Comparative Analysis of Cryptographic Algorithms in Securing Data

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2018 by IJETT Journal
Volume-58 Number-3
Year of Publication : 2018
Authors : Taylor, Onate E, Emmah, Victor T.
DOI :  10.14445/22315381/IJETT-V58P223


Taylor, Onate E, Emmah, Victor T. "Comparative Analysis of Cryptographic Algorithms in Securing Data", International Journal of Engineering Trends and Technology (IJETT), V58(3),118-122 April 2018. ISSN:2231-5381. published by seventh sense research group

Despite the numerous cryptographic algorithms being implemented in our world today, we still encounter issues of their usage. While some are very efficient in communication across networks, others are better in file encryption such as images, text files etc. The efficiency of these algorithms varies based on the purpose of encryption. This paper focuses on the comparative analysis of modern cryptographic algorithm. In this paper, we analyzedthe Advance Encryption Algorithm (AES), Data Encryption Algorithm (DES), and Rivest Shamir Alderman (RSA) and compare them based on the following parameters namely: computation time, memory utilization and security level. A simulation program was developed to make the comparisons and result obtained shows that AES is a better solution based on computation time, memory utilization and security level.

[1] S.Kumari and J. Chawla, Comparative Analysis on Different Parameters of Encryption Algorithms for Information Security, International Journal of Innovations & Advancement in Computer Science (IJIACS), Volume 4, Special Issue, pp. 123-129, 2015.
[2] S. Gurpreet and Supriya,A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information SecurityInternational Journal of Computer Applications, Volume6, Issue 19, pp. 33-38, 2013.
[3] H.O.Alanazi, B.B.Zaidan, A.A.Zaidan, H.A.Jalab, M.Shabbir and Y.Al-Nabhani,New Comparative Study Between DES, 3DES and AES within Nine Factors", Journal of Computing, Volume 2, Issue 3, pp.152-157, 2010.
[4]N.Singhaland J.P.S.Raina,Comparative Analysis of AES and RC4 Algorithms for Better Utilization, International Journal of Computer Trends and Technology, 177-181, 2011. [5] K.Ajah, M.Singh and P. Bansel, Comparison of Various Encryption Algorithms and Techniques for Secured Data Communication in Multinode Network. International Journal of Engineering and Technology, Volume 2, Issue 1, pp.87-92, 2012.
[6] K.Aman, J. Sudesh and M.Sunil, Comparative Analysis between DES and RSA Algorithm’s: International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7,pp. 386-391,2012.
[7] DiaaSalama A. Elminaam, M.Hatem and Mohi M.Hadhoud, Performance Evaluation of Symmetric Encryption Algorithms: IJCSNS International Journal of Computer Science and Network Security, Volume 8, Issue 12, pp.280-286, 2008.
[8] S.Lalit and R.Bharti, Comparison among different Cryptographic Algorithms: Neighborhood-Generated Keys InternationalJournal of Computer Applications (0975 – 8887), Volume 73, Issue 5, pp. 144-153, 2013.
[9] S. Neetu, Cryptanalysis of Modern Cryptographic Algorithms: International Journal of Computer Science and Technology,Volume 1, Issue 2, pp.166-169, 2012.
[10] M. Mini and S.Aman,Study of Various Cryptographic Algorithms. International Journal of Scientific Engineering and Research (IJSER) ISSN (Online): 2347?3878, 1 (3): pp.1667-1672, 2013.
[11] S. Pavithra, and E.Ramadevi, (2012). Performance Evaluation of Symmetric Algorithms: Journal of Global Research in Computer Science, 3 (8): 43-45.
[12] Pasmavathi B. and Ranjitha S.A Survey Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique: International Journal of Science and Research (IJSR) Volume 2, Issue 4, pp. 170-174,2013.

Cipher Text, Decryption, Encryption, Plain Text.