Abstract

Securing information is difficult in the modern internet era, as terabytes of data are generated daily online and online transactions occur virtually every second. The current world's information security relies heavily on cryptography, which makes the internet a safer environment. Making information incoherent to an unauthorized person is done through the use of cryptography. Providing legitimate users with confidentiality as a result. There are a wide variety of cryptographic algorithms suitable for this purpose. An ideal cryptography method would allow the user to do their job without breaking the bank. Unfortunately, there is no magic formula that can address every issue.Several algorithms balance cost and performance. A banking application needs robust security at a high cost, while a gaming software that sends user patterns for analytics cares more about speed and cost. Thus, choosing the appropriate encryption technique for the user. This study offers important insights in the process of selecting cryptographic algorithms in terms of each algorithm's strengths, weaknesses, cost, and performance . In order to demonstrate an entire performance analysis in this article, as opposed to just theoretical comparisons, this research developed and thoroughly examined the cost and performance of commonly used cryptographic algorithms, including DES, 3DES, AES, RSA, and blowfish. According to the findings, blowfish requires the smallest amount of time to decrypt files of various sizes (25K, 50K, 1M, 2M, 3M, and 4M), and it also consumes the smallest amount of memory. This makes it approximately three times faster than other cryptographic algorithms. Index Terms— Cryptograph Algorithm, Security attacks , Key, Cipher.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call