Abstract

For achieving faster communication most of confidential data is circulated through networks as electronic data. Cryptographic ciphers have an important role for providing security to these confidential data against unauthorized attacks. Though security is an important factor, there are various factors that can affect the performance and selection of cryptographic algorithms during the practical implementation of these cryptographic ciphers for various applications. This paper provides analysis and comparison of some symmetric key cryptographic ciphers (RC4, AES, Blowfish, RC2, DES, Skipjack, and Triple DES) on the basis of encryption time with the variation of various file features like different data types, data size, data density and key sizes.

Highlights

  • Cryptography is a powerful tool used to protect the information in computer systems

  • On the basis of key used, cipher algorithms are classified as asymmetric key algorithms, in which encryption and decryption is done by two different keys and symmetric key algorithms, where the same key is used for encryption and decryption [8]

  • In this paper different symmetric key algorithm have been analyzed for various file features like different data type, data density, data size and key size, and analyzed the variation of encryption time for different selected cipher algorithms

Read more

Summary

Introduction

Cryptography is a powerful tool used to protect the information in computer systems. When a browser is used for home banking, numbers of cryptographic algorithms are being used to protect data send to the bank. When someone login to computer, the password is protected by cryptographic hash functions. An email it is often encrypted using SSL while sending it. In cryptography original message is basically encoded in some non readable format. The only person who knows how to decode the message can get the original information On the basis of the input data, cipher algorithms are classified as block ciphers, in which the size of the block is of fixed size for encryption and stream ciphers in which a continuous stream is passed for encryption and decryption [9]

Objectives
Methods
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call