Analysis of Most Common Encryption Algorithms

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Empirical Research Press Ltd.

London, United Kingdom

International Journal of
Engineering and Applied Computer Science
Volume: 04, Issue: 02, March 2022 ISBN: 9780995707542

Analysis of Most Common Encryption Algorithms

Attique Ahmed1, Muhammad Naeem2


1,2
Department of Computer Science, Abbottabad University of Science and Technology, Pakistan

10.24032/IJEACS/0402/003

© 2022 by the author(s); licensee Empirical Research Press Ltd. United Kingdom. This is an open access article
distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license.
(http://creativecommons.org/licenses/by/4.0/).

www.ijeacs.com 8
Attique Ahmed et al. International Journal of Engineering and Applied Computer Science (IJEACS)
Volume: 04, Issue: 02, ISBN: 9780995707542, March 2022

Analysis of Most Common Encryption Algorithms


Abstract—As the things are settled down after the emergence of respectively. An in-depth study reveals that it varies from case
technology, and this is the decade of professionalism as far as to case in selecting the optimal encryption algorithm [18].
technology is concerned, security of data is the major hurdle in
this race. This is the era in which data is one click away from the
users, so data needs to be more secured so that it can be avoided II. FUNDAMENTALS OF STUDY
unauthorized access. For this purpose, different data security Data Security has become a crucial factor nowadays,
fields have also emerged to ensure data security and mainly with current exchange networks, which have drawbacks
confidentiality. In this survey paper we will look up all the that might be leveraged to devastating effects. In our study, we
techniques used for data encryption and after that, we compare afford a few dialogues on famous encryption algorithms that
those techniques to provide the best algorithm to ensure that data may be used to tighten data protection in Symmetric/
is secured. We go categorically, as in most of the cases, symmetric Asymmetric Encryption. The best manner to start this debate is
encryption technique is applicable and, in a few cases,
to begin from the fundamentals first. Thus, we study definitions
asymmetric is recommended. Firstly, in our study, we compare
of algorithms and basic cryptographic standards after which
both the techniques with each other and then compare all the
algorithms working under the above-mentioned categories
dive into the center part of the dialogue in which we give an
concerning their time, efficiency, memory usage, latency, key size, evaluation of two techniques [3][16].
and several rounds which will result in showing the best
algorithm according to input data. A. Algorithm
The algorithm is a set of rules, a method, or a system for
Keywords- Encryption, Cryptography, Symmetric, Asymmetric, fixing a problem. An encrypted set of rules is a fixed
data security, algorithm. mathematical method for acting encryption on facts. Through
using such a set of rules, data is made inside cipher textual
I. INTRODUCTION content and calls for using a key to remodeling facts into their
unique shape [15]. This brings us to the idea of cryptography
The settlement of technology and software programs used
that has been lengthy and has been utilized in data protection in
these days has facilitated malicious customers to intercept
data communication.
information at some stage in data transmission [2]. As a result,
it's far extraordinarily crucial for any corporation or person to
guard their touchy and treasured records. Security frequently B. Cryptography
looks up retaining the information secure from unauthorized Cryptography is a way of the use of superior mathematical
access to maintain the quality line of defense [9]. Encryption is concepts in storing and transmitting data in a specific shape so
a method to save data so that the information stays unchanged that is understood by the ones whom it's supposed can examine
and guarded at some stage in the information transmission from and the method it. Encryption is key idea in cryptography
the sender to the meant recipient [26]. Encryption is described [13][17]. It is the method in which a message is encoded in a
as the procedure of concealing records from intruders or layout that can't be examined or understood without the aid of
unauthorized persons [14]. Conversely, decryption is the using a key. A simple content from a person may be encrypted
procedure of changing records again into the record’s regular to ciphertext, and then processed through a data exchange
layout [14]. channel so no one can intrude with obvious textual content.
People and organizations are being subjected to protection When it hits the receiver end, the ciphertext is decrypted to the
incidents including breaches of privacy and identity theft. As a original simple content [22].
result, people’s monetary facts were stolen, online debts were
given illegally accessed, and to a degree person names and C. Encryption
passwords were given posted to the public. In 2021, there were It is the method of locking up data with the use of
1291 protection incidents and forty-four million data were cryptography. The data that has been protected in this manner
compromised amongst exceptional businesses. The hike of is encrypted [1].
security breaches was up to 17% as compared to the year 2020
[28]. Moreover, those affected businesses incur large quantities D. Decryption
of losses in phrases of stolen budgets and different costs in the The method of opening the encrypted data by using
aftermath of the incidents [20]. cryptographic methods [1].
To mitigate the security threats as far as data is concerned;
encryption techniques and algorithms were designed right from E. Key
the emergence of new technology. There are two types of A piece of hidden information like a password is used to
Encryption algorithms which are named Symmetric and encrypt and decrypt data. There are some distinct kinds of keys
Asymmetric algorithms which have their pros and cons utilized in cryptography [4].

