A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 802 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016 | Popularity: 6.4 / 10


     

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi


Abstract: Cryptography algorithm is the technique used for concealing the content of message from all users except the sender and the receiver and to authenticate the correctness of message to the recipient. Information security could be implemented with many known security algorithms. The most common of these are encryption algorithms. This paper provides a fair comparison between five most common symmetric key cryptography algorithms DES, SDES, Triple DES, AES and Two Fish. Since main concern here is the performance of algorithms under different settings, the presented comparison takes into consideration the behavior and the performance of the algorithm when different data loads are used. The comparison is made on the basis of encryption, decryption and throughput time with the variation of various file features like different data types, data size and key sizes.


Keywords: Cryptography, Symmetric, Encryption, Decryption, Throughput, Data size


Edition: Volume 5 Issue 8, August 2016


Pages: 991 - 995



Please Disable the Pop-Up Blocker of Web Browser

Verification Code will appear in 2 Seconds ... Wait



Text copied to Clipboard!
M. Meena, A. Komathi, "A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats", International Journal of Science and Research (IJSR), Volume 5 Issue 8, August 2016, pp. 991-995, https://www.ijsr.net/getabstract.php?paperid=ART2016990, DOI: https://www.doi.org/10.21275/ART2016990

Click below to Watch Video Lecture of Above Article

ePresentation

Top