Cryptography: A Comparative Analysis for Modern Techniques

Abstract

Cryptography plays a vital role for ensuring secure communication between multiple entities. In many contemporary studies, researchers contributed towards identifying best cryptography mechanisms in terms of their performance results. Selection of cryptographic technique according to a particular context is a big question; to answer this question, many existing studies have claimed that technique selection is purely dependent on desired quality attributes such as efficiency and security. It has been identified that existing reviews are either focused only towards symmetric or asymmetric encryption types. Another limitation is found that a criterion for performance comparisons only covers common parameters. In this paper, we have evaluated the performance of different symmetric and asymmetric algorithms by covering multiple parameters such as encryption/decryption time, key generation time and file size. For evaluation purpose, we have performed simulations in a sample context in which multiple cryptography algorithms have been compared. Simulation results are visualized in a way that clearly depicts which algorithm is most suitable while achieving a particular quality attribute.

Authors and Affiliations

Faiqa Maqsood, Muhammad Ahmed, Muhammad Mumtaz Ali, Munam Ali Shah

Keywords

Related Articles

A Prototype Student Advising Expert System Supported with an Object-Oriented Database

Using intelligent computer systems technology to support the academic advising process offers many advantages over the traditional student advising. The objective of this research is to develop a prototype student advisi...

Semantic, Automatic Image Annotation Based on Multi-Layered Active Contours and Decision Trees

In this paper, we propose a new approach for automatic image annotation (AIA) in order to automatically and efficiently assign linguistic concepts to visual data such as digital images, based on both numeric and semantic...

Coverage-Aware Protocols in Wireless Sensor Networks: A Review

Coverage plays a vital role in wireless sensor networks (WSNs), since it is used as one of the important measure to achieve the performance of the sensor network. The sensor nodes in WSN have limited power and energy res...

New Artificial Immune System Approach Based on Monoclonal Principle for Job Recommendation

Finding the best solution for an optimization problem is a tedious task, specifically in the presence of enormously represented features. When we handle a problem such as job recommendations that have a diversity of thei...

A Mixed Finite Element Method for Elasticity Problem

This paper describes a numerical solution for plane elasticity problem. It includes algorithms for discretization by mixed finite element methods. The discrete scheme allows the utilization of Brezzi - Douglas - Marini e...

Download PDF file
  • EP ID EP259932
  • DOI 10.14569/IJACSA.2017.080659
  • Views 118
  • Downloads 0

How To Cite

Faiqa Maqsood, Muhammad Ahmed, Muhammad Mumtaz Ali, Munam Ali Shah (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal of Advanced Computer Science & Applications, 8(6), 442-448. https://www.europub.co.uk/articles/-A-259932