A Survey on Performance Analysis of DES; AES and RSA Algorithm along with LSB Substitution Technique
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 158 , Downloads: 131 | CTR: 83 % | Weekly Popularity: ⮙2

Survey Paper | Computer Science & Engineering | India | Volume 2 Issue 4, April 2013

A Survey on Performance Analysis of DES; AES and RSA Algorithm along with LSB Substitution Technique

B. Padmavathi, S. Ranjitha Kumari

Now a days sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. The present work focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encrypted algorithm in cryptography .Secondly the encrypted data must be hidden in an image or video or an audio file with help of steganographic algorithm. Thirdly by using decryption technique the receiver can view the original data from the hidden image or video or audio file. Transmitting data or document can be done through these ways will be secured. In this paper we implemented three encrypt techniques like DES, AES and RSA algorithm along with steganographic algorithm like LSB substitution technique and compared their performance of encrypt techniques based on the analysis of its stimulated time at the time of encryption and decryption process and also its buffer size experimentally. The entire process has done in C#.

Keywords: Cryptography, Steganography, DES, RSA, AES, LSB

Edition: Volume 2 Issue 4, April 2013

Pages: 170 - 174

Share this Article

How to Cite this Article?

B. Padmavathi, S. Ranjitha Kumari, "A Survey on Performance Analysis of DES; AES and RSA Algorithm along with LSB Substitution Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON120134, Volume 2 Issue 4, April 2013, 170 - 174

158 PDF Views | 131 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Views: 158 , Downloads: 89 | CTR: 56 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Views: 169 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 141 , Downloads: 99 | CTR: 70 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Views: 135 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Views: 139 , Downloads: 100 | CTR: 72 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Similar Articles with Keyword 'Steganography'

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Views: 135 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Views: 143 , Downloads: 102 | CTR: 71 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Views: 121 , Downloads: 103 | CTR: 85 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Views: 127 , Downloads: 104 | CTR: 82 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Similar Articles with Keyword 'DES'

Views: 200 , Downloads: 123 | CTR: 62 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Views: 151 , Downloads: 103 | CTR: 68 %

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Views: 227 , Downloads: 150 | CTR: 66 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Views: 204 , Downloads: 175 | CTR: 86 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 24 , Downloads: 23 | CTR: 96 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1720 - 1723

Key Phrase Extraction Using Recurrent Neural Network

Aakib Jabbar, Preeti Sondhi

Share this Article

Similar Articles with Keyword 'RSA'

Views: 158 , Downloads: 89 | CTR: 56 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Views: 128 , Downloads: 96 | CTR: 75 % | Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1303 - 1305

Obstacle Detection Technologies to Empower Visually Challenged: A Short Notes

N. Laxmi Manasa

Share this Article

Views: 124 , Downloads: 98 | CTR: 79 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Views: 135 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Views: 130 , Downloads: 100 | CTR: 77 %

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Similar Articles with Keyword 'AES'

Views: 139 , Downloads: 98 | CTR: 71 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2084 - 2088

A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections

Rupali Tanaji Waghmode, Nikita J. Kulkarni

Share this Article

Views: 129 , Downloads: 99 | CTR: 77 %

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Views: 152 , Downloads: 103 | CTR: 68 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Views: 132 , Downloads: 104 | CTR: 79 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1398 - 1401

A Review on Encryption Techniques to Secure a Cloud

Ramandeep Kaur, Ashish Verma

Share this Article

Views: 158 , Downloads: 104 | CTR: 66 %

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1435 - 1439

Review on Encryption Techniques in Multimedia Data

Ashwini G. Kamble, Prof. Nikita J. Kulkarni

Share this Article

Similar Articles with Keyword 'LSB'

Views: 132 , Downloads: 103 | CTR: 78 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Views: 138 , Downloads: 105 | CTR: 76 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Views: 123 , Downloads: 105 | CTR: 85 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1976 - 1979

Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method

Ekata S. Bele, Chetan Bawankar

Share this Article

Views: 118 , Downloads: 105 | CTR: 89 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Views: 149 , Downloads: 107 | CTR: 72 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article
Top