Corpus ID: 18620923

COMPARISON BETWEEN DES , 3 DES , RC 2 , RC 6 , BLOWFISH AND AES

@inproceedings{MathurCOMPARISONBD,
  title={COMPARISON BETWEEN DES , 3 DES , RC 2 , RC 6 , BLOWFISH AND AES},
  author={Milind Mathur}
}
If the confidentiality of the information of very high value, it should be protected. If you want to stop the unauthorised disclosure or alteration of the information, secure it. With the fast change in technologies today, more and more multimedia data are generated and transmitted, leaving our data vulnerable to be edited, modified and duplicated. Digital documents will be faced by many threats as they are also easy to copy and distribute. Because of the significance, accuracy and sensitivity… Expand

Figures and Tables from this paper

Symmetric Encryption Algorithms: Review and Evaluation Study
TLDR
A general overview of common encryption algorithms is presented and their inner workings are explained and results for all measures that have been tested are analyzed, taking into account the level of security they provide. Expand
Performance Analysis of Cryptographic Algorithms in the Information Security
TLDR
This paper mainly focuses on comparative analysis of (AES, DES, 3DES, BLOWFISH, RC4), Asymmetric, DSA, Diffie-Hellman, EI-Gamal, Pailier, Hashing (MD5, MD6, SHA, SHA256) algorithms. Expand
A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security
TLDR
A comparative study for most important algorithms for encryption and decryption of data in all fields in terms of speed (implementation) and security (special keys) determine whether an encryption algorithm is good. Expand
Hybrid cryptographic technique to secure data in web application
TLDR
In the proposed hybrid model the AES algorithm is replaced by Blowfish security algorithm, which is faster than AES and ECC algorithm is changed to provide the same level of security afforded by RSA with a large modulus and corresponding large key. Expand
A New Symmetric Key Encryption Algorithm With Higher Performance
TLDR
This paper is presenting an alternate symmetric key encryption algorithm, which can easily avoid long and complex computation of conventional popular symmetricKeyEncryption algorithms such as the Data Encryption Standards and the Advance Encryption Standard. Expand
A Comparative Study of Rivest Cipher Algorithms
The purpose of an encryption algorithm is to provide security of data. If an encryption algorithm cannot be broken easily, then it is said to be secure. The ultimate goal is to protect data againstExpand
Competing secure text encryption in intranet using elliptic curve cryptography
TLDR
This work attempts to provide secure communication architecture to achieve 'confidentiality and data integrity in more strong way' by implementing a secure system using Elliptic curve cryptography for cryptographic algorithm and integrate checksum estimation method. Expand
Symmetric cryptosystem based on generalized key scheme
TLDR
This work provides a crypt analysis, in terms of stability, execution time and endurance to cryptanalytic attacks, of proposed hybrid cryptscheme that combine the idea of keys as position pointers and input matrix as co operand in the encryption/decryption process. Expand
Cryptanalysis Resistant Image Security System
In the context of image security systems, literature reviews have shown that a combination of cryptography and steganography ensures greater security. However, the existing systems mainly deal withExpand
S-Box Enhancement and modification : 4 . 1 General Modification a ) Algabraic representation of Rijndael : Rijndael
Rijndael’s Advanced Encryption Standard (AES) is the block cipher based symmetric-key cryptography to protect the sensitive information. The key sizes of AES are 128, 192, 256 bits. AES is based onExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 16 REFERENCES
Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers
TLDR
A Web programming language to be analyzed with four Web browsers in term of their performances to process the encryption of the programming language’s script with the Web browsers is proposed and one of the encryption techniques that can be applied is introduced, which is the eXclusive OR (XOR) operation. Expand
A Performance Comparison of Data Encryption Algorithms
  • A. Nadeem, M. Javed
  • Computer Science
  • 2005 International Conference on Information and Communication Technologies
  • 2005
TLDR
It has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation, and their performance is compared by encrypting input files of varying contents and sizes, on different Hardware platforms. Expand
Comparative Analysis Of Encryption Algorithms For Data Communication
TLDR
Comparisons are performed of three algorithm; DES, AES and RSA considering certain parameters such as computation time, memory usages and output byte to analyses the effectiveness of each algorithm. Expand
The Data Encryption Standard (DES) and its strength against attacks
TLDR
Some of the safeguards against differential cryptanalysis that were built into the DES system from the beginning are shown, with the result that more than 10 15 bytes of chosen plaintext are required for this attack to succeed. Expand
Performance Analysis of Data Encryption Algorithms
The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doingExpand
Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms
TLDR
The results of the nominal electronic code book are not enthusiastic, so the Cipher Block Chaining and the output feed back modes are implemented and the results are compared. Expand
Cryptography and Network Security (4th Edition)
If you want to possess a one-stop search and find the proper manuals on your products, you can visit this website that delivers many CRYPTOGRAPHY AND NETWORK SECURITY 6TH EDITION. You can get theExpand
Energy Consumption of Encryption Schemes in Wireless Devices
Resources in the wireless environment are limited. The processor has limited capacity and there is limited battery power available. The increasing demand for services on wireless devices has pushedExpand
Encryption and Power Consumption in Wireless LANs
TLDR
Encryption is being employed in wireless devices before data are transmitted over the air at the MAC/physical layers and the application layer and it is found that encryption is computationally intensive and consumes energy and computational resources that are limited in Wireless devices. Expand
Battery power-aware encryption
TLDR
A hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation is introduced and mathematical models to capture the relationships between power consumption and security are proposed. Expand
...
1
2
...