A Survey on Cryptography Algorithms

AbstractWith the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data transfer through the web, the data should be encrypted. Encryption is the process of transforming plain text into ciphered-text, which cannot be understood or altered easily by undesirable people. It can also be defined as the science that uses mathematics in data encryption and decryption operations. In this paper, we discuss several important algorithms used for the encryption and decryption of data in all fields, to make a comparative study for most important algorithms in terms of data security effectiveness, key size, complexity and time, etc. This research focused on different types of cryptography algorithms that are existing, like AES, DES, TDES, DSA, RSA, ECC, EEE and CR4...etc.

[1]  Sheetal Charbathia A Comparative Study of Rivest Cipher Algorithms , 2014 .

[2]  Nagesh Kumar,et al.  DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .

[3]  K. Patel,et al.  Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing , 2016 .

[4]  Nabi Mustafa,et al.  Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication , 2015 .

[5]  Rehab F. Hassan,et al.  New Approach for Modifying Blowfish Algorithm by Using Multiple Keys , 2011 .

[6]  Phillip Rogaway,et al.  A Software-Optimized Encryption Algorithm , 1998, Journal of Cryptology.

[7]  Rahul Gupta,et al.  Notice of Violation of IEEE Publication Principles , 2004 .

[8]  Mahmoud A. Elsadd,et al.  Investigation of cryptography algorithms used for security and privacy protection in smart grid , 2017, 2017 Nineteenth International Middle East Power Systems Conference (MEPCON).

[9]  A. Suruliandi,et al.  Performance analysis of encryption algorithms for Information Security , 2013, 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT).

[10]  Pierre E. Abi-Char,et al.  Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey , 2015 .

[11]  Xin Zhou,et al.  Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.

[12]  Zoran Hercigonja Comparative Analysis of Cryptographic Algorithms , 2017 .

[13]  Rajan Mishra,et al.  Comparative Analysis Of Encryption Algorithms For Data Communication , 2011 .

[14]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[15]  Ritu Agarwal,et al.  Peformance analysis of data encryption algorithms , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[16]  A. K. Mandal,et al.  Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[17]  Gurjeevan Singh,et al.  A Study of New Trends in Blowfish Algorithm , 2011 .

[18]  Bruce Schneier,et al.  Applied cryptography, second edition : protocols, algorithms,and source code in C , 2015 .

[19]  K. Vasanth,et al.  BLOWFISH ENCRYPTION ALGORITHM FOR INFORMATION SECURITY , 2015 .

[20]  Hitesh Gupta,et al.  Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm , 2013 .

[21]  Raman Maini,et al.  COMPARISON OF DATA ENCRYPTION ALGORITHMS , 2011 .

[22]  Pratap Chandra Mandal,et al.  Superiority of Blowfish Algorithm , 2012 .

[23]  Saudi Arabia,et al.  Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography , 2013 .

[24]  Bahar Saini Survey on Performance Analysis of Various Cryptographic Algorithms , 2014 .

[25]  Gurpreet Singh,et al.  A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.

[26]  Vikas Tyagi,et al.  IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT WITH CRYPTOGRAPHY , 2012 .

[27]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[28]  Aamna Patel,et al.  Image encryption and decryption using blowfish algorithm , 2012 .

[29]  Helena Handschuh,et al.  x2 Cryptanalysis of the SEAL Encryption Algorithm , 1997, FSE.