Performance Evaluation of Symmetric Encryption Algorithms

被引:0
|
作者
Elminaaml, Diaa Salama Abdul. [1 ]
Kader, Hatem Mohamed Abdul [2 ]
Hadhoud, Mohie Mohamed [2 ]
机构
[1] Higher Technol Inst, Fac Comp & Informat, 10th Ramadan City, Egypt
[2] Menoufia Univ, Fac Comp & Informat, Shibin Al Kawm, Egypt
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2008年 / 8卷 / 12期
关键词
Encryption techniques; Computer security; AES; DES; RC2; 3DES; Blowfish; RC6;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm.
引用
收藏
页码:280 / 286
页数:7
相关论文
共 50 条
  • [1] Performance Evaluation of Symmetric Encryption Algorithms
    Elminaam, D. S. Abdul
    Kader, H. M. Abdul
    Hadhoud, M. M.
    INNOVATION AND KNOWLEDGE MANAGEMENT IN TWIN TRACK ECONOMIES: CHALLENGES & SOLUTIONS, VOLS 1-3, 2009, : 1001 - 1006
  • [2] Performance Evaluation of Various Symmetric Encryption Algorithms
    Kansal, Shaify
    Mittal, Meenakshi
    2014 INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2014, : 105 - 109
  • [3] Performance Analysis of Symmetric Encryption Algorithms for their Encryption and Decryption Time
    Advani, Nilesh Amarbhai
    Gonsai, Atul M.
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 359 - 362
  • [4] Evaluating Performance of Symmetric Encryption Algorithms
    Raigoza, Jaime
    Jituri, Kapil
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 1378 - +
  • [5] Performance evaluation of three encryption/decryption algorithms
    Kofahi, NA
    Al-Somani, T
    Al-Zamil, K
    PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 790 - 793
  • [6] Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms
    Yassein, Muneer Bani
    Aljawarneh, Shadi
    Qawasmeh, Ethar
    Mardini, Wail
    Khamayseh, Yaser
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICET), 2017,
  • [8] Performance Analysis of Encryption Algorithms for Information Security
    Ramesh, A.
    Suruliandi, A.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 840 - 844
  • [9] Performance Evaluation of IoT Encryption Algorithms: Memory, Timing, and Energy
    Maitra, Sudip
    Richards, Dylan
    Abdelgawad, Ahmed
    Yelamarthi, Kumar
    2019 IEEE SENSORS APPLICATIONS SYMPOSIUM (SAS), 2019,
  • [10] Performance Analysis of various Encryption Algorithms for usage in Multistage Encryption for Securing Data in Cloud
    Chennam, Krishna Keerthi
    Muddana, Lakshmi
    Aluvalu, Rajani Kanth
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 2030 - 2033