Downloads: 116 | Views: 336
Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.9 / 10
Performance Evaluation of Various Symmetric and Asymmetric Cryptosystems for Variable Text Size
Himani Agrawal, Dr. Mrs. Monisha Sharma
Abstract: Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. Many encryption algorithms are widely available and used in information security. They can be categorized into Symmetric (private) and Asymmetric (public) key encryption. Symmetric key ciphers use the same key for encryption and decryption, or the key used for decryption is easily calculated from the key used for encryption. Symmetric key ciphers can be broadly grouped into block ciphers and stream ciphers. Symmetric encryption has a troublesome drawback i. e. , two people who wish to exchange confidential messages must share a secret key. The key must be exchanged in a secure way. Key distribution is difficult among the parties. One thing common to all private key cryptosystems is that if one knows how to cipher a message then he automatically knows how to decipher the message. Thus the method of ciphering must be kept secret. Once the ciphering method is compromised the cryptosystem is useless. Thus this cryptosystem is less secure but having high speed therefore frequently used for sending bulk messages. The ideas of the public key cryptosystems was first introduced by Diffie and Hellman [2] in 1976. Since then, several different protocols for public key cryptography have been presented e. g. RSA, ECC etc. Public key cryptosystems are highly secure but having less speed as compared to private key cryptosystems. Therefore generally used for sending short messages like secret keys. This paper presents the comparative study of some most popular Symmetric cryptosystems i. e. RC4, DES, 3DES, AES, Blowfish and some popular Asymmetric cryptosystems i. e. RSA, RSA PKCS1, RSA SAEP+, RSA OAEP, RSA OAEP+, React RSA, Hybrid React RSA and NTRU. These algorithms are compared on the basis of simulation time required for key generation, encryption and decryption for variable sized text data as input and the results were observed, analyzed and compared so as to identify which method is appropriate to the business needs.
Keywords: Asymmetric Key, Asymmetric Key, DES, AES, 3DES, Blowfish, RC4, RSA, RSA family, NTRU
Edition: Volume 4 Issue 4, April 2015
Pages: 1588 - 1591
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1
Research Paper, Electronics & Communication Engineering, Egypt, Volume 10 Issue 12, December 2021
Pages: 1281 - 1287Feature Level Fusion of Palmprint and Iris Images for Person Identification
May Essam, Fayez Wanis Zaki, Mervat El-Seddek
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Electronics & Communication Engineering, India, Volume 12 Issue 10, October 2023
Pages: 1195 - 1198Streamlining VLSI Physical Design Engineering with SART: An Automated Tool for Data Extraction and Report Generation
Mamidi Vidhyasagar
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Experimental Result Paper, Electronics & Communication Engineering, India, Volume 12 Issue 6, June 2023
Pages: 1345 - 1350Smart Home System Using Home Assistant
Mohammed Ibrahim Masood, M. A Nayeem
Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Electronics & Communication Engineering, India, Volume 11 Issue 7, July 2022
Pages: 474 - 477Smart Electric Unit Measurement for Understanding Cost and Reducing Power in House Hold Applications
Anil Kumar V., Suhas V., Rithvik Shetty B., Sunil P.
Downloads: 9 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9
Review Papers, Electronics & Communication Engineering, India, Volume 12 Issue 10, October 2023
Pages: 2086 - 2090Spintronics: A Revolution in Technology in Today's Era
Dr. Rakhi Dua, Dr. Puja Acharya, Dewansh Shekhar Singh