Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices
Received: 30 May 2021 | Revised: 1 October 2021 | Accepted: 9 October 2021 | Online: 8 November 2021
Nowadays, terabytes of digital data are generated and sent online every second. However, securing this extent of information has always been a challenging task. Cryptography is a fundamental method for securing data, as it makes data unintelligible for attackers, offering privacy to authorized clients. Different cryptographic algorithms have different speeds and costs that make them suitable for different applications. For instance, banking applications need outrageous security amenities, as they utilize superior algorithms having greater requirements, while gaming applications focus more on speed and cost reduction. Consequently, cryptographic algorithms are chosen based on a client's prerequisites. This study compared DES, AES, Blowfish, and RSA, examining their speed, cost, and performance, and discussed their adequacy for use in wireless sensor networks and peer-to-peer communication.
Keywords:DES, AES, Blowfish, RSA
P. Patil, P. Narayankar, D. G. Narayan, and S. M. Meena, "A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish," Procedia Computer Science, vol. 78, pp. 617–624, Jan. 2016, https://doi.org/10.1016/j.procs.2016.02.108.
A. Jeeva, D. V. Palanisamy, and K. Kanagaram, "Comparative Analysis of Performance Efficiency and Security Measures of some Encryption Algorithms," International Journal of Engineering Research and, vol. 2, no. 3, pp. 3033–3037, May 2012.
H. O. Alanazi, B. B. Zaidan, A. A. Zaidan, H. A. Jalab, M. Shabbir, and Y. Al-Nabhani, "New Comparative Study Between DES, 3DES and AES within Nine Factors," vol. 2, no. 3, p. 6, Mar. 2010.
R. Tripathi and S. Agrawal, "Comparative Study of Symmetric and Asymmetric Cryptography Techniques," International Journal of Advanced Foundation and Research in Computer, vol. 1, no. 6, Jun. 2014.
M. S. Mahindrakar, "Evaluation of Blowfish Algorithm based on Avalanche Effect," International Journal of Innovations in Engineering and Technology, vol. 4, no. 1, pp. 99–103, Jun. 2014.
R. Pahal, "Efficient Implementation of AES," International Journal of Advanced Research in Computer Science and Software Engineering, pp. 290–295, Jul. 2013.
Y. Kumar, R. Munjal, and H. Sharma, "Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures," International Journal of Computer Science and Management Studies, vol. 11, no. 3, pp. 60–63, Oct. 2011.
C. P. Mandal, "Superiority of Blowfish Algorithm," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 9, pp. 196–201, Sep. 2012.
S. Karthik and A. Muruganandam, "Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System," International Journal of Scientific Engineering and Research, vol. 2, no. 11, pp. 24–31, Nov. 2014.
G. Prashanti, S. Deepthi, and K. Sandhya Rani, "A Novel Approach for Data Encryption Standard Algorithm," International Journal of Engineering and Advanced Technology, vol. 2, no. 5, pp. 264–267, Jun. 2013.
D. P. Mahajan and A. Sachdeva, "A Study of Encryption Algorithms AES, DES and RSA for Security," Global Journal of Computer Science and Technology, vol. 13, no. 15, Jul. 2013.
N. Kaur and S. Sodhi, "Data Encryption Standard Algorithm (DES) for Secure Data Transmission," IJCA Proceedings on International Conference on Advances in Emerging Technology, vol. ICAET 2016, no. 2, pp. 31–37, Oct. 2016.
M. R. Asassfeh, M. Qatawneh, and F. M. ALAzzeh, "Performance Evaluation of Blowfish Algorithm on Supercomputer IMAN1," International journal of Computer Networks & Communications, vol. 10, no. 2, pp. 43–53, Mar. 2018, https://doi.org/10.5121/ijcnc.2018.10205.
P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, "Wireless sensor networks: a survey on recent developments and potential synergies," The Journal of Supercomputing, vol. 68, no. 1, pp. 1–48, Apr. 2014, https://doi.org/10.1007/s11227-013-1021-9.
M. A. Al-Shabi, "A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security," International Journal of Scientific and Research Publications (IJSRP), vol. 9, no. 3, pp. 576–589, Mar. 2019, https://doi.org/10.29322/IJSRP.9.03.2019.p8779.
D. P. Joseph and M. Krishna, "Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms," International Journal of Advanced Research in Computer Science, vol. 6, no. 3, pp. 51–56, May 2015.
A. Gupta and N. K. Walia, "Cryptography Algorithms: A Review," International Journal of Engineering Development and Research, vol. 2, no. 2, pp. 1667–1672, 2014.
S. Kumari, "A research Paper on Cryptography Encryption and Compression Techniques," International Journal of Engineering and Computer Science, vol. 6, no. 4, pp. 20915–20919, Apr. 2017.
J. Thakur and N. Kumar, "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis," International Journal of Emerging Technology and Advanced Engineering, vol. 1, no. 2, pp. 5–12, Dec. 2011.
E. S. I. Harba, "Secure Data Encryption Through a Combination of AES, RSA and HMAC," Engineering, Technology & Applied Science Research, vol. 7, no. 4, pp. 1781–1785, Aug. 2017, https://doi.org/10.48084/etasr.1272.
A. S. Alshammari, "Comparison of a Chaotic Cryptosystem with Other Cryptography Systems," Engineering, Technology & Applied Science Research, vol. 10, no. 5, pp. 6187–6190, Oct. 2020, https://doi.org/10.48084/etasr.3745.
How to Cite
MetricsAbstract Views: 327
PDF Downloads: 231
Copyright (c) 2021 U. Iftikhar, K. Asrar, M. Waqas, S. A. Ali
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.