Downloads: 124 | Views: 499 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016 | Popularity: 6.4 / 10
A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Abstract: Cryptography algorithm is the technique used for concealing the content of message from all users except the sender and the receiver and to authenticate the correctness of message to the recipient. Information security could be implemented with many known security algorithms. The most common of these are encryption algorithms. This paper provides a fair comparison between five most common symmetric key cryptography algorithms DES, SDES, Triple DES, AES and Two Fish. Since main concern here is the performance of algorithms under different settings, the presented comparison takes into consideration the behavior and the performance of the algorithm when different data loads are used. The comparison is made on the basis of encryption, decryption and throughput time with the variation of various file features like different data types, data size and key sizes.
Keywords: Cryptography, Symmetric, Encryption, Decryption, Throughput, Data size
Edition: Volume 5 Issue 8, August 2016
Pages: 991 - 995
Make Sure to Disable the Pop-Up Blocker of Web Browser
Click below to Watch Video Lecture of Above Article
Downloads: 656 | Views: 1998 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 714 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 694 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 696 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 683 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera