Performance Evaluation of Symmetric Encryption Algorithms

被引:0
|
作者
Elminaaml, Diaa Salama Abdul. [1 ]
Kader, Hatem Mohamed Abdul [2 ]
Hadhoud, Mohie Mohamed [2 ]
机构
[1] Higher Technol Inst, Fac Comp & Informat, 10th Ramadan City, Egypt
[2] Menoufia Univ, Fac Comp & Informat, Shibin Al Kawm, Egypt
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2008年 / 8卷 / 12期
关键词
Encryption techniques; Computer security; AES; DES; RC2; 3DES; Blowfish; RC6;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm.
引用
收藏
页码:280 / 286
页数:7
相关论文
共 50 条
  • [41] An Efficient Approach for Increasing Security to Symmetric Data Encryption
    Islam, Muhammad Nazrul
    Mia, Md. Monir Hossain
    Islam, Md. Foizul
    Matin, M. A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (04): : 16 - 20
  • [42] Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices
    Iftikhar, Umar
    Asrar, Kashif
    Waqas, Maria
    Ali, Syed Abbas
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (06) : 7867 - 7874
  • [43] White-Box Security Notions for Symmetric Encryption Schemes
    Delerablee, Cecile
    Lepoint, Tancrede
    Paillier, Pascal
    Rivain, Matthieu
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 247 - 264
  • [44] Image Steganography Using LSB and Hybrid Encryption Algorithms
    Alanzy, May
    Alomrani, Razan
    Alqarni, Bashayer
    Almutairi, Saad
    APPLIED SCIENCES-BASEL, 2023, 13 (21):
  • [45] Accelerated Encryption Algorithms for Secure Storage and Processing in the Cloud
    Badii, Atta
    Faulkner, Ryan
    Raval, Rajkumar
    Glackin, Cornelius
    Chollet, Gerard
    2017 3RD INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2017, : 586 - 591
  • [46] Comparisons of Encryption Algorithms in Histogram-Equalized Image
    Huang, Lican
    Wu, Chuane
    Chen, LiYa
    Zhu, Lian
    2013 FOURTH INTERNATIONAL CONFERENCE ON NETWORKING AND DISTRIBUTED COMPUTING (ICNDC), 2013, : 80 - 81
  • [47] Authenticated Encryption: Toward Next-Generation Algorithms
    Maimut, Diana
    Reyhanitabar, Reza
    IEEE SECURITY & PRIVACY, 2014, 12 (02) : 70 - 72
  • [48] Memristive chaotic system-based hybrid image encryption application with AES and RSA algorithms
    Sahin, M. Emin
    PHYSICA SCRIPTA, 2023, 98 (07)
  • [49] A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish
    Patil, Priyadarshini
    Narayankar, Prashant
    Narayan, D. G.
    Meena, S. M.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 617 - 624