CFP last date
20 December 2024
Reseach Article

A Comparative Analysis of Encryption Algorithms for Better Utilization

by Anuj Kumar, Sapna Sinha, Rahul Chaudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 14
Year of Publication: 2013
Authors: Anuj Kumar, Sapna Sinha, Rahul Chaudhary
10.5120/12426-8934

Anuj Kumar, Sapna Sinha, Rahul Chaudhary . A Comparative Analysis of Encryption Algorithms for Better Utilization. International Journal of Computer Applications. 71, 14 ( June 2013), 17-23. DOI=10.5120/12426-8934

@article{ 10.5120/12426-8934,
author = { Anuj Kumar, Sapna Sinha, Rahul Chaudhary },
title = { A Comparative Analysis of Encryption Algorithms for Better Utilization },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 14 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 17-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number14/12426-8934/ },
doi = { 10.5120/12426-8934 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:35:33.422404+05:30
%A Anuj Kumar
%A Sapna Sinha
%A Rahul Chaudhary
%T A Comparative Analysis of Encryption Algorithms for Better Utilization
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 14
%P 17-23
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptographic algorithms provide security against attacks during encryption of data. However, they are computationally intensive application and consume large amount of CPU time [1] and space at time of encryption. The goal of this paper is to compare the different encryption algorithm and to find space complexity of the encrypted and decrypted data by using complexities of encryption algorithm. . In this paper provide comparison between five most widely used algorithms. Based on following experimental it can be seen that TDES in general perform better than other algorithms. In this, find that how these algorithms better utilize for improving performances of algorithms in terms of space complexity

References
  1. Suhaila Omer Sharif, S. P. Mansoor. 2010. Performance analysis of Stream and Block cipher algorithms. 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE)
  2. Allam Mousa. 2005. Data Encryption Performance Based on Blowfish. 47th International symposium ELMAR, Zadar, Crotia
  3. P. Krishnamurthy. 2001. Encryption and Power Consumption in Wireless LANs-N. The Third IEEE Workshop on Wireless LANs - - Newton, Massachusetts
  4. Monika Agrawal, Pradeep Mishra. 2012. A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering (IJCSE)
  5. Aamer Nadeem, dr M. Younus javed. 2005. A Performance Comparison of data Encryption Algorithms. Institute of Electrical and Electronics Engineers (IEEE)
  6. William Stallings. 2009. Cryptography and Network Security: Principles and practices. Dorling Kindersley (india) pvt ltd.
  7. Kruti R. Shah, Bhavika Gambhava. 2012. New Approach of Data Encryption Standard Algorithm. International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307. Volume-2, Issue-1
  8. Jawahar Thakur and Nagesh Kumar. 2011. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis. International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459. Volume 1, Issue 2
Index Terms

Computer Science
Information Sciences

Keywords

Cryptographic algorithm encryption block cipher stream cipher space complexity