CFP last date
20 January 2025
Reseach Article

A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security

by Gurpreet Singh, Supriya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 19
Year of Publication: 2013
Authors: Gurpreet Singh, Supriya
10.5120/11507-7224

Gurpreet Singh, Supriya . A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications. 67, 19 ( April 2013), 33-38. DOI=10.5120/11507-7224

@article{ 10.5120/11507-7224,
author = { Gurpreet Singh, Supriya },
title = { A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 19 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number19/11507-7224/ },
doi = { 10.5120/11507-7224 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:25:55.081308+05:30
%A Gurpreet Singh
%A Supriya
%T A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 19
%P 33-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption is the process of scrambling a message so that only the intended recipient can read it. Encryption can provide a means of securing information. As more and more information is stored on computers or communicated via computers, the need to insure that this information is invulnerable to snooping and/or tampering becomes more relevant. With the fast progression of digital data exchange in electronic way, Information Security is becoming much more important in data storage and transmission. Information Confidentiality has a prominent significance in the study of ethics, law and most recently in Information Systems. With the evolution of human intelligence, the art of cryptography has become more complex in order to make information more secure. Arrays of Encryption systems are being deployed in the world of Information Systems by various organizations. In this paper, a survey of various Encryption Algorithms is presented.

References
  1. Tingyuan Nie, Chuanwang Song and Xulong Zhi, "Performance Evaluation of DES and Blowfish Algorithms", IEEE International Conference on Biomedical Engineering and Computer Science (ICBECS- 2010), pp. 1-4, 23-25 Apr 2010.
  2. Behrouz A Forouzan, "Data Communications and Networking", McGraw-Hill, 4th Edition.
  3. William Stallings, "Cryptography and Network Security: Principles and Practice", Pearson Education/Prentice Hall, 5th Edition.
  4. E. Thambiraja, G. Ramesh and Dr. R. Umarani, "A Survey on Various Most Common Encryption Techniques", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, pp. 226-233, July 2012.
  5. Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud, "Performance Evaluation of Symmetric Encryption Algorithms", IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 12, pp. 280-286, December 2008.
  6. Priyanka Arora, Arun Singh and Himanshu Tiyagi, "Evaluation and Comparison of Security Issues on Cloud Computing Environment", World of Computer Science and Information Technology Journal (WCSIT), Vol. 2, No. 5, pp. 179-183, 2012.
  7. Shashi Mehrotra Seth, Rajan Mishra, "Comparative Analysis of Encryption Algorithms for Data Communication", International Journal of Computer Science and Technology, Vol. 2, Issue 2, pp. 292-294, June 2011.
  8. S. Pavithra and Mrs. E. Ramadevi, "Performance Evaluation of Symmetric Algorithms", Journal of Global Research in Computer Science, Volume 3, No. 8, pp. 43-45, August 2012.
  9. Hamdan. O. Alanazi, B. B. Zaidan, A. A. Zaidan, Hamid A. Jalab, M. Shabbir and Y. Al-Nabhani, "New Comparative Study Between DES, 3DES and AES within Nine Factors", Journal Of Computing, Volume 2, ISSUE 3, pp. 152-157, MARCH 2010.
  10. Akash Kumar Mandal, Chandra Parakash and Mrs. Archana Tiwari, "Performance Evaluation of Cryptographic Algorithms: DES and AES", IEEE Students' Conference on Electrical, Electronics and Computer Science, pp. 1-5, 2012.
  11. Ajay Kakkar, M. L. Singh and P. K. Bansal, "Comparison of Various Encryption Algorithms and Techniques for Secured Data Communication in Multinode Network", International Journal of Engineering and Technology, Volume 2 No. 1, pp. 87-92, January 2012.
  12. Aman Kumar, Dr. Sudesh Jakhar and Mr. Sunil Makkar, "Comparative Analysis between DES and RSA Algorithm's", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, pp. 386-391, July 2012.
  13. Xin Zhou and Xiaofei Tang, "Research and Implementation of RSA Algorithm for Encryption and Decryption", the 6th International Forum on Strategic Technology, pp. 1118 – 1121, 2011.
  14. Uma Somani, Kanika Lakhani and Manish Mundra, "Implementing Digital Signatures with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing", 1st International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 211-216, 2010.
  15. Sriram Ramanujam and Marimuthu Karuppiah, "Designing an algorithm with high Avalanche Effect", IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, pp. 106-111, January 2011.
  16. "DES", http://www. tropsoft. com/strongenc/des. htm
  17. "3DES", http://www. cryptosys. net/3des. html
  18. "3DES", http://en. wikipedia. org/wiki/Triple_DES
Index Terms

Computer Science
Information Sciences

Keywords

Encryption RSA DES 3DES AES