Analyse the Encryption and Decryption Conversion Time of Various Algorithms on Different Settings of Dataset

A. Usha*, A. Subramani**
* M.Phil Scholar, Department of Computer Science, Govt. Arts College, Dharmapuri, India.
** Assistant Professor, Department of Computer Science and Engineering, Govt. Arts College, Dharmapuri, India.
Periodicity:June - August'2016
DOI : https://doi.org/10.26634/jit.5.3.8140

Abstract

Security is the most difficult angle in the system correspondence framework. In system correspondence framework, trade of information data for the most part happens on arranged PCs, remote telephone, and other web based electronic contraptions. Cryptography is the one of the primary PC securities that proselytes data from its ordinary structure into a disjointed structure by utilizing encryption and decoding strategies. The security of remote systems principle acknowledges and the procedure of encryption and decoding assumes as an imperative part to give security to the remote systems. Unsecured information goes through numerous kinds of result. The cryptography strategies used to just an approve individual can have the capacity to open and read the first message. Various cryptography methods are created to accomplish the security in the system correspondence framework. There are essentially two sorts of cryptography systems, viz. symmetric key and Asymmetric key. In Symmetric key systems, the same key is utilized to encryption and unscrambling information. An awry key procedure is utilized to illuminate the key circulation. In Asymmetric keys, are utilized in two keys particular open key and private key. In this, the Public key is utilized for encryption and the private key is utilized for decoding. This paper gives a contrast between the cryptography calculations on various settings of information parcels and utilizing the different calculations (DES, AES, Blowfish, RSA, RC6, RC4, and TRIPLEDES). In this paper relative investigation of the DES, AES, Blowfish, RSA, RC6, RC4 and TRIPLEDES calculations, for example, distinctive size of information squares, diverse key sizes, and encryption /decoding speed are done. Various symmetric and lopsided calculations are proposed in reason situation. Numerous favourable position and weakness are in calculation. This paper is a review of the better than ever Security based calculations in system security.

Keywords

Encryption, DES, AES, Blowfish, RSA, RC4, RC6, TRIPLEDES.

How to Cite this Article?

Usha. A and Subramani. A (2016). Analyze the Encryption and Decryption Conversion Time of Various Algorithms on Different Settings of Dataset. i-manager’s Journal on Information Technology, 5(3), 44-53. https://doi.org/10.26634/jit.5.3.8140

References

[1]. Monoj Kumar Pandey and Deepty Dubey, (2013). “Cryptography the Art of Hiding Information”. International Journal of Advanced Research in Computer Engineering and Technology, (ISSN: 2278-1323), Vol. 2, No. 12.
[2]. Ranjeet Masram,Vivek Shahare, Jibi Abraham, Rajni Moona, Pradeep Sinha, Gaur Sunder, Prashant Bendale and Sayali Pophalkar, (2014). “Dynamic Selection of Symmetric Key Cryptographic Algorithms For Securing Data Based on Various Parameters”. Department Engineering And Information Technology, COEP, India.
[3]. Ezeofor C.J, and Ulasi A.G., (2014). “Analysis of Network Data Encryption and Decryption Techniques in Communication System”. International Journal of Innovative Research in Science, Engineering and Technology, (ISSN: 2319-8753), Vol. 3, No. 12.
[4]. Rajdeep Bhanot and Rahul Hans, (2015). “Review and Comparative Analysis of Various Encryption Algorithms”. International Journal of Security and Its Applications, Vol. 9, No. 4, pp. 289-306.
[5]. Sunil Mankotia and Manu Sood, (2015). “A Critical Analysis of Some Symmetric Key Block Cipher Algorithm”. International Journal of Computer Science and Information Technology, Vol. 6, No. 1, pp. 496-499.
[6]. Pratap Chandra Mandal, (2012). “Evaluation of Performance of the Symmetric Key Algorithm: DES, 3DES, AES and BLOWFISH”. Journal of Global Research in Computer Science, (ISSN 2229-371X, Vol. 3, No. 8.
[7]. Jawaharlal Thakur, and Nagesh Kumar, (2011). “DES AES and BLOWFISH: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”. International Journal of Emerging Technology and Advanced Engineering, (ISSN 2250-2459, Vol. 1, No. 2.
[8]. Shaza D. Rihan, Ahmed Khalid, and Saife Eldin F. Osman, (2015). “A Performance Comparison of Encryption Algorithms AES and DES”. International Journal of Engineering Research & Technology (IJERT), (ISSN: 2278-0181, Vol. 4, No. 12.
[9]. Sombir Singh, Sunil K Maakar and Sudesh Kumar, (2013). “A Performance Analysis of DES and RSA Cryptography”. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), ISSN 2278- 6856, Vol. 2, No. 3.
[10]. K. Kalaiselvi, and Anand Kumar, (2015). “Implementation Issues and Analysis of Cryptographic Algorithm Based on Different Security Parameters”. International Journal of Computer Applications (0975- 8887) International Conference on Current Trends in Advanced Computing (ICCTAC-2015).
[11]. Srinivas B.L, Anish Shanbhag, Austin Solomon D, and Souza, (2014). “A Comparative Performance Analysis of DES and BLOWFISH Symmetric Algorithm”. International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, No. 5.
[12]. Pratap Chandra Mandal, (2012). “Superiority of BLOWFISH Algorithm”. International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 9, ISSN 2277-128X.
[13]. Tanjyot Aurora and Parul Arora, (2013). “BLOWFISH Algorithm”. International Journal of Computer Science and Communication Engineering IJCSCE Special Issue on Recent Advances in Engineering & Technology, NCRAET-2013, ISSN:2319-7080.
[14]. Rajender Singh, Rahul Misra, and Vikas Kumar, (2013). “Analysis the Impact of Symmetric Cryptographic Algorithms on Power Consumption for Various Data Types”. International Journal on Recent and Innovation Trends in Computing and Communication, ISSN 2321-8169, Vol. 1, No. 4.
[15]. Laxmi Mounika. Nannaka, Hepzybah, Singarapu and Ramadevi. Puli (2012). “Remodelling RC4 Algorithm for Secure Communication for WEP/WLAN Protocol”. Global Journal of Researches in Engineering, Electrical and Electronics Engineering, Vol. 12, No. 5, Version 1.0
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.