CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Performance Analysis of Cryptography Algorithms

by Rishabh Arora, Sandeep Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 21
Year of Publication: 2012
Authors: Rishabh Arora, Sandeep Sharma
10.5120/7483-0576

Rishabh Arora, Sandeep Sharma . Performance Analysis of Cryptography Algorithms. International Journal of Computer Applications. 48, 21 ( June 2012), 35-39. DOI=10.5120/7483-0576

@article{ 10.5120/7483-0576,
author = { Rishabh Arora, Sandeep Sharma },
title = { Performance Analysis of Cryptography Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 21 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number21/7483-0576/ },
doi = { 10.5120/7483-0576 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:44:42.542499+05:30
%A Rishabh Arora
%A Sandeep Sharma
%T Performance Analysis of Cryptography Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 21
%P 35-39
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

File is a collection of information that computer uses. The information is sensitive part of the organization. Any loss or threat to information can prove to be great loss to the organization as well to people. There are various means to protect the files from various threats. This paper describes various symmetric algorithms like Advanced Encryption Standard (AES), Blowfish, and DESX, a stronger variation of Data Encryption Standard (DES) to protect various types of files such as EXE, DOC, WMV and AVI files. The comparison of these algorithms is done in terms of Encryption and Decryption Throughput.

References
  1. Jason W. Cornwell, "Blowfish Survey", Department of Computer Science, Columbus State University, Columbus.
  2. Gurjeevan Singh, Ashwani Kumar, K. S. Sandha, "A Study of New Trends in Blowfish Algorithm", International Journal of Engineering Research and Applications, Vol. 1 pp 321-326.
  3. Marko Mali, Franc Novak and Anton Biasizzo, "Hardware Implementation of AES Algorithm", Journal of Electrical Engineering, Vol. 56, 2005.
  4. Xinmiao Zhang and Keshab K. Parhi, "High Speed VLSI Architectures for AES Algorithm", IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 9 Sep. 2004.
  5. Yibo Fan, Takeshi Ikenaga, Yukiyasu Tsunoo and Satoshi Goto, "A Low-cost Reconfigurable Architecture for AES Algorithm", Ambient SoC Global COE Program of Waseda University, Japan, 2008.
  6. Dr. R. V. Kshirsagar, Mrs. M. V. Vyawahare, Atul M. Borkar "Design of AES Algorithm using FPGA", International Conference on Advanced Computing, Communication and Networks'11Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  7. Manikandan. G, Rajendiran. P, Chakarapani. K, Krishnan. G, Sundarganesh. G, "A Modified Crypto Scheme for Enhancing Data Security", Journal of Theoretical and Advanced Information Technology, Jan 2012.
  8. Duncan S. Wong, Hector Ho Fuentes and Agnes H. Chan, "The Performance Measurement of Cryptographic Primitives on Palm Devices", College of Computer Science, Northeastern University, Boston, MA 02115, USA.
  9. Gregor Leander, Christof Paar, Axel Poschmann and Kai Schramm, "New Lightweight DES Variants", International Association for Cryptologic Research, Germany.
  10. Michael C. -J. Lin, Youn-Long Lin, " A VLSI Implementation of Blowfish Encryption/ Decryption Algorithm", Department of Computer Science, National Tsing Hua University, Hsin-Chu, Taiwan 30043, R. O. C.
  11. Savita Devidas Patil and Ashish T. Bhole, " The Design and Implementation of Password Management System using Blowfish Algorithm", International Journal of Technology And Engineering System(IJTES): Jan -March 2011- Vol. 2. No. 2.
  12. Ashwini M. Deshpande, Mangesh S. Deshpande and Devendra N. Kayatanavar, " FPGA Implementation of AES Encryption and Decryption", International Conference on "Control, Automation, Communication and Energy Conservation -2009, 4th-6th June 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Executable File Document File Avi File Wmv File Key Size Throughput