PERFORMANCE ANALYSIS OF SYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS: DES, AES and BLOWFISH
نویسندگان
چکیده
Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. This paper provides a fair comparison between three most common symmetric key cryptography algorithms: DES, AES, and Blowfish. The comparison is made on the basis of these parameters: speed, block size, and key size. Simulation program is implemented using Java programming.
منابع مشابه
DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis
Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Hence the search for the best solution to offer the necessary protection against the data intruders’ attacks along with providing these services in...
متن کاملPerformance Analysis of Symmetric Encryption Algorithms for Mobile ad hoc Network
Nowadays applications on internet are growing rapidly, everyone shares their thoughts, feelings, personal data and many more information online, that’s why security is one of the most considerable and important factor in wireless network. Symmetric key Cryptography algorithm is widely used to provide security. In this paper we are implementing symmetric key encryption algorithms in ns2 to compa...
متن کاملPerformance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography
In the era of information technology, security is essential to transmit confidential information (like credit card details, banking transactions etc) over the unsecured network like internet. It is possibility that the information that is being transferred through network of computers or internet being read by other people. For this we need an efficient and secure way to protect our data. Crypt...
متن کاملDifferent Date Block Size Using to Evaluate the Performance between Different Symmetric Key Algorithms
The different computer networks whether wired or wireless are becoming more popular with its high security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks. One of these technique is a cryptography technique that makes the data as unreadable during the transfer hence; there is no chance to reclaim the information. Presently, most of the users are...
متن کاملPerformance Evaluation of RC6, Blowfish, DES, IDEA, CAST-128 Block Ciphers
Rapid growth of internet applications fueled the need for securing information and computers. Encryption algorithms play vital role to secure information. This paper provides comparison of most common encryption algorithms namely: DES, Blowfish, CAST-128, RC6, IDEA. Performance evaluation is carried out on the basis of execution time and throughput. These algorithms has different key and block ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011