A Survey on the Cryptographic Encryption Algorithms
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 11
Abstract
Security is the major concern when the sensitive information is stored and transferred across the internet where the information is no longer protected by physical boundaries. Cryptography is an essential, effective and efficient component to ensure the secure communication between the different entities by transferring unintelligible information and only the authorized recipient can be able to access the information. The right selection of cryptographic algorithm is important for secure communication that provides more security, accuracy and efficiency. In this paper, we examine the security aspects and processes involved in the design and implementation of most widely used symmetric encryption algorithms such as Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Blowfish, Advanced Encryption Standard (AES) and Hybrid Cubes Encryption Algorithm (HiSea). Furthermore, this paper evaluated and compared the performance of these encryption algorithms based on encryption and decryption time, throughput, key size, avalanche effect, memory, correlation assessment and entropy. Thus, amongst the existing cryptographic algorithm, we choose a suitable encryption algorithm based on different parameters that are best fit to the user requirements.
Authors and Affiliations
Muhammad Faheem Mushtaq, Sapiee Jamel, Abdulkadir Hassan Disina, Zahraddeen A. Pindar, Nur Shafinaz Ahmad Shakir, Mustafa Mat Deris
Comparative Performance Analysis of Efficient MIMO Detection Approaches
The promising massive level MIMO (multiple-input-multiple-output) systems based on extremely huge antenna collections have turned into a sizzling theme of wireless com-munication systems. This paper assesses the performa...
Intelligent System for Detection of Abnormalities in Human Cancerous Cells and Tissues
Due to the latest advances in the field of MML (Medical Machine Learning) a significant change has been witnessed and traditional diagnostic procedures have been converted into DSS (Decision Support Systems). Specially,...
Exploiting SCADA vulnerabilities using a Human Interface Device
SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infras-tructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Lo...
Reliable Network Traffic Collection for Network Characterization and User Behavior
This paper presents a reliable and complete traffic collection facility as a first and crucial step toward accurate traffic analysis for network characterization and user behavior. The key contribution is to produce an a...
Implementation of Novel Medical Image Compression Using Artificial Intelligence
The medical image processing process is one of the most important areas of research in medical applications in digitized medical information. A medical images have a large sizes. Since the coming of digital medical infor...