Performance Evaluation of Various Symmetric and Asymmetric Cryptosystems for Variable Text Size
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 116

Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 4, April 2015

Performance Evaluation of Various Symmetric and Asymmetric Cryptosystems for Variable Text Size

Himani Agrawal, Dr. Mrs. Monisha Sharma

Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. Many encryption algorithms are widely available and used in information security. They can be categorized into Symmetric (private) and Asymmetric (public) key encryption. Symmetric key ciphers use the same key for encryption and decryption, or the key used for decryption is easily calculated from the key used for encryption. Symmetric key ciphers can be broadly grouped into block ciphers and stream ciphers. Symmetric encryption has a troublesome drawback i. e. , two people who wish to exchange confidential messages must share a secret key. The key must be exchanged in a secure way. Key distribution is difficult among the parties. One thing common to all private key cryptosystems is that if one knows how to cipher a message then he automatically knows how to decipher the message. Thus the method of ciphering must be kept secret. Once the ciphering method is compromised the cryptosystem is useless. Thus this cryptosystem is less secure but having high speed therefore frequently used for sending bulk messages. The ideas of the public key cryptosystems was first introduced by Diffie and Hellman [2] in 1976. Since then, several different protocols for public key cryptography have been presented e. g. RSA, ECC etc. Public key cryptosystems are highly secure but having less speed as compared to private key cryptosystems. Therefore generally used for sending short messages like secret keys. This paper presents the comparative study of some most popular Symmetric cryptosystems i. e. RC4, DES, 3DES, AES, Blowfish and some popular Asymmetric cryptosystems i. e. RSA, RSA PKCS1, RSA SAEP+, RSA OAEP, RSA OAEP+, React RSA, Hybrid React RSA and NTRU. These algorithms are compared on the basis of simulation time required for key generation, encryption and decryption for variable sized text data as input and the results were observed, analyzed and compared so as to identify which method is appropriate to the business needs.

Keywords: Asymmetric Key, Asymmetric Key, DES, AES, 3DES, Blowfish, RC4, RSA, RSA family, NTRU

Edition: Volume 4 Issue 4, April 2015

Pages: 1588 - 1591

Share this Article

How to Cite this Article?

Himani Agrawal, Dr. Mrs. Monisha Sharma, "Performance Evaluation of Various Symmetric and Asymmetric Cryptosystems for Variable Text Size", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153401, Volume 4 Issue 4, April 2015, 1588 - 1591

Enter Your Email Address




Similar Articles with Keyword 'Asymmetric Key'

Downloads: 110

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1504 - 1508

Designing a Model for Energy Efficient and Secured Data Communication Using RSA Algorithm in Wireless Sensor Networks

Sangeeta Patil, Padmapriya Patil

Share this Article

Downloads: 132

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 2, February 2014

Pages: 21 - 26

eCourt with Asymmetric Key Security using Digital Signature

Surender I, Bharathi R

Share this Article

Similar Articles with Keyword 'DES'

Downloads: 182

Informative Article, Electronics & Communication Engineering, India, Volume 4 Issue 10, October 2015

Pages: 188 - 191

Realization of Smart City Using 5G Cognitive Radio

Lalit Chettri, Syed Sazad

Share this Article

Downloads: 121

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 3, March 2014

Pages: 108 - 112

Design and Simulation of Four Stage Pipelining Architecture Using the Verilog

Rakesh M. R

Share this Article

Similar Articles with Keyword 'AES'

Downloads: 101

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1865 - 1868

DPA Resistant AES Using a True Random Based LFSR Technique

Reenu Tomy, Vinoj P.G.

Share this Article

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Informative Article, Electronics & Communication Engineering, India, Volume 7 Issue 4, April 2018

Pages: 1774 - 1776

An Enhanced Approach for Video Encryption using Multilayer and Scrambling through AES Algorithm

Vinay Kumar Soni, Prashant Puri Goswami

Share this Article

Similar Articles with Keyword 'Blowfish'

Downloads: 114

Research Paper, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1531 - 1535

Low Latency for File Encryption and Decryption Using BRA Algorithm for Secure Transmission of Data

Kalyani V. Gulhane, Prof. G. D. Dalvi

Share this Article

Downloads: 130

Survey Paper, Electronics & Communication Engineering, India, Volume 4 Issue 3, March 2015

Pages: 352 - 355

A Survey Paper Based On Image Encryption and Decryption Using Modified Advanced Encryption Standard

Yogita Verma, Neerja Dharmale

Share this Article

Similar Articles with Keyword 'RC4'

Downloads: 112

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1005 - 1008

Automatic Vehicle Recognition and Destruction for Military Application

Mugdha Deshmukh, Prachi Gaikwad, Tanmay Gaikwad, Ashok Joglekar

Share this Article

Downloads: 113

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2338 - 2341

SOC Based Cryptosystem Implementation Using RC4 and IDEA Algorithm

Surekha Pujar, Sleeba Mathew

Share this Article

Similar Articles with Keyword 'RSA'

Downloads: 103

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3221 - 3230

Implementation of RSA Cryptosystem Using Ancient Indian Vedic Mathematics

Shahina M. Salim, Sonal A. Lakhotiya

Share this Article

Downloads: 103

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1477 - 1481

Design and Implementation of Rijindael's Encryption and Decryption Algorithm using NIOS-II Processor

Monika U. Jaiswal, Nilesh A. Mohota

Share this Article

Similar Articles with Keyword 'NTRU'

Downloads: 104

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1367 - 1371

New Approach of Intrusion Detection for Malicious Behavior Detection in MANETS

Aruna P Adhav, K T Jadhao

Share this Article

Downloads: 105

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1052 - 1058

Intrusion Detection System in Wireless Sensor Networks

Sarfraz Ali

Share this Article

Similar Articles with Keyword 'Asymmetric'

Downloads: 106 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Review Papers, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2990 - 2992

Asymmetric SRAM Memory Cell for Power Reduction

Elizebeth Mohan, Sarabdeep Singh

Share this Article

Downloads: 107 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2233 - 2236

A Novel Routing Technique for Asymmetric Links: ProHet

Ajily Rachel Varghese, Neethu Verjisen

Share this Article

Similar Articles with Keyword 'Key'

Downloads: 88

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1471 - 1476

HMAC Based Secure Authentication of VANETs

Swagat. S. Gudagudi, Dr. Veena Desai

Share this Article

Downloads: 93

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 3, March 2015

Pages: 508 - 513

Saliency Technique for Efficient Back Ground Subtraction

Aiswarya Muralidharan, S. Sivakumar

Share this Article



Top