We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Performance Evaluation of Cryptographic Algorithms

by Mohit Mittal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 7
Year of Publication: 2012
Authors: Mohit Mittal
10.5120/5550-7618

Mohit Mittal . Performance Evaluation of Cryptographic Algorithms. International Journal of Computer Applications. 41, 7 ( March 2012), 1-6. DOI=10.5120/5550-7618

@article{ 10.5120/5550-7618,
author = { Mohit Mittal },
title = { Performance Evaluation of Cryptographic Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 7 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number7/5550-7618/ },
doi = { 10.5120/5550-7618 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:28:57.629698+05:30
%A Mohit Mittal
%T Performance Evaluation of Cryptographic Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 7
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we compare the various cryptographic algorithms. On the basis of parameter taken as time various cryptographic algorithms are evaluated on different hardware's. Different hardware's are having different processing speed on which various size of file are processed. Calculation of time for encryption and decryption in different processors such as intel i5 , intel i3 , intel dual core ,intel atom having processing speed 2. 27 GHz, 2. 53 GHz, 2. 00 GHz ,1. 66 GHz respectively. Encryption processing time and decryption processing time are compared between various cryptographic algorithms which come out to be not too much. Overall time depend on the corresponding processing speed. Throughput analysis is also done.

References
  1. Auerbach, "An Overview of Cryptography", http://www. garykessler. net/library/crypto. html, September 1998.
  2. "Data encryption standard (des)", federal information processing standards publication (fips) 46-3 , 1999 October 25.
  3. Dirk Rijmenants "What is cryptography", http://users. telenet. be/d. rijmenants/en/cryptography. htm 2004.
  4. PGP Corporation "An Introduction to Cryptography", June 8, 2004
  5. Aamer Nadeem, Dr M. Younus Javed," A Performance Comparison of Data Encryption Algorithms", 2005 IEEE.
  6. Abdullah Al Hasib, Abul Ahsan Md. Mahmudul Haque," A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography", Third International Conference on Convergence and Hybrid Information Technology,2008.
  7. D. S. Abdul. Elminaam,H. M. Abdul Kader, M. M. Hadhoud, "Performance Evaluation of Symmetric Encryption Algorithms" Communications of the IBIMA Volume 8, 2009.
  8. Ross J. Anderson," Security Engineering: A Guide to Building Dependable Distributed Systems", 2010
  9. Neetu Settia," Cryptanalysis of Modern Cryptographic Algorithms", IJCST Vol. 1, Issue 2, December 2010
  10. O P Verma, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi," Peformance Analysis Of Data Encryption Algorithms", 2011
  11. Srinivasarao D,Sushma Rani N, Ch. Panchamukesh ,S. Neelima, " analyzing the superlative symmetric cryptographic encryption algorithm ( ascea)", Journal of Global Research in Computer Science, Volume 2,No. 7, July 2011.
  12. Gurjeevan Singh, Ashwani Kumar Singla,K. S. Sandha, "Through Put Analysis Of Various Encryption Algorithms", IJCST Vol. 2, Issue 3, September 2011.
  13. "Cryptography",crypto00. pdf
  14. "Triple DES Encryption", http://www. tropsoft. com/strongenc/des3. htm
  15. Abdel-Karim Al Tamimi," Performance Analysis of Data Encryption Algorithms "
Index Terms

Computer Science
Information Sciences

Keywords

Introduction Various Cryptographic Algorithms Objective Simulation Procedure Conclusion Future Scope