Abstract

Cryptography plays a vital role for ensuring secure communication between multiple entities. In many contemporary studies, researchers contributed towards identifying best cryptography mechanisms in terms of their performance results. Selection of cryptographic technique according to a particular context is a big question; to answer this question, many existing studies have claimed that technique selection is purely dependent on desired quality attributes such as efficiency and security. It has been identified that existing reviews are either focused only towards symmetric or asymmetric encryption types. Another limitation is found that a criterion for performance comparisons only covers common parameters. In this paper, we have evaluated the performance of different symmetric and asymmetric algorithms by covering multiple parameters such as encryption/decryption time, key generation time and file size. For evaluation purpose, we have performed simulations in a sample context in which multiple cryptography algorithms have been compared. Simulation results are visualized in a way that clearly depicts which algorithm is most suitable while achieving a particular quality attribute.

Highlights

  • Cryptography is the art of secret writing which is used since Roman times to hide information secret or keeping message secure

  • Due to larger key size and greater computational time of asymmetric cryptography, public key cryptography is used once for key exchange only and further encryption/ decryption is done by symmetric key cryptography [11], [12]

  • Performance analysis shows that the asymmetric algorithms take much time for encryption and decryption as compare to symmetric algorithms

Read more

Summary

INTRODUCTION

Cryptography is the art of secret writing which is used since Roman times to hide information secret or keeping message secure. Due to larger key size and greater computational time of asymmetric cryptography, public key cryptography is used once for key exchange only and further encryption/ decryption is done by symmetric key cryptography [11], [12]. The computational time of cryptography techniques is further classified as encryption/decryption time, key generation, and key exchange time. Key generation time is depending on the size of key length which is different for symmetric and asymmetric cryptography. The cryptography schemes are classified as symmetric and asymmetric algorithms. Performance analysis shows that the asymmetric algorithms take much time for encryption and decryption as compare to symmetric algorithms. The main objective of this paper is to provide the performance evaluation of cryptographic schemes including symmetric and asymmetric algorithms.

LITERATURE REVIEW
Symmetric Cryptography
Asymmetric Cryptography
Experimental Setup
Experimental Result
Asymmetric Algorithms
Symmetric and Asymmetric Algorithms
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.