Skip to the main content

Professional paper

Comparative Analysis of Cryptographic Algorithms

Zoran Hercigonja orcid id ; Druga gimnazija, Varaždin, Croatia

Full text: english pdf 567 Kb

page 127-134

downloads: 7.427



Cyber security ensures a secure information exchange and enables communication through the Internet. The data needs to be protected from unauthorized access and transmitted to the intended receiver with confidentiality and integrity. Cryptography enhances security by encrypting and decrypting raw data in a secured network. Many cryptographic algorithms are available, and they fall under either symmetric or asymmetric techniques. To choose an algorithm for secure data communication, the candidate algorithm should provide higher accuracy, security and efficiency. This paper presents the implementation limitations of existing cryptographic algorithms such as DES, 3DES, CAST-128, BLOWFISH, IDEA, AES, and RC6 of symmetric techniques and RSA of asymmetric techniques. This paper also analyzes parameters like key exchange, flexibility and security issues of the algorithms which determines the efficiency of the cryptosystem.


cryptography, symmetric, asymmetric, architecture, security, limitations, DES, 3DES, CAST-128, BLOWFISH, IDEA, AES, RC6, RSA

Hrčak ID:



Visits: 8.404 *