Comparative Analysis of AES and RC4 Algorithms for Better Utilization
نویسنده
چکیده
-In the today world, security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. But on the other hand, they consume significant amount of computing resources like CPU time, memory, encryption time etc. Normally, symmetric key algorithms are used over asymmetric key algorithms as they are very fast in nature. Symmetric algorithms are classified as block cipher and stream ciphers algorithms. In this paper, we compare the AES algorithm with different modes of operation (block cipher) and RC4 algorithm (stream cipher) in terms of CPU time, encryption time, memory utilization and throughput at different settings like variable key size and variable data packet size. Keywords-Encryption, Decryption, Block and Stream Ciphers, AES, RC4
منابع مشابه
Analysis of energy consumption of RC4 and AES algorithms in wireless LANs
Encryption algorithms are known to be computationally intensive. They consume a significant amount of computing resources such as CPU time, memory, and battery power. A wireless device, usually with very limited resources, especially battery power, is subject to the problem of energy consumption due to encryption algorithms. Designing energy efficient security protocols first requires an unders...
متن کاملDynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic algorithms are usually used to address these security concerns. However, along with security there are other factors that need to be considered for practical ...
متن کاملSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Received May 5 th , 2012 Revised May 31 st , 2012 Accepted June 2 nd , 2012 In open literature there is a lack of focus on Shannon‟s secrecy of ciphers as a security measurement of symmetric key encryption, hence in this research, Shannon‟s theories on secrecy of ciphers were used to calculate the average secrecy of each symmetric cipher used in this research. All secrecy and performance analys...
متن کاملSecurity Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box
---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Encryption is primary method of protecting valuable electronic information transmitted over the networks. SSL/TLS can help to secure transmitted data using various encryption algorithms. AES is one of ciphering algorithm which is used for encryptio...
متن کاملAdvanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS)
Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011