Paper 59-Cryptography A Comparative Analysis For Modern Techniques
Paper 59-Cryptography A Comparative Analysis For Modern Techniques
Paper 59-Cryptography A Comparative Analysis For Modern Techniques
Abstract—Cryptography plays a vital role for ensuring secure secret key, whereas asymmetric cryptography (also called
communication between multiple entities. In many contemporary public key cryptography) secures communication by using
studies, researchers contributed towards identifying best public and private keys [5], [6]. Private key is hold individually
cryptography mechanisms in terms of their performance results. in communication while public key is known to everyone due
Selection of cryptographic technique according to a particular to public nature. Fig. 2 and 3 shows the symmetric and
context is a big question; to answer this question, many existing asymmetric cryptography, respectively.
studies have claimed that technique selection is purely dependent
on desired quality attributes such as efficiency and security. It To secure the communication, key size is the most
has been identified that existing reviews are either focused only important parameter in symmetric and symmetric
towards symmetric or asymmetric encryption types. Another cryptography. The key size of symmetric cryptography is less
limitation is found that a criterion for performance comparisons than the asymmetric cryptography which make symmetric
only covers common parameters. In this paper, we have cryptography less secure for more sensitive data [7], [8].
evaluated the performance of different symmetric and
asymmetric algorithms by covering multiple parameters such as
encryption/decryption time, key generation time and file size. For
evaluation purpose, we have performed simulations in a sample
context in which multiple cryptography algorithms have been
compared. Simulation results are visualized in a way that clearly
depicts which algorithm is most suitable while achieving a
particular quality attribute.
442 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 6, 2017
443 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 6, 2017
DES performance is not faster for software use. However, perform encryption/decryption, the sender and receiver
the performance of DES is faster on hardware [40] [12]. The must have the same key. The DES performs encryption
performance of AES, DES, and Blowfish has been evaluated on a block of 64-bit [13]. The DES algorithm is most
by using different size of text file in term of encryption and widely used in many applications [21] and some
decryption speed. Future work of this paper shows better result popular use in military, commercial, and security of
by using the better simulator for implementation [41]. In this communication system [7], same as DES but key size is
paper [42], RSA, DES and AES are discussed. Analyses are different from DES. The key size of 3DES is 168 bit.
performed on the basis of some parameter such as usage of The 3DES algorithm performs operation three times on
memory, computation time and output byte. Text file used for each block of data. It is slower than DES [22].
evaluation and implementation of result which showed that
DES and AES are the minor difference for file encryption time AES (Advanced Encryption Standard): AES stands for
while encryption time of RSA is longest and also consumed the Advanced Encryption Standard which is the
high memory. advancement of 3DES algorithm [23]. It was introduced
in 1997 by the NIST (National Institute of Standards
Mobile client and server used for evaluating the and Technology). Basically, AES is based on the
performance of RSA and ECC cryptography algorithm [43]. Rijndael cipher developed by two cryptographers, Joan
WTLS (Wireless Transport Layer Security) security protocol is Daemen and Vincent Rijmen. AES is different from
used for performance evaluation. In experiment, the result DES and 3DES due to variables key sizes such as 128,
showed that RSA is faster for client side but performance is 192, and 256 bits [21]. Same like DES and 3DES, AES
slow at the server side as compare to ECC (Elliptic Curve also performs encryption on blocks which are 128-bit
Cryptosystem) performance. RSA, ElGamal and Paillier have [13]. AES algorithm use in small devices for encrypting
been used for performance evaluation based on a parameter a message to send over a network. Some other
such as the encrypted file size, decrypted file size, encryption applications are monetary transaction [24] and security
time, decryption time and throughput. Experimental result applications [15] [25].
showed that encryption time of RSA is better than ElGamal but
decryption time of ElGamal is better as compared to RSA. B. Asymmetric Cryptography
Result also showed that throughput of RSA encryption process Asymmetric cryptography is also in the category of
is better and throughput in the decryption process of ElGamal cryptography schemes. Unlike symmetric cryptography, two
performance is better than RSA. Overall performance keys are used: one is public and second is private. The public
according to the chosen parameter RSA is better than all other key is shared by anyone in the cryptographic system while the
two algorithms paillier and ElGamal [29]. private key is kept secret by authenticated user. Followings are
the asymmetric cryptography algorithms.
