Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish

  • Authors

    • Pankaj Singh
    • Sachin Kumar
    2017-12-31
    https://doi.org/10.14419/ijet.v7i1.5.9150
  • Encryption, Decryption, Cryptography, AES, DES, RSA, Blowfish, Triple-DES
  • Abstract

    Cryptography is about protecting the data from third parties or from public to read confidential data. Cryptography mainly focuses on encrypting the data or we can say converting the data and decrypting the actual data or we can say reconverting the data by different methods. These encryption and decryption methods are based on mathematical theories and are implemented by computer science practices. But as cryptography progressed ways were found to decode the secured data and view actual data. This was also done by the use of mathematical theories and computer science practices. Popular algorithms which are used in today’s world are, AES (Advance Encryption Standard), Blowfish, DES (Data Encryption Standard), T-DES (Triple Data Encryption Standard), etc. Some of the previously known algorithms were RSA (Rivest–Shamir–Adleman), ECC (Elliptic curve cryptography), etc. These algorithms have their own advantages and drawbacks. But as people were progressing more in breaking them down, these algorithms were supported by digital signatures or hash done by different algorithms like MD5, SHA, etc. By these means data integrity, data confidentiality, and authentication of data are maintained. But as the things are progressing it seems that new advancements are always needed in the field of cryptography to keep the data secure.

  • References

    1. [1] Idrizi, Florim, Dalipi, Fisnik & Rustemi, Ejup. “Analyzing the speed of combined cryptographic algorithms with secret and public keyâ€. International Journal of Engineering Research and Development, August 2013.

      [2] Padmapriya, Dr. A, Subhasri, “Cloud Computing: Security Challenges & Encryption Practicesâ€,IJARC, March 2013.

      [3] Abdul.Mina, D.S, Kader, H.M., Abdual & Hadhoud, M.M. “Performance Analysis of SymmetricCryptographyâ€.

      [4] Madhumita Panda “Performance analysis of encryption algorithms for securityâ€, IEEE SCOPES, Oct. 2016

      [5] Chehal Ritika, Singh Kuldeep, “Efficiency and Security of Data with Symmetric EncryptionAlgorithmsâ€, IJARC, August 2012.

      [6] Pooja Dixit, Avadhesh Kumar Gupta, Munesh Chandra Trivediand Virendra Kumar Yadav “Traditional and Hybrid Encryption Techniques: A Surveyâ€, Springer LNDECT, 2017

      [7] Prashanti.G, Deepthi.S & Sandhya Rani.K., “A Novel Approach for Data Encryption Standard Algorithmâ€. IJEAT, June 2013.

      [8] R. Ahmad, W.Ismail“Performance Comparison of the Improved Power-Throughput AES and Blowfish Algorithms on FPGAâ€, Springer LNEE, volume 398, 2016

      [9] Sunitha K, Prashanth K.S., “Enhancing Privacy in Cloud Service Provider Using CryptographicAlgorithmâ€, IOSR Journal of Computer Engineering ,2013.

      [10] Das Debasis, Misra Rajiv, “Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithmâ€, IJNSA, November 2011.

      [11] Kalpana Parsi, Singaraju Sudha, “Data Security in Cloud Computing using RSA Algorithmâ€, IJRCCT, September 2012.

      [12] Praveen Kumar, Seema Rawat, Tanupriya Choudhury, Sanju Pradhan. “A performance based comparison of various symmetric cryptographic algorithms in run-time scenarioâ€, IEEE: System Modelling & Advancement in Research Trends, Nov. 2016.

      [13] M. Rajesh, Manikanthan, “ANNOYED REALM OUTLOOK TAXONOMY USING TWIN TRANSFER LEARNINGâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-116, No. 21, Oct 2017.

      [14] S.V.Manikanthan and K.srividhya "An Android based secure access control using ARM and cloud computing", Published in: Electronics and Communication Systems (ICECS), 2015 2nd International Conference on 26-27 Feb. 2015,Publisher: IEEE,DOI: 10.1109/ECS.2015.7124833.

      [15] T. Padmapriya and V.Saminadan, “Improving Performance of Downlink LTE-Advanced Networks Using Advanced Networks Using Advanced feedback Mechanisms and SINR Modelâ€, International Conference on Emerging Technology (ICET), vol.7, no.1, pp: 93, March 2014.

      [16] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.

  • Downloads

  • How to Cite

    Singh, P., & Kumar, S. (2017). Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish. International Journal of Engineering & Technology, 7(1.5), 221-225. https://doi.org/10.14419/ijet.v7i1.5.9150

    Received date: 2018-01-11

    Accepted date: 2018-01-11

    Published date: 2017-12-31