Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms

Authors

  • SO. OKOLIE Department of Computer Science, Babcock University, Remo, Nigeria
  • BT. ADETOBA Department of Computer Science, Babcock University, Remo, Nigeria

Keywords:

Encryption, Performance characteristics, AES, DES, 3DES, Blowfish

Abstract

Security of data in data communication has become an important issue over the years. Consequently, various encryption schemes have come up as a solution, thus making encryption play an important role in information security system. These encryption schemes use some algorithms to scramble data into unreadable text which can only be decoded or decrypted by those that possesses the associated key. These algorithms consume significant amount of computing resources such as CPU time and storage (memory and primary storage). This paper therefore performs comparative analysis of four symmetric key encryption algorithms; AES, DES, 3DES and Blowfish by considering four parameters, encryption time, decryption time, memory usages and number of output bytes. Experimental results using Data Security Model Analyser was used in analysing the effectiveness of each of these algorithms.

 

References

A. Jeeva, V. Palanisamy, K. Kanagaram, “Comparative analysis of performance efficiency and security measures of some encryption algorithms”, International Journal of Engineering Research and Applications, Vol.2, Issue.3, pp.3033-3037, 2012.

DS. Marshall, JP. Harold, “ Cryptography Tutorial: Computer and Network Security”, IEEE Computer Society Press, California, pp.24-32, 1987.

A. Diaasalama, HatemMohamadAbdual K, MH. Mohly, “Evaluating the performance of symmetric encyrption algorithms”, Internatiional Journal of Network Security, Vol. 10, Issue.3, pp.213-219, 2010.

AK. Diaasalama, M. Hadhoud, “Studying the effect of most common encryption algorithms”, International Arab Journal of e-technology, Vol.2, Issue.1, pp.12-20, 2011.

M. Badlawala, F. Ansari, I. Shaikh, N. Chaskar, “Image Steganography with Double Stegging by PVD and AES Encryption”, IJSInternational Journal for Scientific Research & Development, Vol.4, Issue.2, pp.12-18, 2016.

A. Al-Tamimi, “Performance analysis of data encryption algorithms”, 2011 3rd International Conference on Electronics Computer Technology, Kanyakumari, pp.399-403, 2011.

S. Sharma, JS Bisht, “Performance Analysis of Data Encryption Algorithms”, International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.1, pp.1-5, 2015.

Shivlal Mewada, Pradeep Sharma, SS. Gautam, “Classification of Efficient Symmetric Key Cryptography Algorithms”, International Journal of Computer Science and Information Security, Vol.14, Issue.2, pp.105-110, 2016.

YE. Yousif, A. Babiker, A. Mustafa, G. Mohammed, “Review on Comparative Study of Various Cryptography Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.5, Issue.4, pp.1-8, 2015.

OO. Adekanmbi, OO. Omitola, TR. Oyedare, SO. Olatinwo, “ Performance Evaluation of Common Encryption Algorithms for Throughput and Energy Consumption of a Wireless System”, Journal of advancement in engineering and technology, Vol.3, Issue.1, pp.1-8, 2015.

V. Kapoor, "A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013.

Downloads

Published

2016-06-30

How to Cite

[1]
S. OKOLIE and B. ADETOBA, “Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms”, Int. J. Sci. Res. Net. Sec. Comm., vol. 4, no. 3, pp. 1–6, Jun. 2016.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.