Abstract

In this paper, we provide a comprehensive performance evaluation of popular symmetric and asymmetric key encryption algorithms to selecting better utilization on resource constraint and mobile devices. We focus on AES, RC4, Blowfish, CAST, 3DES, Twofish as symmetric key encryption and DSA and ElGamal as an asymmetric encryption algorithms. The performance is compared using different parameters such as key size, data blocks, data types, and encryption/decryption speed. The experiments are performed to exploit the effectiveness of different cryptographic algorithms to use in real life applications where fast execution time and less memory usage requirement is of prime importance.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call