In [44] paper analysis is performed and RSA with different
key size and word length variable in term of encryption and RSA (Rivest, Shamir and Adleman): RSA stands for
decryption process require memory size and execution time. Rivest, Shamir and Adleman who introduced the RSA
Experiment result showed that RSA execution time is slow and algorithm in 1977 [26]. RSA is an asymmetric
need more memory requirement as compare to ECC. Key cryptographic algorithm [2] which is also used for
agreement and key distribution is the main problem in DES encryption and decryption of the message. RSA is
algorithm but in RSA encryption and decryption, both widely used in transferring of keys over an insecure
operations consume more time. The result showed in a channel. Due to asymmetric nature, there are two keys
simulation that RSA is slower in performance than DES and used in the algorithm. One is public key and second is a
evaluated that RSA algorithm throughput of is not better than private key. The public key is openly accessible to
DES algorithm. In this paper, simulation result showed that everyone in the cryptosystem and the private key is kept
power consumption and throughput of DES algorithm is much secret by authorized person. RSA provides
better than another algorithm [45]. confidentiality, integrity, authenticity, and non-
repudiation of data [27 ] [23]. RSA is more commonly
III. STATE OF THE ART OF CRYPTOGRAPHY SCHEMES used in electronic industry for online money transfer
A. Symmetric Cryptography [19]. In future, RSA can be used in Java cards [28].
Symmetric cryptography is placed in the category of ElGamal: ElGamal algorithm was introduced in 1985
cryptography schemes in which a shared key is used to convert by Taher ElGamal [29]. ElGamal is an asymmetric key
a plaintext into cipher text. A same secret key is shared by both encryption algorithm that is based on the Diffie-Helman
sender and receiver. Followings are the symmetric key exchange as an alternative to RSA for public key
cryptography schemes. encryption. ElGamal is also used in digital signature
generation algorithm called ElGamal signature scheme
DES (Data Encryption Standard): DES stands for Data [20][30][31]. A homomorphic algorithm named paillier
Encryption Standard. DES introduced in early 1970 at used for its semantic security [6].
IBM. The early design of DES is based on Horst
Feistel. DES is a symmetric cryptographic algorithm ECC (Elliptic Curve Cryptography): ECC stands for
used for encryption and decryption of message [20]. In Elliptic Curve Cryptography. ECC introduced in 1985
DES, only one secret key is used for both encryption by Neal Koblitz and Victor S. Miller. ECC lies in the
and decryption. The key size of DES is 56-bit. To category of the asymmetric scheme that is based on
444 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 6, 2017
elliptic curves. The applications of ECC are encryption, TABLE. II. FILE SIZE WITH THEIR ENCRYPTION AND DECRYPTION TIMES
digital signatures and pseudo-random generators [32].
Decryption
IV. PERFORMANCE EVALUATION Cryptography File size Encryption Time
Time (in
Algorithms (kilo bytes) (in Seconds)
Seconds)
In this section, we present experimental setup and
experimental results of symmetric and asymmetric algorithms. 32 0.27 0.44
126 0.83 0.65
A. Experimental Setup
DES 200 1.19 0.85
The algorithms are implemented using the Java (Eclipse
246 1.44 1.23
Platform Version: 3.3.1.1) Experiments are performed on Intel
Pentium processor with a 2.34 GHz and 1 GB of memory. We 280 1.67 1.45
used different size of text files in our experiments such as 32 32 0.15 0.15
KB, 126 KB, 200 KB, 246 KB and 280 KB. 126 0.46 0.44
B. Experimental Result AES 200 0.72 0.63
We evaluate the performance of symmetric and asymmetric 246 0.95 0.83
algorithms by using parameters such as encryption time, 280 1.12 1.10
decryption time and key generation time. Symmetric 32 0.13 0.15
algorithms include DES and AES while asymmetric algorithms 126 0.52 0.43
include RSA and ElGamal.
