International Journal of Computer Sciences and Engineering
Comparative Analysis on Different parameters of Encryption
Algorithms for Information Security
Md Asif Mushtaque1
School of Computer Science and Engineering, Galgotias University, India
Abstract— In this era information security is a very important issue in every field such as Government Agencies (CBI, FBI), Research Organization, E-commerce and etc. where internet is being used. We want to secure our data from unauthorized user. Cryptography is a technique to secure data on the network from unauthorized user. There are different types of a cryptography algorithm (a) symmetric and (b) asymmetric has been designed. To secure data it is necessary to know which algorithm provides better security, efficiency, accuracy and effectiveness. This paper presents the complete analysis of various symmetric key encryption algorithms (DES, 3DES, CAST-128, MARS, IDEA, Blowfish, AES, and RC6) based on different parameters such as: Architecture, Scalability, Security, Flexibility, and limitations. Keywords- Symmetric Key, Information Security, Performance Matrices, Encryption, AES, DES, 3DES, CAST-128, MARS, IDEA, Blowfish, RC6
Cryptography is a technique or method to protect data by
changing its format to another format which is not easy to
understand by unauthorized user. It includes techniques like microdots, combining words with image to protect data.
Cryptography technique can be classified into two
categories (a) Symmetric Key and (b) Asymmetric Key.
Symmetric key algorithm also known as private or secret
key algorithm. In this algorithm a single key is used by the sender or receiver , it means same key is used to
encrypt and decrypt data. Symmetric key is of two types (i)
stream cipher encryption and (ii) block cipher encryption.
DES, 3DES, IDEA, Blowfish, AES, TEA, MARS, RC6 and
CAST-128 are the example of symmetric key encryption
Asymmetric key algorithm is also known as public
key algorithm. It uses two different keys to perform
encryption and decryption process, means one key is used
to encrypt the data is known as public key and another key
which is used for decryption is known as a private key.
Both public and private keys are mathematically interrelated . Public key is known by everyone but private key is
known by only the receiver of that message. RSA, SSH, DH
and SSL are the example of an asymmetric key algorithm.
Decryption- Decryption is the reverse process of
encryption; it is performed on the receiver side. It
also requires two things a secret key and a
Key- A key is a numeric or combination of
character that is variable length which is used to
change the format of the original message.
Plaintext- this is the original message or readable
message before encryption which is to be
Ciphertext- Plaintext is a message before
encryption and when we encrypt the plaintext it
changes into ciphertext.
The objective of Cryptography: These are the objectives of
• Confidentiality – It means the message cannot be
understood by unauthorized people.
Integrity- The message cannot be modified while
transmitting (between sender and receiver).
Authentication- It means confirming the identity of
Non Repudiation- It means that the transmission
Access Control- It means only the authorized
person can access the information.
Some Basic Terms of Cryptography:•
Encryption- It is a process in which original
message is converted into another format using a
secret key. In this process two things are required
key and encryption algorithm.
Corresponding Author: Md Asif...
References: “Performance Evaluation of Cryptographic Algorithms:
DES and AES”, 2012 IEEE Student’s Conference on Electrical,
of Computer Engineering and Technology (IJCET),
Volume 4, Issue 1, January- February (2013).
Algorithms”, International Conference on Computing,
Control and Industrial Engineering, IEEE, 2010.
Computing Technologies [ICCPCT-2013], IEEE, 2013.
Industrial Engineering”, IEEE, 2010.
CAST-128 Block Ciphers”, International Journal of
Computer Applications (0975 – 8887), April 2013, Volume
Algorithms and Their Effect on Real Running in PLC
Networks”, IEEE, 2012.
10.1109/ICCSN.2010.124, IEEE, 2010.
Please join StudyMode to read the full document