In-Depth Assessment of Cryptographic Algorithms Namely DES, 3DES, AES, RSA, and Blowfish | ||
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING | ||
Articles in Press, Accepted Manuscript, Available Online from 03 April 2023 | ||
Document Type: Research Paper | ||
Authors | ||
Samara Mohammed Radhi* 1; Raheem Ogla2 | ||
1Computer Sciences Department, University of Technology, Baghdad, Iraq | ||
2department of computer science, university of technology, Baghdad, Iraq | ||
Abstract | ||
Securing information is difficult in the modern internet era, as terabytes of data are generated daily online and online transactions occur virtually every second. The current world's information security relies heavily on cryptography, which makes the internet a safer environment. Making information incoherent to an unauthorized person is done through the use of cryptography. Providing legitimate users with confidentiality as a result. Numerous cryptographic algorithms are available for this application. A user should ideally be able to employ a cryptographic technique that is both affordable and effective. However, there isn't actually a single algorithm that can solve all problems. Several algorithms have a trade-off between cost and performance. For instance, a banking application needs the highest level of security at a significant cost, whereas a gaming application that sends player patterns for analytics is more concerned with speed and cost than security. As a result, selecting an algorithm from the available cryptographic algorithms that best meets the needs of the user. A study of each algorithm's strengths, weaknesses, cost, and performance will offer important insights in the process of selecting cryptographic algorithms. In order to demonstrate an entire performance analysis in this article, as opposed to just theoretical comparisons, this research developed and thoroughly examined the cost and performance of commonly used cryptographic algorithms, including DES, 3DES, AES, RSA, and blowfish. | ||
Keywords | ||
Securing information,,; ,،,؛Data Encryption Standard (DES),,; ,،,؛Advance Encryption Standard (AES) | ||
Statistics Article View: 6 |