3, pp.213-219, 2010.
Google Scholar

[4] AK. Diaasalama, M. Hadhoud, “Studying the effect of most common encryption algorithms”, International Arab Journal of e-technology, Vol.2, Issue.1, pp.12-20, 2011.
Google Scholar

[5] M. Badlawala, F. Ansari, I. Shaikh, N. Chaskar, “Image Steganography with Double Stegging by PVD and AES Encryption”, IJSInternational Journal for Scientific Research & Development, Vol.4, Issue.2, pp.12-18, 2016.
Google Scholar

[6] A. Al-Tamimi, “Performance analysis of data encryption algorithms”, 2011 3rd International Conference on Electronics Computer Technology, Kanyakumari, pp.399-403, 2011.
Google Scholar

[7] S. Sharma, JS Bisht, “Performance Analysis of Data Encryption Algorithms”, International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.1, pp.1-5, 2015.
Google Scholar

[8] Shivlal Mewada, Pradeep Sharma, SS. Gautam, “Classification of Efficient Symmetric Key Cryptography Algorithms”, International Journal of Computer Science and Information Security, Vol.14, Issue.2, pp.105-110, 2016.
Google Scholar

[9] YE. Yousif, A. Babiker, A. Mustafa, G. Mohammed, “Review on Comparative Study of Various Cryptography Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.5, Issue.4, pp.1-8, 2015.
Google Scholar

[10] OO. Adekanmbi, OO. Omitola, TR. Oyedare, SO. Olatinwo, “ Performance Evaluation of Common Encryption Algorithms for Throughput and Energy Consumption of a Wireless System”, Journal of advancement in engineering and technology, Vol.3, Issue.1, pp.1-8, 2015.
Google Scholar

[11] V. Kapoor, "A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013.
Google Scholar

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation