Loading…
Notice of Violation of IEEE Publication Principles: Peformance analysis of data encryption algorithms
The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and speed are also important concerns. These are the two main characteristics that differentiate one encryption algorithm from another...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and speed are also important concerns. These are the two main characteristics that differentiate one encryption algorithm from another. This paper provides the performance comparison between four of the most commonly used encryption algorithms: DES(Data Encryption Standard), 3DES(Triple DES), BLOWFISH and AES (Rijndael). The comparison has been conducted by running several setting to process different sizes of data blocks to evaluate the algorithms encryption and decryption speed. Based on the performance analysis of these algorithms under different hardware and software platform, it has been concluded that the Blowfish is the best performing algorithm among the algorithms under the security against unauthorized attack and the speed is taken into consideration.
Notice of Violation of IEEE Publication Principles "Peformance Analysis Of Data Encryption Algorithms" by O. P. Verma, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi in the Proceedings of the 3rd International Conference on Electronics Computer Technology (ICECT), April 2011, pp. 399-403 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE’s Publication Principles. This paper is a duplication of the original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: "Performance Analysis of Data Encryption Algorithms" by Abdel-Karim Al Tamimi in his Student Project--http://www.cs.wustl.edu/~jain/cse567-06/encryption_perf.htm Available online September 2008 |
---|---|
DOI: | 10.1109/ICECTECH.2011.5942029 |