0% found this document useful (0 votes)
71 views4 pages

Kinds of Commonly Used Cryptographic Algorithm

There are two main types of cryptographic algorithms - symmetric which use a single secret key for encryption and decryption, and asymmetric which use public and private key pairs. Popular symmetric algorithms are DES, AES, Blowfish, and popular asymmetric algorithms are RSA and ElGamal. Studies have compared algorithms based on factors like speed, key size, block size, and memory usage, with AES and Blowfish often performing well. Combining symmetric and asymmetric algorithms can provide better security while maintaining speed compared to using them individually. Hybrid cryptographic algorithms that combine multiple algorithms are also proposed to improve security against attacks.

Uploaded by

Kevin Simons
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views4 pages

Kinds of Commonly Used Cryptographic Algorithm

There are two main types of cryptographic algorithms - symmetric which use a single secret key for encryption and decryption, and asymmetric which use public and private key pairs. Popular symmetric algorithms are DES, AES, Blowfish, and popular asymmetric algorithms are RSA and ElGamal. Studies have compared algorithms based on factors like speed, key size, block size, and memory usage, with AES and Blowfish often performing well. Combining symmetric and asymmetric algorithms can provide better security while maintaining speed compared to using them individually. Hybrid cryptographic algorithms that combine multiple algorithms are also proposed to improve security against attacks.

Uploaded by

Kevin Simons
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Kinds of Commonly Used Cryptographic Algorithm

Cryptographic algorithms used today can be broadly classified into two groups, symmetric

algorithms (Secret key) and asymmetric algorithms (Public key). The symmetric algorithm uses

one key to be used in encryption and decryption while the asymmetric algorithm employs different

keys which is a public and a private key (Gurpreet Singh & Supriya, 2013). Popular types of

algorithms that use secret keys are DES, AES, Blowfish, IDEA, IC4, TEA, while algorithms that

use public key includes RSA, ElGamal, DSA (Idrizi et al., 2013).

Comparison of Popular Cryptographic Algorithms

Tamimi conducted a study that analyzes the individual performance of encryption

algorithms. He picked RSA, DES, AES, SHA, and MD5. He then compared the algorithms in

terms of block size, key size, and speed. Based on the results, he concluded that the AES algorithm

had the most potential to address the vulnerability of the data with its large key size, and by adding

larger block size, the security can be improved.

Patil, Narayankar, Narayan, & Meena also performed a comprehensive evaluation of the

performance of commonly used cryptographic algorithms. They studied RSA, DES, 3DES,

Blowfish and AES algorithms. The experiment was implemented using java crypto and java

security packages. For input, they used 25KB, 50KB, 2KB, 3KB, and 1KB of text and image data.

All algorithms were used on the same type of input plain text. To compare the algorithms, they

used the encryption time, decryption time, memory used, avalanche effect, entropy, and the

number of bits needed for optimal encoding as parameters for the evaluation.

For memory used, encryption time and decryption time, they found out that RSA takes the

largest and longest time while the Blowfish takes the least. This indicates that for applications that
need smaller data encryption, Blowfish is the better choice. It also showed that the Blowfish had

the highest amount of average entropy per byte of encryption. In the avalanche effect, AES has the

highest while the RSA have the lowest. The AES requires the highest number of bits to have

optimal encryption while DES has the least, which signifies the AES would require more

bandwidth for transmission.

Gurjeevan Singh et al. also compared various cryptographic algorithms, which is Blowfish,

DES, 3DES, and AES. He found out that Blowfish had the best performance in terms of processing

time, CPU load, and power consumption among the other algorithms tested.

Analyses and Developments Involving Combinations of Cryptographic Algorithms

Speed of Utilizing Multiple Cryptographic Algorithm

According to Idrizi et al., symmetric and asymmetric have characteristics that made them

suitable for specific applications. A method of combining symmetric and asymmetric can provide

better security while still maintaining the speed. It starts first by generating a secret key and the

public key of the receiver is then used to encrypt the secret key. Normally, public-key cryptography

is slower but since the secret key is small it wouldn't have much effect on the speed of encryption

and decryption.

He compared RSA, Blowfish, AES, DES, 3DES, ECDSA, and RC4, by using the method

of encryption mentioned earlier, which consists of using secret and public key, he found out that

secret key algorithms are generally faster than public keys, while the combined algorithms fit

somewhere in the middle.

Gurpreet Singh & Supriya also had a study on the different encryption algorithms for

information security. Specifically, the looked-on RSA, DES, 3DES, and AES algorithms.
Although each algorithm had its positive and negative aspects which made it suitable in different

applications, in general, they found out that the AES algorithm had the best speed, encryption time,

and the avalanche effect. They also suggest that the combination of these algorithms could further

improve its characteristics which is a subject for future studies.

Hybrid Cryptography Algorithms

According to Subasree, Sakthivel, & Nadu, current security attacks on confidential data is

a threat for security services like authentication, integrity, confidentiality, and availability and this

requires a new security protocol to further improve the capability of the algorithms used for

encryption. They proposed a hybrid security protocol on controlled networks that utilizes both the

symmetric and asymmetric algorithms.

To provide confidentiality, integrity, and authentication they used ECC (Elliptic Curve

Cryptography) for the data encryption, MD5 (Message Digest 5), and Dual-RSA. They

implemented the algorithms in VC++ and used different modes of operations which is sender,

receiver, and intruder. Using the protocol, when the sender sent the data along with the key to the

receiver the intruder also received the key for the message but not the message itself. This is

because the key and message are encrypted by different algorithms. Dual-RSA is used to encrypt

the key while ECC is used in the message, so even if the intruder received the key it would not be

able to decrypt the message.

Modular Multiplication Block Cipher and Playfair Cipher

Rahim & Ikhwan develop a cryptographic technique that utilizes the MMB (Modular

Multiplication Block) cipher and Playfair cipher. The method consists of first encrypting the

plaintext with Playfair cipher and encrypting again with MMB cipher to produce the ciphertext.
The decryption process is just the reversed way, the ciphertext is decrypted using MMB, then using

Playfair to reconstruct the plaintext. The main advantage of this method is the increased in the

complexity of the cipher which offers better protection against attacks, but due to the use of

multiple algorithms, the speed dropped down since it requires more time to process.

You might also like