Performance Comparison of Symmetric Data Encryption Techniques  

Abstract

In present scenario various data encryption algorithms are available for data security which has always been important in all aspects of life. Data may contain confidential form of information that one want to secure from any third party access. As we are having number of cryptographic algorithm so sometimes it can create little bit confusion to select best one. This paper provides a view to choose the best available one on the basis of their performance parameter. It can be all the more important as technology continues to control various operations in our day to day life Reprogrammable devices are highly attractive options for hardware implementations of encryption algorithms as they provide cryptographic algorithm agility, physical security, and potentially much higher performance, therefore this paper investigates a hardware design to efficiently implement a special type block ciphers in VHDL and its comparative analysis in different parameter variation . This hardware design is applied to the new secret and variable size key block cipher called Blowfish designed to meet the requirements of the previous known standard and to increase security and to improve performance. The proposed algorithm will be used a variable key size.  

Authors and Affiliations

Deepak Kumar Dakate , Pawan Dubey

Keywords

Related Articles

A Low-Quiescent Current Two- Input/Output Buffer with Class A-B Output Stage for LCD Driver 

the evolution of compact, light-weight, low-power, and high-quality displays has caused a large demand for liquid crystal display (LCD) drivers, with features such as low cost, low power dissipation, high speed, an...

Enforcing Multi-user Security Policies in Cloud Computing

The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential...

Balanced window size Allocation Mechanism for Congestion control of Transmission Control Protocol based on improved bandwidth Estimation.

TCP is the widely used protocol for its reliable data communication over the network. Though it is used for enabling communication over the large network, it has some incapability in handling continues data transmission...

Review of issues in automatic labelling of formatted document 

The labelling framework, which is proposed to label topic models, essentially consists of a multinomial word distribution, a set of candidate labels, and a context collection. Thus it could be applied to any text m...

Software based approach for Triggering 3-phase, 6-pulse, AC to DC Controlled Converter  

This paper presents the development of a software for triggering the circuit of 3-phase, 6-pulse, ac to dc controlled converter using PIC microcontroller. The microcontroller will generate six equidistant, synchron...

Download PDF file
  • EP ID EP162073
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

Deepak Kumar Dakate, Pawan Dubey (2012). Performance Comparison of Symmetric Data Encryption Techniques  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 163-166. https://europub.co.uk/articles/-A-162073