Professional paper
Comparative Analysis of Cryptographic Algorithms
Zoran Hercigonja
orcid.org/0000-0002-5823-1915
; Druga gimnazija, Varaždin, Croatia
Abstract
Cyber security ensures a secure information exchange and enables communication through the Internet. The data needs to be protected from unauthorized access and transmitted to the intended receiver with confidentiality and integrity. Cryptography enhances security by encrypting and decrypting raw data in a secured network. Many cryptographic algorithms are available, and they fall under either symmetric or asymmetric techniques. To choose an algorithm for secure data communication, the candidate algorithm should provide higher accuracy, security and efficiency. This paper presents the implementation limitations of existing cryptographic algorithms such as DES, 3DES, CAST-128, BLOWFISH, IDEA, AES, and RC6 of symmetric techniques and RSA of asymmetric techniques. This paper also analyzes parameters like key exchange, flexibility and security issues of the algorithms which determines the efficiency of the cryptosystem.
Keywords
cryptography; symmetric; asymmetric; architecture; security; limitations; DES; 3DES; CAST-128; BLOWFISH; IDEA; AES; RC6; RSA
Hrčak ID:
177886
URI
Publication date:
30.12.2016.
Visits: 11.867 *