Investigating the efficiency of secret key encryption algorithms with similar key length and block size

dc.creatorKondo, Tabu S.
dc.date2021-05-05T09:28:53Z
dc.date2021-05-05T09:28:53Z
dc.date2020
dc.date.accessioned2022-10-20T13:47:43Z
dc.date.available2022-10-20T13:47:43Z
dc.descriptionAbstract. Full-text article available at: http://dx.doi.org/10.17781/P002657
dc.descriptionA secure communication over the web is being provided by encryption algorithms and so they still play a serious role in any security system. However, a substantial amount of your time and resources like memory, CPU time, and computation time to encrypt and decrypt data are being consumed by these algorithms. Therefore, this study empirically investigated the efficiency of secret key encryption algorithms with similar key length and block size to identify the best algorithm which provides optimum performance. So, diverse experiments have been performed to evaluate the performance of IDEA, Blowfish, and CAST5 symmetric encryption algorithms in terms of throughput, encoding time, and decoding time over variable text files and modes of operation. The results of the experiments show that Blowfish is the most competent data encoding algorithm as far as the used parameters are concerned
dc.identifierKondo, T. S. (2020). Investigating the Efficiency of Secret Key Encryption Algorithms with similar key length and block size. International Journal of Digital Information and Wireless Communications, 10(2), 29-35.
dc.identifierDOI: http://dx.doi.org/10.17781/P002657
dc.identifierURL: http://sdiwc.net/digital-library/investigating-the-efficiency-of-secret-key-encryption-algorithms-with-similar-keyrnlength-and-block-size
dc.identifierhttp://hdl.handle.net/20.500.12661/2943
dc.identifier.urihttp://hdl.handle.net/20.500.12661/2943
dc.languageen
dc.publisherThe Society of Digital Information and Wireless Communications
dc.subjectSecure communication
dc.subjectEncryption algorithms
dc.subjectAlgorithm
dc.subjectBlock size
dc.subjectComputation
dc.subjectSecret key encryption
dc.subjectSymmetric encryption
dc.titleInvestigating the efficiency of secret key encryption algorithms with similar key length and block size
dc.typeArticle

Files