CFP last date
20 May 2024
Reseach Article

A Comparative Study of Six Most Common Symmetric Encryption Algorithms across Different Platforms

by G. Ramesh, R. Umarani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 13
Year of Publication: 2012
Authors: G. Ramesh, R. Umarani
10.5120/6967-9401

G. Ramesh, R. Umarani . A Comparative Study of Six Most Common Symmetric Encryption Algorithms across Different Platforms. International Journal of Computer Applications. 46, 13 ( May 2012), 6-9. DOI=10.5120/6967-9401

@article{ 10.5120/6967-9401,
author = { G. Ramesh, R. Umarani },
title = { A Comparative Study of Six Most Common Symmetric Encryption Algorithms across Different Platforms },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 13 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number13/6967-9401/ },
doi = { 10.5120/6967-9401 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:39:36.382999+05:30
%A G. Ramesh
%A R. Umarani
%T A Comparative Study of Six Most Common Symmetric Encryption Algorithms across Different Platforms
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 13
%P 6-9
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The hacking is the greatest problem in the wireless local area network (WLAN). Many algorithms like RC6,UMARAM,DES,3DES,RC2 and UR5 have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user correctly. In this paper, we study the six most common and popular symmetric cryptographic algorithms like RC6,UMARAM,DES,3DES,RC2 and UR5. We analyze their security issues and then compare their efficiency for encrypting text and image across different widely used Operating Systems like Windows XP, Windows Vista and Windows 7. The simulation results concluded the performance of most common encryption across the different platforms . Which algorithm performs better on which operating system for encrypting what kind of data.

References
  1. William Stallings " Network Security Essentials (Applications and Standards)", Pearson Education, 2004.
  2. B. Schneier, Practical Cryptography,Wiley, 2003.
  3. National Bureau of Standards, " Data Encryption Standard," FIPS Publication 46, 1977.
  4. . A. Nadeem and M. Y. Javed, "A performance comparison of data encryption algorithms,"Information and Communication Technologies, ICICT 2005, pp. 84-89, 2005.
  5. D. Salama, A. Elminaam and etal, "Evaluating The Performance of Symmetric Encryption Algorithms", International Journal of Network Security, Vo1. 10, No. 3, PP. 216-222, May2010.
  6. Ramesh G, Umarani. R, " UR5:A Novel Symmetrical Encryption Algorithm With Fast Flexible and High Security Based On Key Updation", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012 Page 16-22. 2010.
  7. Ramesh G, Umarani. R, " Data Security In Local Area Network Based On Fast Encryption Algorithm",International Journal of Computing Communication and Information System(JCCIS) Journal Page 85-90. 2010.
  8. S. Contini, R. L. Rivest, M. J. B. Robshaw and Y. L. Yin. "The Security of the RC6 Block Cipher. Version 1. 0 ". August 20, 1998.
  9. Aamer Nadeem, Dr M. Younus Javed, " A Performance Comparison of Data Encryption Algorithms ", IEEE International Conference on Networking, 2009.
  10. A. A. Tamimi, Performance Analysis of Data Encryption Algorithms, Retrieved Oct. 1, 2008. (http://www. cs. wustl. edu/»jain/cse567-06/ftp/encryption perf/index. html)
  11. Ramesh G, Umarani. R, " Data Security In Local Area Network Based On Fast Encryption Algorithm",International Journal of Computing Communication and Information System(JCCIS) Journal Page 85-90. 2010.
  12. Ramesh, G. Umarani, R. ,UMARAM: A novel fast encryption algorithm for data security in local area network http://ieeexplore. ieee. org /xpl/ freeabs_all. jsp? arnumber=5670740
  13. G. Ramesh, Dr. R. Umarani "A Novel Symmetrical Encryption Algorithm with High Security Based on Key Updating" gopalax Journals , International Journal of Computer Network and Security (IJCNS) Vol. 3 No. 1 pp 57-69, http://www. ijcns. com/pdf/207. pdf
  14. . Results of Comparing Tens of Encryption Algorithms Using Different SettingsCrypto++ Benchmark, Retrieved Oct. 1, 2008. (http://www. eskimo. com/weidailbenchmarks. html).
  15. W. S. Elkilani, "H. m. Abdul-Kader, "Performance of Encryption Techniques forReal Time Video Streaming, BIMAConference, Jan 2009, PP 1846- 1850.
  16. N. Ruangchaijatupon and P. Krishnamurthy,"Encryption and power consumption in wireless LANs-N,"The Third IEEE Workshop on Wireless LANs, pp. 148-152,Newton, Massachusetts, Sep. 27-28,2001.
  17. Jose J. Amador, Robert W. Green, " Symmetric-Key Block Ciphers for Image and Text Cryptography", International Journal of Imaging
  18. ANSI3. 106, "American National Standard for Information Systems—Data Encryption Algorithm—Modes of Operation," American National Standards Institute, 1983.
  19. Institute of Electrical and Electronics Engineers, "Local and Metropolitan Area Networks: Overview and Architecture", IEEE Standard 802,1990
Index Terms

Computer Science
Information Sciences

Keywords

Des 3des des umaram ur5 symmetric Encryption