Cryptography: A Comparative Analysis for Modern Techniques

Abstract

Cryptography plays a vital role for ensuring secure communication between multiple entities. In many contemporary studies, researchers contributed towards identifying best cryptography mechanisms in terms of their performance results. Selection of cryptographic technique according to a particular context is a big question; to answer this question, many existing studies have claimed that technique selection is purely dependent on desired quality attributes such as efficiency and security. It has been identified that existing reviews are either focused only towards symmetric or asymmetric encryption types. Another limitation is found that a criterion for performance comparisons only covers common parameters. In this paper, we have evaluated the performance of different symmetric and asymmetric algorithms by covering multiple parameters such as encryption/decryption time, key generation time and file size. For evaluation purpose, we have performed simulations in a sample context in which multiple cryptography algorithms have been compared. Simulation results are visualized in a way that clearly depicts which algorithm is most suitable while achieving a particular quality attribute.

Authors and Affiliations

Faiqa Maqsood, Muhammad Ahmed, Muhammad Mumtaz Ali, Munam Ali Shah

Keywords

Related Articles

 Defect Diagnosis in Rotors Systems by Vibrations Data Collectors Using Trending Software

 Vibration measurements have been used to reliably diagnose performance problems in machinery and related mechanical products. A vibration data collector can be used effectively to measure and analyze the machinery...

A Novel Approach for Background Subtraction using Generalized Rayleigh Distribution

Identification of the foreground objects in dynamic scenario video images is an exigent task, when compared to static scenes. In contrast to motionless images, video sequences offer more information concerning how items...

Preference in using Agile Development with Larger Team Size

Agile software development includes a group of software development methodologies based on iterative development, where requirements and solutions evolve through collaboration between cross-functional self-organizing tea...

Training an Agent for FPS Doom Game using Visual Reinforcement Learning and VizDoom

Because of the recent success and advancements in deep mind technologies, it is now used to train agents using deep learning for first-person shooter games that are often outperforming human players by means of only scre...

 Comparative Study between the Proposed GA Based ISODAT Clustering and the Conventional Clustering Methods

 A method of GA: Genetic Algorithm based ISODATA clustering is proposed.GA clustering is now widely available. One of the problems for GA clustering is a poor clustering performance due to the assumption that cluste...

Download PDF file
  • EP ID EP259932
  • DOI 10.14569/IJACSA.2017.080659
  • Views 96
  • Downloads 0

How To Cite

Faiqa Maqsood, Muhammad Ahmed, Muhammad Mumtaz Ali, Munam Ali Shah (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal of Advanced Computer Science & Applications, 8(6), 442-448. https://europub.co.uk/articles/-A-259932