# COMPARISON BETWEEN DES , 3 DES , RC 2 , RC 6 , BLOWFISH AND AES

@inproceedings{MathurCOMPARISONBD, title={COMPARISON BETWEEN DES , 3 DES , RC 2 , RC 6 , BLOWFISH AND AES}, author={Milind Mathur} }

If the confidentiality of the information of very high value, it should be protected. If you want to stop the unauthorised disclosure or alteration of the information, secure it. With the fast change in technologies today, more and more multimedia data are generated and transmitted, leaving our data vulnerable to be edited, modified and duplicated. Digital documents will be faced by many threats as they are also easy to copy and distribute. Because of the significance, accuracy and sensitivity… Expand

#### 42 Citations

Symmetric Encryption Algorithms: Review and Evaluation Study

- Computer Science
- Int. J. Commun. Networks Inf. Secur.
- 2020

A general overview of common encryption algorithms is presented and their inner workings are explained and results for all measures that have been tested are analyzed, taking into account the level of security they provide. Expand

Performance Analysis of Cryptographic Algorithms in the Information Security

- Computer Science
- 2020

This paper mainly focuses on comparative analysis of (AES, DES, 3DES, BLOWFISH, RC4), Asymmetric, DSA, Diffie-Hellman, EI-Gamal, Pailier, Hashing (MD5, MD6, SHA, SHA256) algorithms. Expand

A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security

- Computer Science
- 2019

A comparative study for most important algorithms for encryption and decryption of data in all fields in terms of speed (implementation) and security (special keys) determine whether an encryption algorithm is good. Expand

Hybrid cryptographic technique to secure data in web application

- Computer Science
- 2020

In the proposed hybrid model the AES algorithm is replaced by Blowfish security algorithm, which is faster than AES and ECC algorithm is changed to provide the same level of security afforded by RSA with a large modulus and corresponding large key. Expand

A New Symmetric Key Encryption Algorithm With Higher Performance

- Computer Science
- 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)
- 2019

This paper is presenting an alternate symmetric key encryption algorithm, which can easily avoid long and complex computation of conventional popular symmetricKeyEncryption algorithms such as the Data Encryption Standards and the Advance Encryption Standard. Expand

A Comparative Study of Rivest Cipher Algorithms

- 2014

The purpose of an encryption algorithm is to provide security of data. If an encryption algorithm cannot be broken easily, then it is said to be secure. The ultimate goal is to protect data against… Expand

Competing secure text encryption in intranet using elliptic curve cryptography

- Computer Science
- 2020

This work attempts to provide secure communication architecture to achieve 'confidentiality and data integrity in more strong way' by implementing a secure system using Elliptic curve cryptography for cryptographic algorithm and integrate checksum estimation method. Expand

Symmetric cryptosystem based on generalized key scheme

- Computer Science
- 2013

This work provides a crypt analysis, in terms of stability, execution time and endurance to cryptanalytic attacks, of proposed hybrid cryptscheme that combine the idea of keys as position pointers and input matrix as co operand in the encryption/decryption process. Expand

Cryptanalysis Resistant Image Security System

- 2015

In the context of image security systems, literature reviews have shown that a combination of cryptography and steganography ensures greater security. However, the existing systems mainly deal with… Expand

S-Box Enhancement and modification : 4 . 1 General Modification a ) Algabraic representation of Rijndael : Rijndael

- 2017

Rijndael’s Advanced Encryption Standard (AES) is the block cipher based symmetric-key cryptography to protect the sensitive information. The key sizes of AES are 128, 192, 256 bits. AES is based on… Expand

#### References

SHOWING 1-10 OF 16 REFERENCES

Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers

- Computer Science
- 2008

A Web programming language to be analyzed with four Web browsers in term of their performances to process the encryption of the programming language’s script with the Web browsers is proposed and one of the encryption techniques that can be applied is introduced, which is the eXclusive OR (XOR) operation. Expand

A Performance Comparison of Data Encryption Algorithms

- Computer Science
- 2005 International Conference on Information and Communication Technologies
- 2005

It has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation, and their performance is compared by encrypting input files of varying contents and sizes, on different Hardware platforms. Expand

Comparative Analysis Of Encryption Algorithms For Data Communication

- Computer Science
- 2011

Comparisons are performed of three algorithm; DES, AES and RSA considering certain parameters such as computation time, memory usages and output byte to analyses the effectiveness of each algorithm. Expand

The Data Encryption Standard (DES) and its strength against attacks

- Computer Science
- IBM J. Res. Dev.
- 1994

Some of the safeguards against differential cryptanalysis that were built into the DES system from the beginning are shown, with the result that more than 10 15 bytes of chosen plaintext are required for this attack to succeed. Expand

Performance Analysis of Data Encryption Algorithms

- 2006

The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing… Expand

Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms

- Computer Science
- Int. J. Netw. Secur.
- 2007

The results of the nominal electronic code book are not enthusiastic, so the Cipher Block Chaining and the output feed back modes are implemented and the results are compared. Expand

Cryptography and Network Security (4th Edition)

- Computer Science
- 2005

If you want to possess a one-stop search and find the proper manuals on your products, you can visit this website that delivers many CRYPTOGRAPHY AND NETWORK SECURITY 6TH EDITION. You can get the… Expand

Energy Consumption of Encryption Schemes in Wireless Devices

- Engineering
- 2003

Resources in the wireless environment are limited. The processor has limited capacity and there is limited battery power available. The increasing demand for services on wireless devices has pushed… Expand

Encryption and Power Consumption in Wireless LANs

- Computer Science
- 2001

Encryption is being employed in wireless devices before data are transmitted over the air at the MAC/physical layers and the application layer and it is found that encryption is computationally intensive and consumes energy and computational resources that are limited in Wireless devices. Expand

Battery power-aware encryption

- Computer Science
- TSEC
- 2006

A hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation is introduced and mathematical models to capture the relationships between power consumption and security are proposed. Expand