Kinds of Commonly Used Cryptographic Algorithm
Kinds of Commonly Used Cryptographic Algorithm
Cryptographic algorithms used today can be broadly classified into two groups, symmetric
algorithms (Secret key) and asymmetric algorithms (Public key). The symmetric algorithm uses
one key to be used in encryption and decryption while the asymmetric algorithm employs different
keys which is a public and a private key (Gurpreet Singh & Supriya, 2013). Popular types of
algorithms that use secret keys are DES, AES, Blowfish, IDEA, IC4, TEA, while algorithms that
use public key includes RSA, ElGamal, DSA (Idrizi et al., 2013).
algorithms. He picked RSA, DES, AES, SHA, and MD5. He then compared the algorithms in
terms of block size, key size, and speed. Based on the results, he concluded that the AES algorithm
had the most potential to address the vulnerability of the data with its large key size, and by adding
Patil, Narayankar, Narayan, & Meena also performed a comprehensive evaluation of the
performance of commonly used cryptographic algorithms. They studied RSA, DES, 3DES,
Blowfish and AES algorithms. The experiment was implemented using java crypto and java
security packages. For input, they used 25KB, 50KB, 2KB, 3KB, and 1KB of text and image data.
All algorithms were used on the same type of input plain text. To compare the algorithms, they
used the encryption time, decryption time, memory used, avalanche effect, entropy, and the
number of bits needed for optimal encoding as parameters for the evaluation.
For memory used, encryption time and decryption time, they found out that RSA takes the
largest and longest time while the Blowfish takes the least. This indicates that for applications that
need smaller data encryption, Blowfish is the better choice. It also showed that the Blowfish had
the highest amount of average entropy per byte of encryption. In the avalanche effect, AES has the
highest while the RSA have the lowest. The AES requires the highest number of bits to have
optimal encryption while DES has the least, which signifies the AES would require more
Gurjeevan Singh et al. also compared various cryptographic algorithms, which is Blowfish,
DES, 3DES, and AES. He found out that Blowfish had the best performance in terms of processing
time, CPU load, and power consumption among the other algorithms tested.
According to Idrizi et al., symmetric and asymmetric have characteristics that made them
suitable for specific applications. A method of combining symmetric and asymmetric can provide
better security while still maintaining the speed. It starts first by generating a secret key and the
public key of the receiver is then used to encrypt the secret key. Normally, public-key cryptography
is slower but since the secret key is small it wouldn't have much effect on the speed of encryption
and decryption.
He compared RSA, Blowfish, AES, DES, 3DES, ECDSA, and RC4, by using the method
of encryption mentioned earlier, which consists of using secret and public key, he found out that
secret key algorithms are generally faster than public keys, while the combined algorithms fit
Gurpreet Singh & Supriya also had a study on the different encryption algorithms for
information security. Specifically, the looked-on RSA, DES, 3DES, and AES algorithms.
Although each algorithm had its positive and negative aspects which made it suitable in different
applications, in general, they found out that the AES algorithm had the best speed, encryption time,
and the avalanche effect. They also suggest that the combination of these algorithms could further
According to Subasree, Sakthivel, & Nadu, current security attacks on confidential data is
a threat for security services like authentication, integrity, confidentiality, and availability and this
requires a new security protocol to further improve the capability of the algorithms used for
encryption. They proposed a hybrid security protocol on controlled networks that utilizes both the
To provide confidentiality, integrity, and authentication they used ECC (Elliptic Curve
Cryptography) for the data encryption, MD5 (Message Digest 5), and Dual-RSA. They
implemented the algorithms in VC++ and used different modes of operations which is sender,
receiver, and intruder. Using the protocol, when the sender sent the data along with the key to the
receiver the intruder also received the key for the message but not the message itself. This is
because the key and message are encrypted by different algorithms. Dual-RSA is used to encrypt
the key while ECC is used in the message, so even if the intruder received the key it would not be
Rahim & Ikhwan develop a cryptographic technique that utilizes the MMB (Modular
Multiplication Block) cipher and Playfair cipher. The method consists of first encrypting the
plaintext with Playfair cipher and encrypting again with MMB cipher to produce the ciphertext.
The decryption process is just the reversed way, the ciphertext is decrypted using MMB, then using
Playfair to reconstruct the plaintext. The main advantage of this method is the increased in the
complexity of the cipher which offers better protection against attacks, but due to the use of
multiple algorithms, the speed dropped down since it requires more time to process.