Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices

Authors

  • U. Iftikhar Computer and Information Systems Engineering Department, NED University of Engineering and Technology, Pakistan
  • K. Asrar Computer and Information Systems Engineering Department, NED University of Engineering and Technology, Pakistan
  • M. Waqas Computer and Information Systems Engineering Department, NED University of Engineering and Technology, Pakistan
  • S. A. Ali Department of Computer Science & Information Technology, NED University of Engineering and Technology, Karachi, Pakistan
Volume: 11 | Issue: 6 | Pages: 7867-7874 | December 2021 | https://doi.org/10.48084/etasr.4263

Abstract

Nowadays, terabytes of digital data are generated and sent online every second. However, securing this extent of information has always been a challenging task. Cryptography is a fundamental method for securing data, as it makes data unintelligible for attackers, offering privacy to authorized clients. Different cryptographic algorithms have different speeds and costs that make them suitable for different applications. For instance, banking applications need outrageous security amenities, as they utilize superior algorithms having greater requirements, while gaming applications focus more on speed and cost reduction. Consequently, cryptographic algorithms are chosen based on a client's prerequisites. This study compared DES, AES, Blowfish, and RSA, examining their speed, cost, and performance, and discussed their adequacy for use in wireless sensor networks and peer-to-peer communication.

Keywords:

DES, AES, Blowfish, RSA

Downloads

Download data is not yet available.

References

P. Patil, P. Narayankar, D. G. Narayan, and S. M. Meena, "A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish," Procedia Computer Science, vol. 78, pp. 617–624, Jan. 2016, https://doi.org/10.1016/j.procs.2016.02.108.

A. Jeeva, D. V. Palanisamy, and K. Kanagaram, "Comparative Analysis of Performance Efficiency and Security Measures of some Encryption Algorithms," International Journal of Engineering Research and, vol. 2, no. 3, pp. 3033–3037, May 2012.

H. O. Alanazi, B. B. Zaidan, A. A. Zaidan, H. A. Jalab, M. Shabbir, and Y. Al-Nabhani, "New Comparative Study Between DES, 3DES and AES within Nine Factors," vol. 2, no. 3, p. 6, Mar. 2010.

R. Tripathi and S. Agrawal, "Comparative Study of Symmetric and Asymmetric Cryptography Techniques," International Journal of Advanced Foundation and Research in Computer, vol. 1, no. 6, Jun. 2014.

M. S. Mahindrakar, "Evaluation of Blowfish Algorithm based on Avalanche Effect," International Journal of Innovations in Engineering and Technology, vol. 4, no. 1, pp. 99–103, Jun. 2014.

R. Pahal, "Efficient Implementation of AES," International Journal of Advanced Research in Computer Science and Software Engineering, pp. 290–295, Jul. 2013.

Y. Kumar, R. Munjal, and H. Sharma, "Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures," International Journal of Computer Science and Management Studies, vol. 11, no. 3, pp. 60–63, Oct. 2011.

C. P. Mandal, "Superiority of Blowfish Algorithm," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 9, pp. 196–201, Sep. 2012.

S. Karthik and A. Muruganandam, "Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System," International Journal of Scientific Engineering and Research, vol. 2, no. 11, pp. 24–31, Nov. 2014.

G. Prashanti, S. Deepthi, and K. Sandhya Rani, "A Novel Approach for Data Encryption Standard Algorithm," International Journal of Engineering and Advanced Technology, vol. 2, no. 5, pp. 264–267, Jun. 2013.

D. P. Mahajan and A. Sachdeva, "A Study of Encryption Algorithms AES, DES and RSA for Security," Global Journal of Computer Science and Technology, vol. 13, no. 15, Jul. 2013.

N. Kaur and S. Sodhi, "Data Encryption Standard Algorithm (DES) for Secure Data Transmission," IJCA Proceedings on International Conference on Advances in Emerging Technology, vol. ICAET 2016, no. 2, pp. 31–37, Oct. 2016.

M. R. Asassfeh, M. Qatawneh, and F. M. ALAzzeh, "Performance Evaluation of Blowfish Algorithm on Supercomputer IMAN1," International journal of Computer Networks & Communications, vol. 10, no. 2, pp. 43–53, Mar. 2018, https://doi.org/10.5121/ijcnc.2018.10205.

P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, "Wireless sensor networks: a survey on recent developments and potential synergies," The Journal of Supercomputing, vol. 68, no. 1, pp. 1–48, Apr. 2014, https://doi.org/10.1007/s11227-013-1021-9.

M. A. Al-Shabi, "A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security," International Journal of Scientific and Research Publications (IJSRP), vol. 9, no. 3, pp. 576–589, Mar. 2019, https://doi.org/10.29322/IJSRP.9.03.2019.p8779.

D. P. Joseph and M. Krishna, "Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms," International Journal of Advanced Research in Computer Science, vol. 6, no. 3, pp. 51–56, May 2015.

A. Gupta and N. K. Walia, "Cryptography Algorithms: A Review," International Journal of Engineering Development and Research, vol. 2, no. 2, pp. 1667–1672, 2014.

S. Kumari, "A research Paper on Cryptography Encryption and Compression Techniques," International Journal of Engineering and Computer Science, vol. 6, no. 4, pp. 20915–20919, Apr. 2017.

J. Thakur and N. Kumar, "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis," International Journal of Emerging Technology and Advanced Engineering, vol. 1, no. 2, pp. 5–12, Dec. 2011.

E. S. I. Harba, "Secure Data Encryption Through a Combination of AES, RSA and HMAC," Engineering, Technology & Applied Science Research, vol. 7, no. 4, pp. 1781–1785, Aug. 2017, https://doi.org/10.48084/etasr.1272.

A. S. Alshammari, "Comparison of a Chaotic Cryptosystem with Other Cryptography Systems," Engineering, Technology & Applied Science Research, vol. 10, no. 5, pp. 6187–6190, Oct. 2020, https://doi.org/10.48084/etasr.3745.

Downloads

How to Cite

[1]
U. Iftikhar, K. Asrar, M. Waqas, and S. A. Ali, “Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices”, Eng. Technol. Appl. Sci. Res., vol. 11, no. 6, pp. 7867–7874, Dec. 2021.

Metrics

Abstract Views: 676
PDF Downloads: 492

Metrics Information

Most read articles by the same author(s)