Open Access Open Access  Restricted Access Subscription Access

Evaluation of Efficiency and Security of Data Using Different Algorithms for Encryption and Key Management


Affiliations
1 Department of Computer Engineering at Punjabi University, Patiala, Punjab, India
2 Department of Electronic and Communication Engineering, Guru Nanak Dev University, Regional Centre, Gurdaspur, Punjab, India
 

In present scenario, security is the most challenging aspects which is used in cryptography algorithms to encrypt data which is transmitted through internet or any network application to secure data from various passive and active attacks comes out from other in-secure medium. In this survey, we have compares the performance and energy consumption by various different symmetric algorithms like AES, 3DES, DES, RC6, blowfish and RC2 on same input file size.
User
Notifications
Font Size

Abstract Views: 142

PDF Views: 1




  • Evaluation of Efficiency and Security of Data Using Different Algorithms for Encryption and Key Management

Abstract Views: 142  |  PDF Views: 1

Authors

Gagandeep
Department of Computer Engineering at Punjabi University, Patiala, Punjab, India
Gurjit Singh Bhathal
Department of Computer Engineering at Punjabi University, Patiala, Punjab, India
Puneet Kumar
Department of Electronic and Communication Engineering, Guru Nanak Dev University, Regional Centre, Gurdaspur, Punjab, India

Abstract


In present scenario, security is the most challenging aspects which is used in cryptography algorithms to encrypt data which is transmitted through internet or any network application to secure data from various passive and active attacks comes out from other in-secure medium. In this survey, we have compares the performance and energy consumption by various different symmetric algorithms like AES, 3DES, DES, RC6, blowfish and RC2 on same input file size.