Open Access   Article Go Back

A Survey on Cryptographic Algorithms and their implementation over Advanced Computer Architectures

Aditya Sahu1 , Md Tausif Zafar2 , Nishi Yadav3

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 375-383, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.375383

Online published on Mar 31, 2019

Copyright © Aditya Sahu, Md Tausif Zafar, Nishi Yadav . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Aditya Sahu, Md Tausif Zafar, Nishi Yadav, “A Survey on Cryptographic Algorithms and their implementation over Advanced Computer Architectures,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.375-383, 2019.

MLA Style Citation: Aditya Sahu, Md Tausif Zafar, Nishi Yadav "A Survey on Cryptographic Algorithms and their implementation over Advanced Computer Architectures." International Journal of Computer Sciences and Engineering 7.3 (2019): 375-383.

APA Style Citation: Aditya Sahu, Md Tausif Zafar, Nishi Yadav, (2019). A Survey on Cryptographic Algorithms and their implementation over Advanced Computer Architectures. International Journal of Computer Sciences and Engineering, 7(3), 375-383.

BibTex Style Citation:
@article{Sahu_2019,
author = {Aditya Sahu, Md Tausif Zafar, Nishi Yadav},
title = {A Survey on Cryptographic Algorithms and their implementation over Advanced Computer Architectures},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {375-383},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3848},
doi = {https://doi.org/10.26438/ijcse/v7i3.375383}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.375383}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3848
TI - A Survey on Cryptographic Algorithms and their implementation over Advanced Computer Architectures
T2 - International Journal of Computer Sciences and Engineering
AU - Aditya Sahu, Md Tausif Zafar, Nishi Yadav
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 375-383
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
396 261 downloads 150 downloads
  
  
           

Abstract

Due to the increase in digitalization of sectors like health, banking, e-commerce, education, stock marketing, etc. it is required to share personal as well as sensitive information over the internet. And to protect this information over the Network, various cryptographic algorithms are needed for safe data communication. Mainly, this survey paper consists of two parts. In the first part, we did the comparative analysis of important encryption and decryption algorithms like AES, Blowfish, RSA, DES, 3DES, RC with respect to different attributes such as key size, number of rounds, algorithm structure, block cipher, block size, features, flexibility, security, and attacks. In the second part of this paper, we dealt with the practical implementation of most popular encryption algorithms like AES, Blowfish and RSA over different computer architectures and to check their performance in different Intel processors. The performance is analysed in terms of time taken for encryption and decryption of processes in milliseconds.

Key-Words / Index Term

AES, Blowfish, RSA, Encryption, Decryption, Intel processor

References

[1] William Stallings, “Cryptography and Network Security Principles and Practices”, Fourth Edition, Pearson Education, Prentice Hall, 2009.
[2] Jawahar Thakur, Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Volume 1, Issue 2, pp.1-4, 2011.
[3] Gurpreet Singh, Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security” International Journal of Computer Applications (0975 – 8887) Volume 67– No.19, pp.1-4, 2013.
[4] Akash Kumar Mandal, Chandra Parakash, Mrs. Archana Tiwari, “Performance Evaluation of Cryptographic Algorithms:DES and AES”, 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science, pp. 2, 2012.
[5] Omar G. Abood, Shawkat K. Guirguis, “A Survey on Cryptography Algorithms”, International Journal of Scientific and Research Publications, Volume 8, Issue 7, pp.7-15, 2018.
[6] Muhammad Faheem Mushtaq, Sapiee Jamel, Abdulkadir Hassan Disina, Zahraddeen, A. Pindar, Nur Shafinaz Ahmad Shakir, Mustafa Mat Deris, “A Survey on the Cryptographic Encryption Algorithms”, International Journal of Advanced Computer Science and Applications, Vol. 8, No. 11, pp.3-6, 2017.
[7] Nidhi Singhal, J.P.S.Raina, “Comparative Analysis of AES and RC4 Algorithms for Better Utilization”, International Journal of Computer Trends and Technology, pp.1-5, 2011.
[8] Tingyuan Nie, Teng Zhang, “A Study of DES and Blowfish Encryption Algorithm”, A Project of Shandong Province Higher Educational Science and Technology Program (No. J09LG10), pp.4, 2009.
[9] Gurjeevan Singh, Ashwani Kumar, & K.S. Sandha, “A Study of New Trends in Blowfish Algorithm”, International Journal of Engineering Research and Application, Vol. 1, Issue 2, pp.5, 2011.