Performance Analysis of Symmetric Key Cryptographic Algorithms

被引:0
作者
Vyakaranal, Shashidhara [1 ]
Kengond, Shivaraj [1 ]
机构
[1] KLE Technol Univ, Sch Comp Sci & Engn, Hubballi 580031, Karnataka, India
来源
PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP) | 2018年
关键词
Symmetric key algorithms; ECB; Avalanche effect; Energy Consumption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data's security being important aspect of the today's internet is gaining more importance day by day. With the increase in online data exchange, transactions and payments; secure payment and secure data transfers have become an area of concern. Cryptography makes the data transmission over the internet secure by various methods, algorithms. Cryptography helps in avoiding the unauthorized people accessing the data by authentication, confidentiality, integrity and non-repudiation. In order to securely transmit the data many cryptographic algorithms are present, but the algorithm to be used should be robust, efficient, cost effective, high performance and easily deployable. Choosing an algorithm which suits the customer's requirement is an utmost important task. The proposed work discusses different symmetric key cryptographic algorithms like DES, 3DES, AES and Blowfish by considering encryption time, decryption time, entropy, memory usage, throughput, avalanche effect and energy consumption by practical implementation using java. Practical implementation of algorithms has been highlighted in proposed work considering tradeoff performance in terms of cost of various parameters rather than mere theoretical concepts. Battery consumption and avalanche effect of algorithms has been discussed. It reveals that AES performs very well in overall performance analysis among considered algorithms.
引用
收藏
页码:411 / 415
页数:5
相关论文
共 6 条
[1]  
Drashti E., 2015, NAT C REC ADV ENG SU
[2]  
Karthik S, 2014, INT J SCI ENG RES IJ, V2
[3]  
Mandal Akash Kumar, 2012, IJETICS, V1
[4]  
Nithya, 2016, INDIAN J SCI TECHNOL, V9
[5]   A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish [J].
Patil, Priyadarshini ;
Narayankar, Prashant ;
Narayan, D. G. ;
Meena, S. M. .
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 :617-624
[6]  
Toldinas J, 2014, ELEKTRON ELEKTROTECH, V20, P158, DOI [10.5755/j01.eee.20.5.718, 10.5755/j01.eee.20.5.7118]