Cryptography: A Comparative Analysis for Modern Techniques
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
Cryptography plays a vital role for ensuring secure communication between multiple entities. In many contemporary studies, researchers contributed towards identifying best cryptography mechanisms in terms of their performance results. Selection of cryptographic technique according to a particular context is a big question; to answer this question, many existing studies have claimed that technique selection is purely dependent on desired quality attributes such as efficiency and security. It has been identified that existing reviews are either focused only towards symmetric or asymmetric encryption types. Another limitation is found that a criterion for performance comparisons only covers common parameters. In this paper, we have evaluated the performance of different symmetric and asymmetric algorithms by covering multiple parameters such as encryption/decryption time, key generation time and file size. For evaluation purpose, we have performed simulations in a sample context in which multiple cryptography algorithms have been compared. Simulation results are visualized in a way that clearly depicts which algorithm is most suitable while achieving a particular quality attribute.
Authors and Affiliations
Faiqa Maqsood, Muhammad Ahmed, Muhammad Mumtaz Ali, Munam Ali Shah
Personalized Subject Learning Based on Topic Detection and Canonical Correlation Analysis
To keep pace with the time, learning from printed medium alone is no longer a comprehensive approach. Fresh digital contents can definitely be the complement of printed education medium. Although timely access to fresh c...
A Flexible Tool for Web Service Selection in Service Oriented Architecture
Web Services are emerging technologies that enable application to application communication and reuse of services over Web. Semantic Web improves the quality of existing tasks, including Web services discover...
Algorithm Selection for Constraint Optimization Domains
In this paper we investigate methods for selecting the best algorithms in classic distributed constraint optimization problems. While these are NP-complete problems, many heuristics have nonetheless been proposed. We fou...
Reliable Global Navigation System using Flower Constellation
For many space missions using satellite constellations, symmetry of satellites distribution plays usually a key role. Symmetry may be considered in space and/or in time distribution. Examples of required symmetry in spac...
Feature Descriptor Based on Normalized Corners and Moment Invariant for Panoramic Scene Generation
Panorama generation systems aim at creating a wide-view image by aligning and stitching a sequence of images. The technology is extensively used in many fields such as virtual reality, medical image analysis, and geologi...