PERFORMANCE ANALYSIS OF SYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS: DES, AES and BLOWFISH

نویسندگان

  • Nagesh Kumar
  • Jawahar Thakur
  • Arvind Kalia
چکیده

Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. This paper provides a fair comparison between three most common symmetric key cryptography algorithms: DES, AES, and Blowfish. The comparison is made on the basis of these parameters: speed, block size, and key size. Simulation program is implemented using Java programming.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis

Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Hence the search for the best solution to offer the necessary protection against the data intruders’ attacks along with providing these services in...

متن کامل

Performance Analysis of Symmetric Encryption Algorithms for Mobile ad hoc Network

Nowadays applications on internet are growing rapidly, everyone shares their thoughts, feelings, personal data and many more information online, that’s why security is one of the most considerable and important factor in wireless network. Symmetric key Cryptography algorithm is widely used to provide security. In this paper we are implementing symmetric key encryption algorithms in ns2 to compa...

متن کامل

Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography

In the era of information technology, security is essential to transmit confidential information (like credit card details, banking transactions etc) over the unsecured network like internet. It is possibility that the information that is being transferred through network of computers or internet being read by other people. For this we need an efficient and secure way to protect our data. Crypt...

متن کامل

Different Date Block Size Using to Evaluate the Performance between Different Symmetric Key Algorithms

The different computer networks whether wired or wireless are becoming more popular with its high security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks. One of these technique is a cryptography technique that makes the data as unreadable during the transfer hence; there is no chance to reclaim the information. Presently, most of the users are...

متن کامل

Performance Evaluation of RC6, Blowfish, DES, IDEA, CAST-128 Block Ciphers

Rapid growth of internet applications fueled the need for securing information and computers. Encryption algorithms play vital role to secure information. This paper provides comparison of most common encryption algorithms namely: DES, Blowfish, CAST-128, RC6, IDEA. Performance evaluation is carried out on the basis of execution time and throughput. These algorithms has different key and block ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011