A Survey on the Cryptographic Encryption Algorithms

Abstract

Security is the major concern when the sensitive information is stored and transferred across the internet where the information is no longer protected by physical boundaries. Cryptography is an essential, effective and efficient component to ensure the secure communication between the different entities by transferring unintelligible information and only the authorized recipient can be able to access the information. The right selection of cryptographic algorithm is important for secure communication that provides more security, accuracy and efficiency. In this paper, we examine the security aspects and processes involved in the design and implementation of most widely used symmetric encryption algorithms such as Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Blowfish, Advanced Encryption Standard (AES) and Hybrid Cubes Encryption Algorithm (HiSea). Furthermore, this paper evaluated and compared the performance of these encryption algorithms based on encryption and decryption time, throughput, key size, avalanche effect, memory, correlation assessment and entropy. Thus, amongst the existing cryptographic algorithm, we choose a suitable encryption algorithm based on different parameters that are best fit to the user requirements.

Authors and Affiliations

Muhammad Faheem Mushtaq, Sapiee Jamel, Abdulkadir Hassan Disina, Zahraddeen A. Pindar, Nur Shafinaz Ahmad Shakir, Mustafa Mat Deris

Keywords

Related Articles

A fast cryptosystem using reversible cellular automata

This article defines a new algorithm for a secret key cryptosystem using cellular automata which is a promising approach to cryptography. Our algorithm is based on cellular automata built on a set of reversible rules whi...

All in Focus Image Generation based on New Focusing Measure Operators

To generate an all in focus image, the Shape-From-Focus (SFF) is used. The SFF key is finding the optimal focus depth at each pixel or area in an image within sequence of images. In this paper two new focusing measure op...

LOD Explorer: Presenting the Web of Data

The quantity of data published on the Web according to principles of Linked Data is increasing intensely. However, this data is still largely limited to be used up by domain professionals and users who understand Linked...

Selection of Touch Gestures for Children’s Applications: Repeated Experiment to Increase Reliability

This paper discusses the selection of touch gestures for children’s applications. This research investigates the gestures that children aged between 2 to 4 years old can manage on the iPad device. Two experiments were co...

Process Capability Indices under Non-Normality Conditions using Johnson Systems

Process capability indices (PCIs) quantify the ability of a process to produce on target and within specifications performances. Basic indices designed for normal processes gives flawed results for non-normal process. Nu...

Download PDF file
  • EP ID EP240776
  • DOI 10.14569/IJACSA.2017.081141
  • Views 123
  • Downloads 0

How To Cite

Muhammad Faheem Mushtaq, Sapiee Jamel, Abdulkadir Hassan Disina, Zahraddeen A. Pindar, Nur Shafinaz Ahmad Shakir, Mustafa Mat Deris (2017). A Survey on the Cryptographic Encryption Algorithms. International Journal of Advanced Computer Science & Applications, 8(11), 333-344. https://europub.co.uk/articles/-A-240776