Comparative Analysis of Cryptographic Algorithms

Authors

  • Samuel D Jonathan School of Computer Science and Engineering, REVA University, Bengaluru, India
  • Jonathan S Paul School of Computer Science and Engineering, REVA University, Bengaluru, India
  • Naveen Chandra Gowda School of Computer Science and Engineering, REVA University, Bengaluru, India
  • Ambika B J School of Computer Science and Engineering, REVA University, Bengaluru, India
  • Kiran Kumar P N Department of Computer Science and Engineering, S J C Institute of Technology, Chikballapur, India

DOI:

https://doi.org/10.5281/zenodo.8068102

Keywords:

Cryptography, AES, Twofish, Serpent, Block Ciphers

Abstract

Secure communication and information exchange in the presence of adversaries is a critical issue in today's digital age. Cryptography is becoming increasingly important in our modern world, as we rely more and more on secure communication and data transfer. In this paper, we explore the performance of several widely-used cryptographic algorithms. Our aim is to provide a useful resource for anyone seeking to improve their understanding of encryption and the factors that affect its effectiveness. Through our experiments, we hope to shed light on the strengths and weaknesses of different algorithms and to help researchers and practitioners make informed decisions about which techniques to use in their work. This research paper aims to provide a comparative analysis of the cryptographic algorithms Serpent, Two fish and Salsa20. This paper also analyzes parameters like key size, block size, number of rounds, and throughput of the algorithms to determine the efficiency of the cryptosystems.

References

Bhagat, V., Kumar, S., Gupta, S. K., & Chaube, M. K. (2023). Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications. Concurrency and Computation: Practice and Experience, 35(1), e7425.

Gowda, N. C., & Srivastav, P. S. V. (2019). GPR: Steg Cryp (Encryption using steganography). International Journal of Engineering and Advanced Technology (IJEAT), 8.

Veena, H. N., & Gowda, N. C. (2018). Design and Implementation of Image Encryption using Chaos Theory. Asian Journal of Engineering and Technology Innovation (AJETI), 208.

Biham, E., Anderson, R., & Knudsen, L. (1998). Serpent: A new block cipher proposal. In Fast Software Encryption: 5th International Workshop, FSE’98 Paris, France, March 23–25, 1998 Proceedings 5 (pp. 222-238). Springer Berlin Heidelberg.

Shah, T., Haq, T. U., & Farooq, G. (2020). Improved SERPENT algorithm: design to RGB image encryption implementation. IEEE Access, 8, 52609-52621.

PN, K. K., Baruah, R., Dey, S., Pradeep, K. R., & Vahab, F. (2018). Real Time Air Quality Measurement Using Low Power Wide Area Technology. Asian Journal of Engineering and Technology Innovation (AJETI), 153.

Anderson, R., Biham, E., Knudsen, L., & Technion, H. (1998, August). Serpent: A flexible block cipher with maximum assurance. In The first AES candidate conference (pp. 589-606).

Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., & Ferguson, N. (1998). Twofish: A 128-bit block cipher. NIST AES Proposal, 15(1), 23-91.

Sawant, A. G., Nitnaware, V. N., Dengale, P., Garud, S., & Gandewar, A. (2019). Twofish algorithm for encryption and decryption. Journal of Emerging Technologies and Innovative Research (JETIR), 6(1).

Yerriswamy, T., & Murtugudde, G. (2021). An efficient algorithm for anomaly intrusion detection in a network. Global Transitions Proceedings, 2(2), 255-260.

Gowda, N. C., Manvi, S. S., & Malakreddy, B. (2022, July). Blockchain-based Access Control Model with Privacy preservation in a Fog Computing Environment. In 2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT) (pp. 1-6). IEEE.

Manvi, S. S., & Gowda, N. C. (2019). Trust Management in Fog Computing: A Survey. In Applying Integration Techniques and Methods in Distributed Systems and Technologies (pp. 34-48). IGI global.

Standard, D. E. (1999). Data encryption standard. Federal Information Processing Standards Publication, 112.

Hussain, S., Asif, M., Shah, T., Mahboob, A., & Eldin, S. M. (2023). Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application. IEEE Access, 11, 29698-29710.

Lucks, S. (2002, June). The saturation attack—a bait for Twofish. In Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama, Japan, April 2–4, 2001 Revised Papers (pp. 1-15). Berlin, Heidelberg: Springer Berlin Heidelberg.

Ahmed, S. T., Ashwini, S., Divya, C., Shetty, M., Anderi, P., & Singh, A. K. (2018). A hybrid and optimized resource scheduling technique using map reduce for larger instruction sets. International Journal of Engineering & Technology, 7(2.33), 843-846.

Shalini, L., Manvi, S. S., Gowda, N. C., & Manasa, K. N. (2022, June). Detection of Phishing Emails using Machine Learning and Deep Learning. In 2022 7th International Conference on Communication and Electronics Systems (ICCES) (pp. 1237-1243). IEEE.

Ambika, B. J., & Banga, M. K. (2021). A novel energy efficient routing algorithm for MPLS-MANET using fuzzy logic controller. International Journal of Information and Computer Security, 14(1), 20-39.

Lara, E., Aguilar, L., García, J. A., & Sanchez, M. A. (2018). A lightweight cipher based on salsa20 for resource-constrained IoT devices. Sensors, 18(10), 3326.

Yerriswamy, T., & Murtugudde, G. (2020, October). Study of Evolutionary Techniques in the field of Network Security. In 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE) (pp. 594-598). IEEE.

Ahmed, S. S. T., Thanuja, K., Guptha, N. S., & Narasimha, S. (2016, January). Telemedicine approach for remote patient monitoring system using smart phones with an economical hardware kit. In 2016 international conference on computing technologies and intelligent data engineering (ICCTIDE'16) (pp. 1-4). IEEE.

Raja, D. K., Kumar, G. H., Basha, S. M., & Ahmed, S. T. (2022). Recommendations based on integrated matrix time decomposition and clustering optimization. International Journal of Performability Engineering, 18(4), 298.

Downloads

Published

2023-06-22

How to Cite

Samuel D Jonathan, Jonathan S Paul, Naveen Chandra Gowda, Ambika B J, & Kiran Kumar P N. (2023). Comparative Analysis of Cryptographic Algorithms. International Journal of Human Computations & Intelligence, 2(5), 212–219. https://doi.org/10.5281/zenodo.8068102