DOI: 10.24032/IJEACS/0402/003 www.ijeacs.com 9


Attique Ahmed et al. International Journal of Engineering and Applied Computer Science (IJEACS)
Volume: 04, Issue: 02, ISBN: 9780995707542, March 2022

F. Steganography DSA, elliptic curve technique and hyperelliptic curve


It is truly the technological know-how of hiding data from techniques, etc. See Figure 2.
hackers and unknown people that could harm you. The
distinction between steganography and encryption is that the
snoopers won't have the ability to comprehend there are any
hidden data in the picture, text, or any other media [26].

G. Symmetric Encryption
This is the most effective type of encryption that provides
one hidden key to cipher and decrypt data [22]. Symmetric
encryption is an ancient and well-known method. In this
method, the mystery key is used which may be a number, a
phrase, or a string of arbitrary letters. It is mixed with the
obvious textual data or a message to enclose the content
material in a specific manner. The sender and recipient must
know the name of the key which is used to encrypt and decrypt Figure 2. Asymmetric Key Encryption
all of the messages. Blowfish, Twofish, AES, DES, 3DES, and
RCG are examples of symmetric encryption. The broadly used Upon detailed investigation, we found differences between
symmetric set of rules is AES-128, AES-256, and blowfish. symmetric and asymmetric encryption techniques. All of them
See Figure 1. are given in the table below:

TABLE I. DIFFERENCE BETWEEN SYMMETRIC AND ASYMMETRIC


TECHNIQUES

No Symmetric Encryption Asymmetric Encryption

1. A single key is used to Alternate keys are used to


both encrypt and decrypt encrypt and decrypt data.
data. The public key for
encryption and the private
key for decryption.

Figure 1. Symmetric Key Encryption 2. The size of ciphertext is The size of ciphertext is
comparatively the same or comparatively the same or
smaller than the size of the larger than the size of the
H. Asymmetric Encryption original content. original content.
Asymmetric encryption can also be named public-key
3. The process of encryption The process of encryption
encryption which is comparatively a new method, as compared is faster than asymmetric. is slower than symmetric.
to symmetric encryption. Asymmetric encryption makes use of
two keys to encrypt simple textual content namely a public key 4. Used when a large amount Used when data is small.
and a private key [29]. Secret keys are then exchanged over the of data is required to be
Internet or a massive network. It guarantees that transferred.
hackers/snoopers cannot misuse the keys. It is critical to
observe that absolutely anyone with this key can decrypt the 5. Largely used for Used for confidentiality,
message and that is why such encryption makes use of confidentiality. authenticity, and non-
associated keys to enhance protection [2]. A public key is made repudiation.
generously had to absolutely everyone who would possibly
need to send or receive a message. 6. Resource utilization is low. Resource utilization is
high.
A message encrypted with the use of a public key can best
be decrypted using a private key; a message encrypted by the
use of a personal key may be decrypted by the use of a public
key. Security of general public key is not always required III. ANALYSIS OF POPULAR ALGORITHMS
because it's far from publicly to be had and may be surpassed In this section, we compare different algorithm techniques.
over the internet [38]. Firstly, we consider symmetric algorithms, and then we
compare asymmetric algorithms. At the end of the study, we
Asymmetric encryption is typically utilized in everyday compare both symmetric and asymmetric algorithms in order to
communication channels, mainly over the Internet. The most suggest the best algorithm which can compensate for all types
popular asymmetric encryption algorithms are EIgamal, RSA, of encryption tasks with great reliability.

DOI: 10.24032/IJEACS/0402/003 www.ijeacs.com 10


Attique Ahmed et al. International Journal of Engineering and Applied Computer Science (IJEACS)
Volume: 04, Issue: 02, ISBN: 9780995707542, March 2022

A. Symmetric Algorithms Comparison TABLE III. ASYMMETRIC ALGORITHMS COMPARISON

After complete analysis, it is clear that blowfish and AES


are the best among all other algorithms [4]. As these are Parameters for Elliptic
Elgamal RSA
Comparison Curve
invented after DES and 3DES so all the complications and
drawbacks present in the aforementioned algorithms were
mitigated in AES and blowfish techniques [23]. By comparing Neal Koblitz,
Taher Rivest, Shamir,
the key size of all the algorithms, it is observed that the AES Developers Victor
Elgamal and Adleman
and blowfish have bigger key sizes as compared to other S. Miller
techniques.
Emerging Year 1985 1985 1977
Blowfish is based on a Feistel network [11]. Feistel
network uses a series of consecutive ciphers on a block of
Up to 15360
given data and is designed for a block of ciphers that encrypt a Size of Key Up to 512 bits 521 bits
bits
large amount of data [3]. A Feistel network works on a division
basis, by splitting the block of data into 2 equal pieces and then Algebraic Diffie Exponentiation
applying encryption in multiple rounds [12]. Structure of Hellman is a finite field
Algorithm
elliptic curve key over integers
Type
over a finite exchang including prime
TABLE II. SYMMETRIC ALGORITHMS COMPARISON field e numbers

Parameter Encryption
390 297 531
s for Time (ms)
DES 3DES AES Blowfish Twofish
Compariso
n
On the other hand, ECC can do the specific task of
Bruce Bruce
Developers IBM IBM NIST
Schneire Schneire encryption with the least bits of the key [9]. This can be shown
Emerging in Table IV.
1974 1978 2001 1993 1972
Year
192 128, 192, Up to 448 Up to TABLE IV. RSA VS ECC (BORROWED FROM [13])
Size of Key 56 bits
bits 256 bits bits 256 bits
Bits Level RSA ECC
Size of
64 bits 64 bits 64 bits 64 bits 128 bits
80 bits 1024 160
Block 112 bits 2048 224
No. of 128 bits 3072 256
16 48 10, 12, 14 16 16
Rounds 192 bits 7680 386
Substituti
on &
256 bits 15360 512
Algorithm Feistel Feistel Feistel Feistel
Permutati
Type N/W N/W N/W N/W
on ECC is a very promising asymmetric cryptography
Network technique that was presented by Miller and his fellow Koblitz
Encryption during the late 1980s [1]. This kind of algorithm is suitable for
Time (ms) 0.48,0.67,
(25kb file
0.89 1.391
0.95
0.59 0.99 devices using memory constraints such as Palmtop computers,
size) Smartphones, Smartcards, etc [16]. As compared to RSA and
ECC requires few parameters to encrypt and decrypt the
AES is based on substitution and permutation desired data or content, keeping the security level equivalent to
networks [15]. The substitution and permutation network all other sibling algorithms [13].
works on mathematical calculation and formulae to substitute RSA uses the technique of exponentiation over finite fields
and flip flop the date from one place to another [11]. In this including prime numbers [17]. On the other hand, ECC uses
way, the data can be made non-understandable by a common algebraic expressions which can also be used to encrypt and
person until it is decrypted by the person who knows the key decrypt data more conveniently. ECC shows great results in
for decryption [22]. respect of performance so this can be recommended as far as
asymmetric techniques are concerned [13].
B. Asymmetric Algorithms Comparison
By comparing the data fetched from Table III, it can be IV. DISCUSSION
examined that RSA and ECC are in the race [5]. To filter one
out of two, we need to understand the basic working and To conclude the discussion, we have a specific kind of
specifications of both algorithms thoroughly. distribution as shown in Figure 3.

The key size in RSA can proceed up to a thousand bits, but We can easily comprehend the fact from the figure that if
the problem is that, if we use the larger key, greater will be the the input size is less than 512 bits then we go for symmetric
time of encryption and decryption, which is not our desire from algorithms. The reason behind this observation is that
this technique [27]. symmetric key encryption seems faster than asymmetric

DOI: 10.24032/IJEACS/0402/003 www.ijeacs.com 11


Attique Ahmed et al. International Journal of Engineering and Applied Computer Science (IJEACS)
Volume: 04, Issue: 02, ISBN: 9780995707542, March 2022

encryption concerning processing time. Another reason for encryption algorithms." International Journal of Engineering Research &
using symmetric key encryption is that resource utilization is Applications (IJERA) 2.3 (2012): 3033-3037.
very low in this technique so it is best suited to content with [5] Prajapati, Priteshkumar, et al. "Comparative analysis of DES, AES, RSA
lesser size. encryption algorithms." International Journal of Engineering &
Management Research (IJEMR) 4.1 (2014): 132-134.
[6] Smekal, David, Jan Hajny, and Zdenek Martinasek. "Comparative
analysis of different implementations of encryption algorithms on FPGA
network cards." IFAC-PapersOnLine 51.6 (2018): 312-317.
[7] Riman, Chadi, and Pierre E. Abi-Char. "Comparative analysis of block
cipher-based encryption algorithms: A survey." Information Security and
Computer Fraud 3.1 (2015): 1-7.
[8] Marwaha, Mohit, et al. "Comparative analysis of cryptographic
algorithms." Int. J. Adv. Eng. Tech/IV/III/July-Sept 16 (2013): 18.
[9] Maqsood, Faiqa, et al. "Cryptography: a comparative analysis for
Figure 3. Suggested Best Encryption Technique modern techniques." International Journal of Advanced Computer
Science & Applications 8.6 (2017): 442-448.
If in such cases where input data is greater than 512 bits [10] Hercigonja, Zoran. "Comparative analysis of cryptographic
then as a drawback of symmetric algorithm it can’t handle large algorithms." International Journal of Digital Technology & Economy 1.2
size of input data. So, in this case, we use the asymmetric (2016): 127-134.
technique.
[11] Long, Sihan. "A Comparative Analysis of the Application of Hashing
By Deep looking at asymmetric encryption techniques, we Encryption Algorithms for MD5, SHA-1, and SHA-512." Journal of
also recommended that the ECC algorithm is the best among Physics: Conference Series. Vol. 1314. No. 1. IOP Publishing, 2019.
all older techniques and has criteria of factorization which has [12] Panda, Madhumita. "Performance analysis of encryption algorithms for
diverse variations to solve complex issues. security." 2016 International Conference on Signal Processing,
Communication, Power and Embedded System (SCOPES). IEEE, 2016.
In the case of the symmetric approach, we conclude that
[13] Farah, Shahzadi, et al. "An experimental study on performance
blowfish is the best available amongst all. The reason behind evaluation of asymmetric encryption algorithms." Recent Advances in
this fact is that AES is also in the race, but as far as brute force Information Science, Proceeding of the 3rd European Conf. of Computer
attacks are concerned, AES can’t handle these attacks. On the Science,(EECS-12). 2012.
other hand, blowfish have the ability to mitigate and almost
[14] Singh, Gurpreet. "A study of encryption algorithms (RSA, DES, 3DES,
resist brute force attacks. So, in the case of security and and AES) for information security." International Journal of Computer
performance, our study shows that blowfish is the best among Applications 67.19 (2013).
all symmetric techniques.
[15] Yegireddi, Ramesh, and R. Kiran Kumar. "A survey on conventional
encryption algorithms of Cryptography." 2016 International Conference
V. CONCLUSION AND FUTURE WORK on ICT in Business Industry & Government (ICTBIG). IEEE, 2016.

