Performance Evaluation of Symmetric Encryption Algorithms

被引:0
|
作者
Elminaaml, Diaa Salama Abdul. [1 ]
Kader, Hatem Mohamed Abdul [2 ]
Hadhoud, Mohie Mohamed [2 ]
机构
[1] Higher Technol Inst, Fac Comp & Informat, 10th Ramadan City, Egypt
[2] Menoufia Univ, Fac Comp & Informat, Shibin Al Kawm, Egypt
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2008年 / 8卷 / 12期
关键词
Encryption techniques; Computer security; AES; DES; RC2; 3DES; Blowfish; RC6;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm.
引用
收藏
页码:280 / 286
页数:7
相关论文
共 50 条
  • [31] Accelerating Encryption Algorithms Using Parallelism
    Duta, Cristina-Loredana
    Michiu, Gicu
    Stoica, Silviu
    Gheorghe, Laura
    19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 549 - 554
  • [32] E-HATS : A Symmetric Key Encryption Algorithm with Dynamic Substitution Rule
    Mullick, Vikalp
    2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2014, : 471 - 476
  • [33] Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms
    Murugan, Chinnandi Arul
    Karthigaikumar, P.
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (04) : 1385 - 1390
  • [34] An Evaluation of AES Encryption Modes on Data Transmission Performance in Distributed Systems
    Aydos, Bilal
    Yigit, Ibrahim Onuralp
    Candan, Kemal
    Bolata, Oguz Yusuf
    Altmay, Selcuk
    32ND IEEE SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU 2024, 2024,
  • [35] Comparative Study of Image Encryption and Image Steganography Using Cryptographic Algorithms and Image Evaluation Metrics
    Chavali, Surya Teja
    Kandavalli, Charan Tej
    Sugash, T. M.
    Prakash, G.
    SEMANTIC INTELLIGENCE, ISIC 2022, 2023, 964 : 297 - 311
  • [36] Meteosat Images Encryption based on AES and RSA Algorithms Meteosat Image Encryption
    Belkaid, Boukhatem Mohammed
    Mourad, Lahdir
    Mehdi, Cherifi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (06) : 203 - 208
  • [37] A New Efficient Symmetric Encryption Algorithm Design and Implementation
    Tawalbeh, Lo'ai
    Al-Hajsalem, Hend
    Abu-Qtaish, Tasneem
    Khatatbeh, Ayat
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (02): : 102 - 110
  • [38] Cloud computing platform: Performance analysis of prominent cryptographic algorithms
    Ajmal, Abdullah
    Ibrar, Sundas
    Amin, Rashid
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (15)
  • [39] The Design and Implementation of a Symmetric Encryption Algorithm Based on DES
    Zhou Yingbing
    Li Yongzhen
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 517 - 520
  • [40] DES: The Oldest Symmetric Block Key Encryption Algorithm
    Sharma, Mukta
    Garg, R. B.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016), 2016, : 53 - 58