• Corpus ID: 212519699

METRICS FOR PERFORMANCE EVALUATION OF ENCRYPTION ALGORITHMS

@inproceedings{Bharathi2017METRICSFP,
  title={METRICS FOR PERFORMANCE EVALUATION OF ENCRYPTION ALGORITHMS},
  author={Mr. B. Bharathi and Mr. G. Manivasagam and Dr. M. Anand Kumar},
  year={2017}
}
3 Associate Professor, Department of Information Technology, Karapagam University, Coimbatore, Tamilnadu, (India) ABSTRACT Network and internet applications are growing rapidly in the recent past. These applications are used by thousands of users and controlled by different administrative entities. It is mainly used as an efficient means for communication, entertainment and education. With the rapid growth of internet, there is a need for protecting confidential data. The Internet was however… 

Figures and Tables from this paper

Performance Analysis of Cryptographic Algorithms for Cloud Security
TLDR
The work plan is to analyze the efficiency of these algorithms, based on the encryption time, decryption time, encryption throughput and memory utilized for encryption by the algorithms for different sizes of file formats like text, image and video.
COMPARISON OF ECC AND RSA ALGORITHMS IN IOT DEVICES
TLDR
RSA (Rivest Shamir Adleman) and ECC (Elliptic Curve Cryptography) algorithms have been compared for identifying the most lightweight, secure, efficient implementation in IoT and the ECC algorithm outperforms RSA in a constrained environment.
A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem
TLDR
This paper proposes and develops a novel key exchange protocol based on logic algebra for the factorization problem and demonstrates promising results of the proposed approach.

References

SHOWING 1-10 OF 19 REFERENCES
Performance Evaluation of Symmetric Encryption Algorithms
TLDR
Evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, DES, 3DES, RC2, Blowfish, and RC6 to demonstrate the effectiveness of each algorithm.
Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms
TLDR
This paper mainly focuses on two commonly used symmetric encryption algorithms such as Blowfish and Rejindael, which are compared and performance is evaluated.
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
TLDR
This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6, and examines a method for analyzing trade-offs between energy and security.
Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL
TLDR
The security algorithm, twofish has been explained with all of its modules (some modules has been modified) for both 128 and 192-bit key size and implementation on VHDL using Xilinx – 6.1 xst software has been done taking delay as main constraint.
Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers
TLDR
A Web programming language to be analyzed with four Web browsers in term of their performances to process the encryption of the programming language’s script with the Web browsers is proposed and one of the encryption techniques that can be applied is introduced, which is the eXclusive OR (XOR) operation.
An Enhanced Security for TCP/IP Protocol Suite
TLDR
This paper presents the proposed security architecture for the TCP/IP Protocol Suite, which aims to provide protection for the application layer of the network model.
A survey about the latest trends and research issues of cryptographic elements
TLDR
This comprehensive survey thrash outs the latest trends and research issues upon cryptographic elements to conclude forthcoming necessities related to cryptographic key, algorithm structure and enhanced privacy especially in transferring the multimedia information.
Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect
TLDR
This work has modified two secure algorithms Blowfish and CAST-128 which are secretkey block ciphers that enhance performance by modifying their function and shown that total time taken for encryption and decryption is reduced for both the algorithms after the modification.
A primer on cryptography in communications
TLDR
The development of unbreakable cipher keys, cipher-key distribution, identification of malicious actors, source authentication, physical-link signature identification, countermeasures, and so forth has been the major thrust of research efforts with regard to cyber-security.
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
TLDR
This paper presents a comprehensive analysis of the energy requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL), and investigates the impact of various parameters at the protocol level and the cryptographic algorithm level on the overall energy consumption for secure data transactions.
...
...