A Study and Comparison of the Various Cryptography Technique Standards within Fifteen Factors

Pushpendra Tiwari*
Department of Computer Science, Madhyanchal Professional University, Bhopal, Madhya Pradesh, India.
Periodicity:January - June'2023
DOI : https://doi.org/10.26634/jdf.1.1.19134


This paper focuses on analyzing the performance of various encryption algorithms, namely RSA, ECC, and DSA, in terms of encrypting and decrypting sensitive data. Encryption is crucial for ensuring the security of data, and there are two types of encryption algorithms: Symmetric key and Asymmetric-key encryption. RSA is highly secure but has high computation time, whereas ECC provides equivalent security with lower computing power and battery usage. The study compares the implementation and analysis of DES, 3DES, AES, RSA, ECC, and DSA, highlighting their strengths and weaknesses. The paper aims to provide a comprehensive comparison of these cryptographic techniques, including their performances, to assist in selecting the most appropriate algorithm for specific applications.


Encryption, Decryption, Cryptography Algorithm, Cryptanalysis, Cipher Text, Symmetric, Asymmetric.

How to Cite this Article?

Tiwari, P. (2023). A Study and Comparison of the Various Cryptography Technique Standards within Fifteen Factors. i-manager’s Journal on Digital Forensics & Cyber Security, 1(1), 21-29. https://doi.org/10.26634/jdf.1.1.19134


[1]. Akram, W. (2019). A study on role and applications of cryptography techniques in cloud computing (cloud cryptography). International Journal of Advanced Scientific Research and Management, 4(1), 134-137.
[5]. Bhirud, K., Kulkarni, D., Pawar, R., & Patil, P. (2016). Data security using elliptic curve cr yptography. International Journal of Computer Engineering In Research Trends, 3(5), 222-225.
[7]. Preetha, M., & Nithya, M. (2013). A study and performance analysis of RSA algorithm. International Journal of Computer Science and Mobile Computing, 2(6), 126-139.
[8]. Rawal, S. (2016). Advanced encryption standard (AES) and it's working. International Research Journal of Engineering and Technology, 3(8), 1165-1169.
[10]. Thirupalu, U., Reddy, D. E. K., & Spandhana, E. (2018). Security analysis of cryptographic algorithms in cloud computing. International Journal of Engineering Research & Technology (IJERT), 7(10), 208-212.
[11]. Tushar, A. S., & Mishra, A. (2021). Cryptographic algorithm for enhancing data security: a theoretical approach. International Journal of Engineering Research & Technology, 10(3), 274-277.
[12]. Usha, D. D., & Subbbulakshmi, M. (2018). Double layer encryption algorithm key cryptography for secure data sharing in cloud. International Journal of Scientific & Engineering Research, 9(5), 91-94.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 40 40 300
Online 40 40 300
Pdf & Online 40 40 300

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.