A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention

Encryption is the process of encoding information or data in order to prevent unauthorized access. These days we need to secure the information that is stored in our computer or is transmitted via internet against attacks. There are different types of cryptographic methods that can be used. Basically, the selecting cryptographic method depends on the application demands such as the response time, bandwidth, confidentiality and integrity. However, each of cryptographic algorithms has its own weak and strong points. In this paper, we will present the result of the implementation and analysis that applied on several cryptographic algorithms such as DES, 3DES, AES, RSA and blowfish. Also, we will show the comparisons between the previous cryptographic techniques in terms of performances, weaknesses and strengths.

[1]  M. Nithya,et al.  A STUDY AND PERFORMANCE ANALYSIS OF RSA ALGORITHM , 2013 .

[2]  Ritu Tripathi,et al.  Comparative Study of Symmetric and Asymmetric Cryptography Techniques , 2014 .

[3]  Priyadarshini Patila,et al.  A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .

[4]  A. K. Mandal,et al.  Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[5]  Pooja Bindlish Optimization of Cryptography Algorithms in Cloud Computing , 2017 .

[6]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[7]  Juan E. Tapiador,et al.  Automated design of a lightweight block cipher with Genetic Programming , 2008, Int. J. Knowl. Based Intell. Eng. Syst..

[8]  Prashant Sharma,et al.  RSA algorithm using modified subset sum cryptosystem , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[9]  Rajiv Munjal,et al.  Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures , 2011 .

[10]  Xin Zhou,et al.  Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.

[11]  Ritu Pahal Efficient Implementation of AES , 2013 .

[12]  Bruce Schneier,et al.  Unbalanced Feistel Networks and Block Cipher Design , 1996, FSE.

[13]  .S Karthik Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System , 2014 .

[14]  Pratap Chandra Mandal,et al.  Superiority of Blowfish Algorithm , 2012 .

[15]  Daniela Fischer,et al.  Cryptography And Network Security Principles And Practice , 2016 .

[16]  B. B. Zaidan,et al.  New Comparative Study Between DES, 3DES and AES within Nine Factors , 2010, ArXiv.

[17]  K. Kanagaram,et al.  COMPARATIVE ANALYSIS OF PERFORMANCE EFFICIENCY AND SECURITY MEASURES OF SOME ENCRYPTION ALGORITHMS , 2012 .

[18]  Matthew Green,et al.  Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.