RSA 200 0.74 0.66
Encryption time is the time required by any encryption 246 1.11 0.93
function to convert plaintext into ciphertext [44]. Decryption 280 1.39 1.23
time is the time required to convert again cipher text into plain
text. Similarly, key generation time is the time taken by key 32 0.45 0.43
generation function to generate keys. All these functions 126 1.03 0.85
generate different times according to the size of text files and ElGamal 200 1.41 1.13
key length in any algorithm. Table 1 shows the generation time 246 1.75 1.30
of symmetric and asymmetric keys. 280 1.83 1.64
445 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 6, 2017
446 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 6, 2017
447 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 6, 2017
[30] X. Li, X. Shen, and H. Chen, “ElGamal digital signature algorithm of comparison of symmetric key cryptographic algorithms based on various
adding a random number,” J. Networks, vol. 6, no. 5, pp. 774–782, 2011. file features,” International Journal of Network Security & Its
[31] H. Chen and J. Lin, “Digital Signature Scheme,” 2009. Applications, vol. 6, no. 4, 2014.
[32] M. S. Anoop, “Elliptic Curve Cryptography,” Infosecwriters, pp. 1–11, [39] S. Kansal and M. Mittal, “Performance evaluation of various symmetric
2015. encryption algorithms,” in Parallel, Distributed and Grid Computing
(PDGC), 2014 International Conference on. IEEE, 2014, pp. 105–109.
[33] R. H. Rathod and C. Dhote, “Comparison of symmetric key encryption
algorithms,” International Journal of Research in Information [40] S. Soni, H. Agrawal, and M. Sharma, “Analysis and comparison
Technology (IJRIT), 2014. between aes and des cryptographic algorithm,” International Journal of
Engineering and Innovative Technology, vol. 2, no. 6, pp. 362–365,
[34] O. Verma, R. Agarwal, D. Dafouti, and S. Tyagi, “Peformance analysis 2012.
of data encryption algorithms,” in Electronics Computer Technology
(ICECT), 2011 3rd International Conference on, vol. 5. IEEE, 2011, pp. [41] J Thakur and N. Kumar, “Des, aes and blowfish: Symmetric key
399–403. cryptography algorithms simulation based performance analysis,”
International journal of emerging technology and advanced engineering,
[35] A. Jeeva, D. V. Palanisamy, and K. Kanagaram, “Comparative analysis vol. 1, no. 2, pp. 6–12, 2011.
of performance efficiency and security measures of some
encryptionalgorithms,” International Journal of Engineering Research [42] S. M. Seth and R. Mishra, “Comparative analysis of encryption
and Applications (IJERA) ISSN, pp. 2248–9622, 2012. algorithms for data communication 1,” IJCST, vol. 2, 2011.
[36] P. Arora, A. Singh, and H. Tyagi, “Evaluation and comparison of [43] A. Levi and E. Savas, “Performance evaluation of public-key
security issues on cloud computing environment,” World of Computer cryptosystem operations in wtls protocol,” in Computers and
Science and Information Technology Journal (WCSIT), vol. 2, no. 5, pp. Communication, 2003.(ISCC 2003). Proceedings. Eighth IEEE
179–183, 2012. International Symposium on. IEEE, 2003, pp. 1245–1250.
[37] M. Mittal, “Performance evaluation of cryptographic algorithms,” [44] K. B. R. P.R.Vijayalakshmi, “Performance analysis of rsa and ecc in
International Journal of Computer Applications, vol. 41, no. 7, pp. 1–6, identity-based authenticated new multiparty key agreement protocol,”
2012. International Conference on Computing, Communication and
Applications (ICCCA), 2012.
[38] R. Masram, V. Shahare, J. Abraham, and R. Moona, “Analysis and
[45] A. Aman, J. Attri, A. Devi, and P. Sharma, “Comparative analysis
between des and rsa algorithms,” International Journal of Advanced
Research in Computer Science and Software Engineering, 2012.
448 | P a g e
www.ijacsa.thesai.org