Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016
A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Cryptography algorithm is the technique used for concealing the content of message from all users except the sender and the receiver and to authenticate the correctness of message to the recipient. Information security could be implemented with many known security algorithms. The most common of these are encryption algorithms. This paper provides a fair comparison between five most common symmetric key cryptography algorithms DES, SDES, Triple DES, AES and Two Fish. Since main concern here is the performance of algorithms under different settings, the presented comparison takes into consideration the behavior and the performance of the algorithm when different data loads are used. The comparison is made on the basis of encryption, decryption and throughput time with the variation of various file features like different data types, data size and key sizes.
Keywords: Cryptography, Symmetric, Encryption, Decryption, Throughput, Data size
Edition: Volume 5 Issue 8, August 2016
Pages: 991 - 995
How to Cite this Article?
M. Meena, A. Komathi, "A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2016990, Volume 5 Issue 8, August 2016, 991 - 995
120 PDF Views | 77 PDF Downloads
Similar Articles with Keyword 'Cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Similar Articles with Keyword 'Symmetric'
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2447 - 2449Enhanced Security Providing using Visual Cryptography
Ketan Raju Kundiya, Ram B. Joshi
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2225 - 2229A Novel Real Time Offline Patching Scheme with Secured Logging Over Cloud
Sunita, Shridevi Soma
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1728 - 1731Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1647 - 1650MRI Brain Tumor Classification Using SVM and Histogram Based Image Segmentation
Chinnu A
Similar Articles with Keyword 'Encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1062 - 1064Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition
Devashri Anil Vyawahare, Prof. Anil Gujar
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1270 - 1273A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks
Shishir Sharma, Gajendra Singh Chandel
Similar Articles with Keyword 'Decryption'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1436 - 1439Secure Transmission in Ad-hoc Network: Using Combined Cryptography
Nilesh T Patil
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2535 - 2538A Survey on Security Mechanism using Colors and Armstrong Numbers
Nutan Gurav, Pratap Singh
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Similar Articles with Keyword 'Throughput'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2010 - 2013Analysis of Road Vehicle Density based VANET Routing Protocol in City Environments using QualNet
Amita Jaiswal, Arun Kumar Shukla
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1353 - 1357Analysis of Energy Efficiency and Throughput for IEEE 802.11 based Mobile Adhoc Networks
Manpreet Kaur, Pooja Saini
Similar Articles with Keyword 'Data size'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1164 - 1169A Survey on Scalable Big Data Analytics Platform
Ravindra Phule, Madhav Ingle
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Research Paper, Computer Science & Engineering, China, Volume 4 Issue 10, October 2015
Pages: 378 - 382An Efficient Data Compress Algorithm and Data Mining
Yang Li
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016
Pages: 515 - 518Improved Association Rule Mining based on UP-Growth Algorithm
Ashwini Patil, Poonam Gupta
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1999 - 2002A Survey on Different Text Data Compression Techniques
Apoorv Vikram Singh, Garima Singh