earticle

논문검색

A Review and Comparative Analysis of Various Encryption Algorithms

초록

영어

Now days, Data security is very challenging issue that touches many areas including computers and communication. Recently, we came across many attacks on cyber security that have played with the confidentiality of the users. These attacks just broke all the security algorithms and affected the confidentiality, authentication, integrity, availability and identification of user data. Cryptography is one such way to make sure that confidentiality, authentication, integrity, availability and identification of user data can be maintained as well as security and privacy of data can be provided to the user. Encryption is the process of converting normal data or plaintext to something incomprehensible or cipher-text by applying mathematical transformations or formulae. These mathematical transformations or formulae used for encryption processes are called algorithms. We have analysed ten data encryption algorithms DES, Triple DES, RSA, AES, ECC, BLOWFISH, TWOFISH, THREEFISH, RC5 and IDEA etc. Among them DES, Triple DES, AES, RC5, BLOWFISH, TWOFISH, THREEFISH and IDEA are symmetric key cryptographic algorithms. RSA and ECC are asymmetric key cryptographic algorithms. In this paper, we have analysed various encryption algorithms on the basis of different parameters and compared them to choose the best data encryption algorithm so that we can use it in our future work.

목차

Abstract
 1. Introduction
 2. Basic Terminology used in Cryptography
  2.1 Plain Text or Normal Text
  2.2 Cipher Text
  2.3 Encryption
  2.4 Decryption
  2.5 Key
  2.6 Key Size
  2.7 Block Size
  2.8 Round
 3. Main Objectives of Cryptography
  3.1 Confidentiality
  3.2 Integrity
  3.3 Non-repudiation
  3.4 Authentication
  3.5 Access Control
 4. Overview of Various Algorithms
  4.1 DES (Data Encryption Standard)
  4.2 3DES (Triple Data Encryption Standard)
  4.3 RSA (Rivest-Shamir-Adleman Algorithm)
  4.4 AES (Advanced Encryption Standard)
  4.5 ECC (Elliptic Curve Cryptography)
  4.6 Blowfish
  4.7 Twofish
  4.8 Threefish
  4.9 RC5
  4.10 IDEA (International Data Encryption Algorithm)
 5. Comparative Table
 6. Conclusions
 References

저자정보

  • Rajdeep Bhanot Research scholar, DAV University Jalandhar
  • Rahul Hans Assistant Professor in dept. of CSE, DAV University Jalandhar

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.