首页    期刊浏览 2024年12月04日 星期三
登录注册

文章基本信息

  • 标题:A Review and Comparative Analysis of Various Encryption Algorithms
  • 本地全文:下载
  • 作者:Rajdeep Bhanot ; Assistant Professor in dept. of CSE; DAV University Jalandhar
  • 期刊名称:International Journal of Security and Its Applications
  • 印刷版ISSN:1738-9976
  • 出版年度:2015
  • 卷号:9
  • 期号:4
  • 页码:289-306
  • DOI:10.14257/ijsia.2015.9.4.27
  • 出版社:SERSC
  • 摘要:Now days, Data security is very challenging issue that touches many areas including computers and communication. Recently, we came across many attacks on cyber security that have played with the confidentiality of the users. These attacks just broke all the security algorithms and affected the confidentiality, authentication, integrity, availability and identification of user data. Cryptography is one such way to make sure that confidentiality, authentication, integrity, availability and identification of user data can be maintained as well as security and privacy of data can be provided to the user. Encryption is the process of converting normal data or plaintext to something incomprehensible or cipher-text by applying mathematical transformations or formulae. These mathematical transformations or formulae used for encryption processes are called algorithms. We have analysed ten data encryption algorithms DES, Triple DES, RSA, AES, ECC, BLOWFISH, TWOFISH, THREEFISH, RC5 and IDEA etc. Among them DES, Triple DES, AES, RC5, BLOWFISH, TWOFISH, THREEFISH and IDEA are symmetric key cryptographic algorithms. RSA and ECC are asymmetric key cryptographic algorithms. In this paper, we have analysed various encryption algorithms on the basis of different parameters and compared them to choose the best data encryption algorithm so that we can use it in our future work.
  • 关键词:Security; Cryptograph; Algorithm; Key; Cipher; Security attacks; NIST etc
国家哲学社会科学文献中心版权所有