CFP last date
22 April 2024
Reseach Article

A Comparative Analysis of Symmetric Algorithms in Cloud Computing: A Survey

by Enas Elgeldawi, Maha Mahrous, Awny Sayed
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 48
Year of Publication: 2019
Authors: Enas Elgeldawi, Maha Mahrous, Awny Sayed
10.5120/ijca2019918726

Enas Elgeldawi, Maha Mahrous, Awny Sayed . A Comparative Analysis of Symmetric Algorithms in Cloud Computing: A Survey. International Journal of Computer Applications. 182, 48 ( Apr 2019), 7-16. DOI=10.5120/ijca2019918726

@article{ 10.5120/ijca2019918726,
author = { Enas Elgeldawi, Maha Mahrous, Awny Sayed },
title = { A Comparative Analysis of Symmetric Algorithms in Cloud Computing: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2019 },
volume = { 182 },
number = { 48 },
month = { Apr },
year = { 2019 },
issn = { 0975-8887 },
pages = { 7-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number48/30516-2019918726/ },
doi = { 10.5120/ijca2019918726 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:14:37.445871+05:30
%A Enas Elgeldawi
%A Maha Mahrous
%A Awny Sayed
%T A Comparative Analysis of Symmetric Algorithms in Cloud Computing: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 48
%P 7-16
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Introducing Cloud computing to the globe has changed many conceptual and infrastructural bases for today’s and tomorrow’s computing. It has made the global thinking migrates rapidly towards cloud based architecture. Clouds bring out a variety of benefits including computing resources configurability, cost controllability, sustainability, mobility and service flexibility. However, the new concepts that clouds introduce such as outsourcing, multi-tenancy, and resource sharing create new challenges and raise a broad range of security and privacy issues. Cryptography is the art-of-science of protecting data privacy by converting it to unreadable format using standard mathematical techniques. This paper provides a comprehensive study for eight of the most common symmetric cryptographic algorithms, namely, DES, 3DES, Blowfish, Twofish, RC2, RC5, RC6 and AES. A comparative analysis based on the structure of the algorithm, encryption and decryption times, throughput and memory utilization has been performed to examine the performance of each algorithm.

References
  1. NIST SP 800-145, “A NIST definition of cloud computing”, https://csrc.nist.gov/publications/detail/sp/800-145/final, September 2011.
  2. W. Stalling, “Cryptography and network security principles and practices,” Fourth Edition, Prentice Hall, December 2006.
  3. H. Feistel, "Cryptography and computer
  4. privacy." Scientific American, vol. 228, no. 5, pp. 15-2, 1973.
  5. FIPS PUB 46-3, “Data encryption standared (DES),” National Bureau of Standards, U.S. Department of Commerce, January 1977.
  6. D. Coppersmith · D. B. Johnson · S. M. Matyas, “A proposed mode for triple-DES encryption,”  IBM Journal of Research and Development, April 1996.
  7. B. Schneier, "The Blowfish Encryption Algorithm," Dr. Dobb's Journal , v.19, n. 4, pp. 38-40, April 1994.
  8. B. Schneier, "Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)," Fast Software Encryption: Second International Workshop, Leuven, Belgium, Proceedings, Springer-Verlag, pp.191-204, December 1994.
  9. L. Knudsen, V. Rijmen, R. Rivest, and M. Robshaw, "On the Design and Security of RC2", Fast Software Encryption, 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998.
  10. R. Rivest, " The RC5 encryption algorithm", International Workshop on Fast Software Encryption, pp 86-96, 1994.
  11. B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson. “Twofish: A 128-bit block cipher.” In AES Round 1 Technical Evaluation CD-1: Documentation. National Institute of Standards and Technology NIST, August 1998. See http://www. nist.gov/aes
  12. A. Mandal, C, Parakash and A. Tiwari, “Performance evaluation of cryptographic algorithms: DES and AES”, IEEE Students’ Conference on Electrical, Electronics and Computer Science, pp. 1-5, 2012.
  13. G. Singh and Supriya, “A study of encryption algorithms (RSA, DES, 3DES and AES) for information security,” International Journal of Computer Applications, vol. 67, no. 19, pp. 33-38, April 2013.
  14. M. Faheem Mushtaq, S. Jamel, A. Disina, Z. Pindar, N. Shafinaz A. Shakir, M. Deris, " A Survey on the Cryptographic Encryption Algorithms", International Journal of Advanced Computer Science and Applications, vol. 8, no. 11, 2017.
  15. J. Daemen and V. Rijmen, "AES Proposal: Rijndael," AES algorithm submission, September 1999.
  16. M. Ebrahim, S. Khan, U. Khalid, “Symmetric algorthm survey: A comparative analysis”. International Journal of Computer Applications, vol. 61, no. 20, pp. 12-19, January 2013.
  17. B. Schneier and D. Whiting, “A performance comparison of the five AES finalists.” Proceedings of the Third AES Candidate Conference, pp. 123-135, April 2000.
  18. Z. Hercigonja and D. gimnazija, “Comparative analysis of cryptographic algorithms.” International Journal of Digital Technology & Economy, vol.1, no. 2, 2016.
  19. D. Abdul Elminaam et al., "Performance Evaluation of Symmetric Encryption Algorithms", International Journal of Computer Science and Network Security, vol.8 no.12, December 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing DES 3DES Blowfish Twofish RC2 RC5 RC6 AES