Cryptography: A Comparative Analysis for Modern Techniques

Abstract

Cryptography plays a vital role for ensuring secure communication between multiple entities. In many contemporary studies, researchers contributed towards identifying best cryptography mechanisms in terms of their performance results. Selection of cryptographic technique according to a particular context is a big question; to answer this question, many existing studies have claimed that technique selection is purely dependent on desired quality attributes such as efficiency and security. It has been identified that existing reviews are either focused only towards symmetric or asymmetric encryption types. Another limitation is found that a criterion for performance comparisons only covers common parameters. In this paper, we have evaluated the performance of different symmetric and asymmetric algorithms by covering multiple parameters such as encryption/decryption time, key generation time and file size. For evaluation purpose, we have performed simulations in a sample context in which multiple cryptography algorithms have been compared. Simulation results are visualized in a way that clearly depicts which algorithm is most suitable while achieving a particular quality attribute.

Authors and Affiliations

Faiqa Maqsood, Muhammad Ahmed, Muhammad Mumtaz Ali, Munam Ali Shah

Keywords

Related Articles

Personalized Subject Learning Based on Topic Detection and Canonical Correlation Analysis

To keep pace with the time, learning from printed medium alone is no longer a comprehensive approach. Fresh digital contents can definitely be the complement of printed education medium. Although timely access to fresh c...

A Flexible Tool for Web Service Selection in Service Oriented Architecture

  Web Services are emerging technologies that enable application to application communication and reuse of services over Web. Semantic Web improves the quality of existing tasks, including Web services discover...

Algorithm Selection for Constraint Optimization Domains

In this paper we investigate methods for selecting the best algorithms in classic distributed constraint optimization problems. While these are NP-complete problems, many heuristics have nonetheless been proposed. We fou...

Reliable Global Navigation System using Flower Constellation

For many space missions using satellite constellations, symmetry of satellites distribution plays usually a key role. Symmetry may be considered in space and/or in time distribution. Examples of required symmetry in spac...

Feature Descriptor Based on Normalized Corners and Moment Invariant for Panoramic Scene Generation

Panorama generation systems aim at creating a wide-view image by aligning and stitching a sequence of images. The technology is extensively used in many fields such as virtual reality, medical image analysis, and geologi...

Download PDF file
  • EP ID EP259932
  • DOI 10.14569/IJACSA.2017.080659
  • Views 118
  • Downloads 0

How To Cite

Faiqa Maqsood, Muhammad Ahmed, Muhammad Mumtaz Ali, Munam Ali Shah (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal of Advanced Computer Science & Applications, 8(6), 442-448. https://www.europub.co.uk/articles/-A-259932