Abstract

Data security is one of the major problems faced by today's world. In actuality, the communication channel used to transmit data from one user to another is highly insecure. Any trespasser can easily get access to sensitive data which results in cybercrime. To resolve this problem of data security before transmission of data through any medium it gets changed to some codes which are human unreadable forms, this process is known as encryption of data and this leads to the term cryptography. Nowadays we have but many algorithms available that encrypt the data. Some of them use a single key for encryption as well as for decryption known as symmetric key algorithms. This paper contains the comparison of such symmetric algorithms namely: DES, TDES, AES, Blowfish, RC6 based on performance, and the avalanche effect. The main aim of this study is to find out the most secure algorithm and algorithm with high performance. Java programming language is used in this study for the implementation of the above algorithm. From results, it was concluded that the AES algorithm has good performance whereas RC6 has better security and DES requires disk space to store data.

Highlights

  • In the current scenario, billions of peoples are using the internet per minute for various types of activities like communication, education, entertainment, banking, etc

  • Performance (Encryption + Decryption Time) execution time needed by the algorithm to perform encryption and decryption

  • This work presents the comparative study of symmetric algorithms based on performance and security

Read more

Summary

Introduction

Billions of peoples are using the internet per minute for various types of activities like communication, education, entertainment, banking, etc. 1000 of the things are being sold and purchased in a day and crores of money are traded. One of the most used applications of the Internet is E-Commerce. Maximum of these transactions are made using Internet Banking, UPI IDs, Debit cards, etc. These confidential and sensitive data should be kept secret from the intruders. Cryptography comes in existence here when there is a need to secure some sensitive and confidential data. Cryptography is derived from the Greek word: “cryptos” which means “secret” and “graphein” which means “writing” [1][2]

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call