A Survey on the Cryptographic Encryption Algorithms

Security is the major concern when the sensitive information is stored and transferred across the internet where the information is no longer protected by physical boundaries. Cryptography is an essential, effective and efficient component to ensure the secure communication between the different entities by transferring unintelligible information and only the authorized recipient can be able to access the information. The right selection of cryptographic algorithm is important for secure communication that provides more security, accuracy and efficiency. In this paper, we examine the security aspects and processes involved in the design and implementation of most widely used symmetric encryption algorithms such as Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Blowfish, Advanced Encryption Standard (AES) and Hybrid Cubes Encryption Algorithm (HiSea). Furthermore, this paper evaluated and compared the performance of these encryption algorithms based on encryption and decryption time, throughput, key size, avalanche effect, memory, correlation assessment and entropy. Thus, amongst the existing cryptographic algorithm, we choose a suitable encryption algorithm based on different parameters that are best fit to the user requirements.

[1]  Shinsuke Tamura,et al.  A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets , 2015, 2015 International Conference on Networking Systems and Security (NSysS).

[2]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[3]  Narander Kumar,et al.  Performance Evaluation of Encryption/Decryption Mechanisms to Enhance Data Security , 2016 .

[4]  Mark Stamp,et al.  Information security - principles and practice , 2005 .

[5]  D. K. Branstad,et al.  Data Encryption Standard: past and future , 1988, Proc. IEEE.

[6]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[7]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[8]  Irfan Khan,et al.  Cloud Computing Environment and Security Challenges: A Review , 2017 .

[9]  William C. Barker,et al.  TECHNOLOGY ADMINISTRATION , 2004 .

[10]  Sapiee Jamel,et al.  The Hybrid Cubes Encryption Algorithm (HiSea) , 2011 .

[11]  Stuart D. Walker,et al.  Implement A Novel Symmetric Block Cipher Algorithm , 2014 .

[12]  Zahraddeen Abubakar Pindar,et al.  Enhanced Caeser Cipher to Exclude Repetition and Withstand Frequency Cryptanalysis , 2014 .

[13]  Vincent Rijmen,et al.  Rijndael, the advanced encryption standard , 2001 .

[14]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping , 2012 .

[15]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[16]  K. Vasanth,et al.  BLOWFISH ENCRYPTION ALGORITHM FOR INFORMATION SECURITY , 2015 .

[17]  Priyadarshini Patila,et al.  A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .

[18]  Elaine B. Barker,et al.  Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.

[19]  Alasdair McAndrew Data Encryption Standard (DES) for Sage , 2009 .

[20]  Kalinka Regina Lucas Jaquie Castelo Branco,et al.  Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general purpose computer , 2016, J. Netw. Comput. Appl..

[21]  A. K. Mandal,et al.  Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[22]  Mohey M. Hadhoud,et al.  Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types , 2010, Int. J. Netw. Secur..

[23]  M.M. Deris,et al.  Diffusive primitives in THE design of modern cryptographic algorithms , 2008, 2008 International Conference on Computer and Communication Engineering.

[24]  Tatsuaki Okamoto,et al.  Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, Journal of Cryptology.

[25]  William Millan,et al.  Strengthening the Key Schedule of the AES , 2002, ACISP.

[26]  Mansoor Ebrahim,et al.  Symmetric Algorithm Survey: A Comparative Analysis , 2013, ArXiv.

[27]  Teng Zhang,et al.  A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.

[28]  Zahraddeen Abubakar Pindar,et al.  A Key Scheduling Algorithm Based on Dynamic Quasigroup String Transformation and All-Or-Nothing Key Derivation Function , 2017 .

[29]  M.Y. Javed,et al.  A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.

[30]  Meghna Vekariya,et al.  Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms , 2015 .

[31]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[32]  Sapiee Jamel,et al.  Key Generation Technique based on Triangular Coordinate Extraction for Hybrid Cubes , 2017 .

[33]  Munam Ali Shah,et al.  Cryptography: A Comparative Analysis for Modern Techniques , 2017 .

[34]  Sergey E. Adadurov,et al.  Evaluation of cryptographic primitives security based on proximity to the Latin square , 2016, 2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT).

[35]  N. Sivanandam,et al.  A Survey on Cryptography using Optimization algorithms in WSNs , 2015 .

[36]  S. Kavitha,et al.  KEYLESS USER DEFINED OPTIMAL SECURITY ENCRYPTION , 2013 .

[37]  Sapiee Jamel,et al.  A Cryptographic Algorithm Based on Hybrid Cubes , 2010, ICCSA.

[38]  Zahraddeen Abubakar Pindar,et al.  All-or-Nothing Key Derivation Function Based on Quasigroup String Transformation , 2016, 2016 International Conference on Information Science and Security (ICISS).

[39]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .