Analysis of Most Common Encryption Algorithms
Analysis of Most Common Encryption Algorithms
Analysis of Most Common Encryption Algorithms
International Journal of
Engineering and Applied Computer Science
Volume: 04, Issue: 02, March 2022 ISBN: 9780995707542
10.24032/IJEACS/0402/003
© 2022 by the author(s); licensee Empirical Research Press Ltd. United Kingdom. This is an open access article
distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license.
(http://creativecommons.org/licenses/by/4.0/).
www.ijeacs.com 8
Attique Ahmed et al. International Journal of Engineering and Applied Computer Science (IJEACS)
Volume: 04, Issue: 02, ISBN: 9780995707542, March 2022
G. Symmetric Encryption
This is the most effective type of encryption that provides
one hidden key to cipher and decrypt data [22]. Symmetric
encryption is an ancient and well-known method. In this
method, the mystery key is used which may be a number, a
phrase, or a string of arbitrary letters. It is mixed with the
obvious textual data or a message to enclose the content
material in a specific manner. The sender and recipient must
know the name of the key which is used to encrypt and decrypt Figure 2. Asymmetric Key Encryption
all of the messages. Blowfish, Twofish, AES, DES, 3DES, and
RCG are examples of symmetric encryption. The broadly used Upon detailed investigation, we found differences between
symmetric set of rules is AES-128, AES-256, and blowfish. symmetric and asymmetric encryption techniques. All of them
See Figure 1. are given in the table below:
Figure 1. Symmetric Key Encryption 2. The size of ciphertext is The size of ciphertext is
comparatively the same or comparatively the same or
smaller than the size of the larger than the size of the
H. Asymmetric Encryption original content. original content.
Asymmetric encryption can also be named public-key
3. The process of encryption The process of encryption
encryption which is comparatively a new method, as compared is faster than asymmetric. is slower than symmetric.
to symmetric encryption. Asymmetric encryption makes use of
two keys to encrypt simple textual content namely a public key 4. Used when a large amount Used when data is small.
and a private key [29]. Secret keys are then exchanged over the of data is required to be
Internet or a massive network. It guarantees that transferred.
hackers/snoopers cannot misuse the keys. It is critical to
observe that absolutely anyone with this key can decrypt the 5. Largely used for Used for confidentiality,
message and that is why such encryption makes use of confidentiality. authenticity, and non-
associated keys to enhance protection [2]. A public key is made repudiation.
generously had to absolutely everyone who would possibly
need to send or receive a message. 6. Resource utilization is low. Resource utilization is
high.
A message encrypted with the use of a public key can best
be decrypted using a private key; a message encrypted by the
use of a personal key may be decrypted by the use of a public
key. Security of general public key is not always required III. ANALYSIS OF POPULAR ALGORITHMS
because it's far from publicly to be had and may be surpassed In this section, we compare different algorithm techniques.
over the internet [38]. Firstly, we consider symmetric algorithms, and then we
compare asymmetric algorithms. At the end of the study, we
Asymmetric encryption is typically utilized in everyday compare both symmetric and asymmetric algorithms in order to
communication channels, mainly over the Internet. The most suggest the best algorithm which can compensate for all types
popular asymmetric encryption algorithms are EIgamal, RSA, of encryption tasks with great reliability.
Parameter Encryption
390 297 531
s for Time (ms)
DES 3DES AES Blowfish Twofish
Compariso
n
On the other hand, ECC can do the specific task of
Bruce Bruce
Developers IBM IBM NIST
Schneire Schneire encryption with the least bits of the key [9]. This can be shown
Emerging in Table IV.
1974 1978 2001 1993 1972
Year
192 128, 192, Up to 448 Up to TABLE IV. RSA VS ECC (BORROWED FROM [13])
Size of Key 56 bits
bits 256 bits bits 256 bits
Bits Level RSA ECC
Size of
64 bits 64 bits 64 bits 64 bits 128 bits
80 bits 1024 160
Block 112 bits 2048 224
No. of 128 bits 3072 256
16 48 10, 12, 14 16 16
Rounds 192 bits 7680 386
Substituti
on &
256 bits 15360 512
Algorithm Feistel Feistel Feistel Feistel
Permutati
Type N/W N/W N/W N/W
on ECC is a very promising asymmetric cryptography
Network technique that was presented by Miller and his fellow Koblitz
Encryption during the late 1980s [1]. This kind of algorithm is suitable for
Time (ms) 0.48,0.67,
(25kb file
0.89 1.391
0.95
0.59 0.99 devices using memory constraints such as Palmtop computers,
size) Smartphones, Smartcards, etc [16]. As compared to RSA and
ECC requires few parameters to encrypt and decrypt the
AES is based on substitution and permutation desired data or content, keeping the security level equivalent to
networks [15]. The substitution and permutation network all other sibling algorithms [13].
works on mathematical calculation and formulae to substitute RSA uses the technique of exponentiation over finite fields
and flip flop the date from one place to another [11]. In this including prime numbers [17]. On the other hand, ECC uses
way, the data can be made non-understandable by a common algebraic expressions which can also be used to encrypt and
person until it is decrypted by the person who knows the key decrypt data more conveniently. ECC shows great results in
for decryption [22]. respect of performance so this can be recommended as far as
asymmetric techniques are concerned [13].
B. Asymmetric Algorithms Comparison
By comparing the data fetched from Table III, it can be IV. DISCUSSION
examined that RSA and ECC are in the race [5]. To filter one
out of two, we need to understand the basic working and To conclude the discussion, we have a specific kind of
specifications of both algorithms thoroughly. distribution as shown in Figure 3.
The key size in RSA can proceed up to a thousand bits, but We can easily comprehend the fact from the figure that if
the problem is that, if we use the larger key, greater will be the the input size is less than 512 bits then we go for symmetric
time of encryption and decryption, which is not our desire from algorithms. The reason behind this observation is that
this technique [27]. symmetric key encryption seems faster than asymmetric
encryption concerning processing time. Another reason for encryption algorithms." International Journal of Engineering Research &
using symmetric key encryption is that resource utilization is Applications (IJERA) 2.3 (2012): 3033-3037.
very low in this technique so it is best suited to content with [5] Prajapati, Priteshkumar, et al. "Comparative analysis of DES, AES, RSA
lesser size. encryption algorithms." International Journal of Engineering &
Management Research (IJEMR) 4.1 (2014): 132-134.
[6] Smekal, David, Jan Hajny, and Zdenek Martinasek. "Comparative
analysis of different implementations of encryption algorithms on FPGA
network cards." IFAC-PapersOnLine 51.6 (2018): 312-317.
[7] Riman, Chadi, and Pierre E. Abi-Char. "Comparative analysis of block
cipher-based encryption algorithms: A survey." Information Security and
Computer Fraud 3.1 (2015): 1-7.
[8] Marwaha, Mohit, et al. "Comparative analysis of cryptographic
algorithms." Int. J. Adv. Eng. Tech/IV/III/July-Sept 16 (2013): 18.
[9] Maqsood, Faiqa, et al. "Cryptography: a comparative analysis for
Figure 3. Suggested Best Encryption Technique modern techniques." International Journal of Advanced Computer
Science & Applications 8.6 (2017): 442-448.
If in such cases where input data is greater than 512 bits [10] Hercigonja, Zoran. "Comparative analysis of cryptographic
then as a drawback of symmetric algorithm it can’t handle large algorithms." International Journal of Digital Technology & Economy 1.2
size of input data. So, in this case, we use the asymmetric (2016): 127-134.
technique.
[11] Long, Sihan. "A Comparative Analysis of the Application of Hashing
By Deep looking at asymmetric encryption techniques, we Encryption Algorithms for MD5, SHA-1, and SHA-512." Journal of
also recommended that the ECC algorithm is the best among Physics: Conference Series. Vol. 1314. No. 1. IOP Publishing, 2019.
all older techniques and has criteria of factorization which has [12] Panda, Madhumita. "Performance analysis of encryption algorithms for
diverse variations to solve complex issues. security." 2016 International Conference on Signal Processing,
Communication, Power and Embedded System (SCOPES). IEEE, 2016.
In the case of the symmetric approach, we conclude that
[13] Farah, Shahzadi, et al. "An experimental study on performance
blowfish is the best available amongst all. The reason behind evaluation of asymmetric encryption algorithms." Recent Advances in
this fact is that AES is also in the race, but as far as brute force Information Science, Proceeding of the 3rd European Conf. of Computer
attacks are concerned, AES can’t handle these attacks. On the Science,(EECS-12). 2012.
other hand, blowfish have the ability to mitigate and almost
[14] Singh, Gurpreet. "A study of encryption algorithms (RSA, DES, 3DES,
resist brute force attacks. So, in the case of security and and AES) for information security." International Journal of Computer
performance, our study shows that blowfish is the best among Applications 67.19 (2013).
all symmetric techniques.
[15] Yegireddi, Ramesh, and R. Kiran Kumar. "A survey on conventional
encryption algorithms of Cryptography." 2016 International Conference
V. CONCLUSION AND FUTURE WORK on ICT in Business Industry & Government (ICTBIG). IEEE, 2016.
This analysis and study did not only help us to find the best [16] Mushtaq, Muhammad Faheem, et al. "A survey on the cryptographic
encryption algorithms." International Journal of Advanced Computer
algorithm among the cluster of techniques being used in the Science and Applications 8.11 (2017): 333-344.
world, but also provides us with the future aspects in which we
can also work on the techniques which are free of symmetric [17] Jaryal, Shikha, and Chetan Marwaha. "Comparative analysis of various
image encryption techniques." International Journal of Computational
and asymmetric approaches. Those techniques may be named Intelligence Research 13.2 (2017): 273-284.
hybrid encryption techniques. Hybrid techniques are also
[18] Dakate, Deepak Kumar, and Pawan Dubey. "Performance comparison of
present in the market. But the problem is that these are at the
symmetric data encryption techniques." IDEA 128 (2012): 58.
initial stage and have various limitations and deficiencies
which are yet to be removed. [19] Ebrahim, Mansoor, Shujaat Khan, and Umer Bin Khalid. "Symmetric
algorithm survey: a comparative analysis." arXiv preprint arXiv:
1405.0398 (2014).
REFERENCES
[1] Mota, Aquino Valentim, et al. "Comparative analysis of different [20] Jang, Shin Woo. "Comparative analysis of AES, Blowfish, Twofish and
techniques of encryption for secured data transmission." 2017 IEEE Threefish encryption algorithms." Anal. Appl. Math. 10 (2017): 5.
International Conference on Power, Control, Signals & Instrumentation [21] Liu, Fuwen, and Hartmut Koenig. "A survey of video encryption
Engineering (ICPCSI). IEEE, 2017. algorithms." computers & security 29.1 (2010): 3-15.
[2] Sharma, Apoorva, and Gitika Kushwaha. "Comparative Analysis of [22] Kumar, Anuj, Sapna Sinha, and Rahul Chaudhary. "A comparative
Different Encryption Techniques in Mobile Ad-Hoc Networks analysis of encryption algorithms for better utilization." International
(MANETs)." IITM Journal of Management & IT 10.1 (2019): 55-64. Journal of Computer Applications 71.14 (2013).
[3] Bhanot, Rajdeep, and Rahul Hans. "A review and comparative analysis [23] Hamouda, Baha Eldin Hamouda Hassan. "Comparative study of
of various encryption algorithms." International Journal of Security & Its different cryptographic algorithms." Journal of Information
Applications 9.4 (2015): 289-306. Security 11.3 (2020): 138-148.
[4] Jeeva, A. L., Dr V. Palanisamy, and K. Kanagaram. "Comparative
analysis of performance efficiency and security measures of some
AUTHORS PROFILE