Performance analysis of cryptographic algorithms for selecting better utilization on resource constraint devices

ME Haque, SM Zobaed, MU Islam… - 2018 21st International …, 2018 - ieeexplore.ieee.org
In this paper, we provide a comprehensive performance evaluation of popular symmetric
and asymmetric key encryption algorithms to selecting better utilization on resource
constraint and mobile devices. We focus on AES, RC4, Blowfish, CAST, 3DES, Twofish as
symmetric key encryption and DSA and ElGamal as an asymmetric encryption algorithms.
The performance is compared using different parameters such as key size, data blocks, data
types, and encryption/decryption speed. The experiments are performed to exploit the …

[PDF][PDF] Performance analysis of cryptographic algorithms in the information security

U Thirupalu, EK Reddy - Int. J. Eng. Res. Technol, 2020 - researchgate.net
Information security is the process of protecting information. It protects its availability, privacy
and integrity. The two main characteristics that identify and differentiate one encryption
algorithm from another are its ability to secure the protected data against attacks, speed and
efficiency. security is the most challenging issue in the world and the various security threats
in the cyber security has to be avoided and to give more confidentiality to the users and to
enable high integrity and availability of the data. The encryption of the data by using the …
以上显示的是最相近的搜索结果。 查看全部搜索结果