This analysis and study did not only help us to find the best [16] Mushtaq, Muhammad Faheem, et al. "A survey on the cryptographic
encryption algorithms." International Journal of Advanced Computer
algorithm among the cluster of techniques being used in the Science and Applications 8.11 (2017): 333-344.
world, but also provides us with the future aspects in which we
can also work on the techniques which are free of symmetric [17] Jaryal, Shikha, and Chetan Marwaha. "Comparative analysis of various
image encryption techniques." International Journal of Computational
and asymmetric approaches. Those techniques may be named Intelligence Research 13.2 (2017): 273-284.
hybrid encryption techniques. Hybrid techniques are also
[18] Dakate, Deepak Kumar, and Pawan Dubey. "Performance comparison of
present in the market. But the problem is that these are at the
symmetric data encryption techniques." IDEA 128 (2012): 58.
initial stage and have various limitations and deficiencies
which are yet to be removed. [19] Ebrahim, Mansoor, Shujaat Khan, and Umer Bin Khalid. "Symmetric
algorithm survey: a comparative analysis." arXiv preprint arXiv:
1405.0398 (2014).
REFERENCES
[1] Mota, Aquino Valentim, et al. "Comparative analysis of different [20] Jang, Shin Woo. "Comparative analysis of AES, Blowfish, Twofish and
techniques of encryption for secured data transmission." 2017 IEEE Threefish encryption algorithms." Anal. Appl. Math. 10 (2017): 5.
International Conference on Power, Control, Signals & Instrumentation [21] Liu, Fuwen, and Hartmut Koenig. "A survey of video encryption
Engineering (ICPCSI). IEEE, 2017. algorithms." computers & security 29.1 (2010): 3-15.
[2] Sharma, Apoorva, and Gitika Kushwaha. "Comparative Analysis of [22] Kumar, Anuj, Sapna Sinha, and Rahul Chaudhary. "A comparative
Different Encryption Techniques in Mobile Ad-Hoc Networks analysis of encryption algorithms for better utilization." International
(MANETs)." IITM Journal of Management & IT 10.1 (2019): 55-64. Journal of Computer Applications 71.14 (2013).
[3] Bhanot, Rajdeep, and Rahul Hans. "A review and comparative analysis [23] Hamouda, Baha Eldin Hamouda Hassan. "Comparative study of
of various encryption algorithms." International Journal of Security & Its different cryptographic algorithms." Journal of Information
Applications 9.4 (2015): 289-306. Security 11.3 (2020): 138-148.
[4] Jeeva, A. L., Dr V. Palanisamy, and K. Kanagaram. "Comparative
analysis of performance efficiency and security measures of some

DOI: 10.24032/IJEACS/0402/003 www.ijeacs.com 12


Attique Ahmed et al. International Journal of Engineering and Applied Computer Science (IJEACS)
Volume: 04, Issue: 02, ISBN: 9780995707542, March 2022

[24] Innokentievich, Tutubalin Pavel, and Mokshin Vladimir Vasilevich.


"The Evaluation of the cryptographic strength of asymmetric encryption
algorithms." 2017 Second Russia and Pacific Conference on Computer
Technology and Applications (RPC). IEEE, 2017.
[25] Saleh, Mohammed A., et al. "An analysis and comparison for popular
video encryption algorithms." 2015 IEEE Symposium on Computer
Applications & Industrial Electronics (ISCAIE). IEEE, 2015.
[26] Mahajan, Prerna, and Abhishek Sachdeva. "A study of encryption
algorithms AES, DES and RSA for security." Global Journal of
Computer Science and Technology (2013).
[27] Afolabi, A. O., and O. G. Atanda. "Comparative analysis of some
selected cryptographic algorithms." Computing, Information Systems,
Development Informatics & Allied Research Journal 7.2 (2016): 41-52.
[28] https://www.securitymagazine.com/articles/96667-the-top-data-
breaches-of-2021

AUTHORS PROFILE

Mr. Attique Ahmed has completed


his BS degree in Computer Science
from Hazara University, Mansehra,
Pakistan. Presently, He is pursuing
M.Phil. degree in Computer Science
from Abbottabad University of
Science and Technology, Abbottabad,
Pakistan.

Dr. Muhammad Naeem is an


Associate Professor and Head of the
Department of Computer Science at
Abbottabad University of Science and
Technology, Abbottabad, Pakistan.
He has completed his Ph.D. from
Leicester University, United
Kingdom.

DOI: 10.24032/IJEACS/0402/003 www.ijeacs.com 13

You might also like