International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Monthly Hits: ⮙2

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016


A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi


Abstract: Cryptography algorithm is the technique used for concealing the content of message from all users except the sender and the receiver and to authenticate the correctness of message to the recipient. Information security could be implemented with many known security algorithms. The most common of these are encryption algorithms. This paper provides a fair comparison between five most common symmetric key cryptography algorithms DES, SDES, Triple DES, AES and Two Fish. Since main concern here is the performance of algorithms under different settings, the presented comparison takes into consideration the behavior and the performance of the algorithm when different data loads are used. The comparison is made on the basis of encryption, decryption and throughput time with the variation of various file features like different data types, data size and key sizes.


Keywords: Cryptography, Symmetric, Encryption, Decryption, Throughput, Data size


Edition: Volume 5 Issue 8, August 2016,


Pages: 991 - 995


How to Cite this Article?

M. Meena, A. Komathi, "A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART2016990, Volume 5 Issue 8, August 2016, 991 - 995

How to Share this Article?

Enter Your Email Address


Click below to Watch Video Lecture of Above Article

Share this Video Lecture

Similar Articles with Keyword 'Cryptography'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 11

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Similar Articles with Keyword 'Symmetric'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'Decryption'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 11

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Similar Articles with Keyword 'Throughput'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'Data size'

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1164 - 1169

A Survey on Scalable Big Data Analytics Platform

Ravindra Phule, Madhav Ingle

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2815 - 2820

Survey of Hardware Platforms Available for Big Data Analytics Using K-means Clustering Algorithm

Dr. M. Manimekalai, S. Regha

Share this Article
Top