Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 4, April 2015
Performance Evaluation of Various Symmetric and Asymmetric Cryptosystems for Variable Text Size
Himani Agrawal, Dr. Mrs. Monisha Sharma
Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. Many encryption algorithms are widely available and used in information security. They can be categorized into Symmetric (private) and Asymmetric (public) key encryption. Symmetric key ciphers use the same key for encryption and decryption, or the key used for decryption is easily calculated from the key used for encryption. Symmetric key ciphers can be broadly grouped into block ciphers and stream ciphers. Symmetric encryption has a troublesome drawback i. e. , two people who wish to exchange confidential messages must share a secret key. The key must be exchanged in a secure way. Key distribution is difficult among the parties. One thing common to all private key cryptosystems is that if one knows how to cipher a message then he automatically knows how to decipher the message. Thus the method of ciphering must be kept secret. Once the ciphering method is compromised the cryptosystem is useless. Thus this cryptosystem is less secure but having high speed therefore frequently used for sending bulk messages. The ideas of the public key cryptosystems was first introduced by Diffie and Hellman  in 1976. Since then, several different protocols for public key cryptography have been presented e. g. RSA, ECC etc. Public key cryptosystems are highly secure but having less speed as compared to private key cryptosystems. Therefore generally used for sending short messages like secret keys. This paper presents the comparative study of some most popular Symmetric cryptosystems i. e. RC4, DES, 3DES, AES, Blowfish and some popular Asymmetric cryptosystems i. e. RSA, RSA PKCS1, RSA SAEP+, RSA OAEP, RSA OAEP+, React RSA, Hybrid React RSA and NTRU. These algorithms are compared on the basis of simulation time required for key generation, encryption and decryption for variable sized text data as input and the results were observed, analyzed and compared so as to identify which method is appropriate to the business needs.
Keywords: Asymmetric Key, Asymmetric Key, DES, AES, 3DES, Blowfish, RC4, RSA, RSA family, NTRU
Edition: Volume 4 Issue 4, April 2015
Pages: 1588 - 1591
How to Cite this Article?
Himani Agrawal, Dr. Mrs. Monisha Sharma, "Performance Evaluation of Various Symmetric and Asymmetric Cryptosystems for Variable Text Size", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153401, Volume 4 Issue 4, April 2015, 1588 - 1591
Similar Articles with Keyword 'Asymmetric Key'
Designing a Model for Energy Efficient and Secured Data Communication Using RSA Algorithm in Wireless Sensor Networks
Sangeeta Patil, Padmapriya Patil
eCourt with Asymmetric Key Security using Digital Signature
Surender I, Bharathi R
Similar Articles with Keyword 'DES'
Realization of Smart City Using 5G Cognitive Radio
Lalit Chettri, Syed Sazad
Design and Simulation of Four Stage Pipelining Architecture Using the Verilog
Rakesh M. R
Similar Articles with Keyword 'AES'
DPA Resistant AES Using a True Random Based LFSR Technique
Reenu Tomy, Vinoj P.G.
An Enhanced Approach for Video Encryption using Multilayer and Scrambling through AES Algorithm
Vinay Kumar Soni, Prashant Puri Goswami
Similar Articles with Keyword 'Blowfish'
Low Latency for File Encryption and Decryption Using BRA Algorithm for Secure Transmission of Data
Kalyani V. Gulhane, Prof. G. D. Dalvi
A Survey Paper Based On Image Encryption and Decryption Using Modified Advanced Encryption Standard
Yogita Verma, Neerja Dharmale
Similar Articles with Keyword 'RC4'
Automatic Vehicle Recognition and Destruction for Military Application
Mugdha Deshmukh, Prachi Gaikwad, Tanmay Gaikwad, Ashok Joglekar
SOC Based Cryptosystem Implementation Using RC4 and IDEA Algorithm
Surekha Pujar, Sleeba Mathew
Similar Articles with Keyword 'RSA'
Implementation of RSA Cryptosystem Using Ancient Indian Vedic Mathematics
Shahina M. Salim, Sonal A. Lakhotiya
Design and Implementation of Rijindael's Encryption and Decryption Algorithm using NIOS-II Processor
Monika U. Jaiswal, Nilesh A. Mohota
Similar Articles with Keyword 'NTRU'
New Approach of Intrusion Detection for Malicious Behavior Detection in MANETS
Aruna P Adhav, K T Jadhao
Intrusion Detection System in Wireless Sensor Networks
Similar Articles with Keyword 'Asymmetric'
Asymmetric SRAM Memory Cell for Power Reduction
Elizebeth Mohan, Sarabdeep Singh
A Novel Routing Technique for Asymmetric Links: ProHet
Ajily Rachel Varghese, Neethu Verjisen
Similar Articles with Keyword 'Key'
HMAC Based Secure Authentication of VANETs
Swagat. S. Gudagudi, Dr. Veena Desai
Saliency Technique for Efficient Back Ground Subtraction
Aiswarya Muralidharan, S. Sivakumar