IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 6 - Issue 7, July 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Performance Test On Symmetric Encryption Algorithms - RC2 Vs Rijndael

[Full Text]

 

AUTHOR(S)

Neeraj Anand Sharma, Mohammed Farik

 

KEYWORDS

Algorithm, Brute-Force, Cipher, Ciphertext, Cryptography, Decryption, Encryption, RC2, Rijndael, Rivest.

 

ABSTRACT

Cryptography is one of the most integral components when trying to maintain achieve a secure communication medium and determining the best cryptography algorithm is as important as having a secure communication. In this paper, we will find out the two superlative symmetric cryptography algorithms available and used nowadays. Then, observe which algorithm is better than the other and finally give some recommendations based on the results achieved. This will surely narrow down the options as to which algorithm to choose when trying to achieve a secure communication.

 

REFERENCES

[1] Kessler, G. An Overview of Cryptography. 2017 [cited 2017 26th March]; Available from: http://www.garykessler.net/library/crypto.html#skc

[2] Menezes, A., S. Vanstone, and P. Van Oorschot, Handbook of applied cryptograph. 1st ed. 2001, Boca Ratón: CRC Press.

[3] Stallings, W., Network security essentials. 4th ed. 2011, Upper Saddle River, NJ 07458: Pearson Education, Inc.

[4] Rivest, R., Cryptography. JElsevier, 1990. In J. Van Leeuwen: Handbook of Theoretical Computer Science(1st).

[5] www.cryptool.org. Cryptool. 2017 [cited 2017 27th March]; Available from: https://www.cryptool.org/en/home.

[6] Elminaam, D., H. Kader, and M. Hadhoud, Evaluating The Performance of Symmetric Encryption Algorithms. International Journal of Network Security, 2010. 10(3): p. 213-219.

[7] Rivest, R., A Description of the RC2(r) Encryption Algorithm. . MIT Laboratory for Computer Science and RSA Data Security, Inc. , 1998.

[8] Daemen, J. and V. Rijmen, The design of Rijndael. Vol. 1st. 2011, Berlin: Springer.

[9] Rudra, A., et al., Efficient Rijndael Encryption Implementation with Composite Field Arithmetic, in Cryptographic Hardware and Embedded Systems Third sInternational Workshop Paris, France.