Comparative Analysis of Cryptographic Algorithms
Zoran Hercigonja ()
Additional contact information
Zoran Hercigonja: Druga gimnazija Varaždin, Croatia
International Journal of Digital Technology and Economy, 2016, vol. 1, issue 2, 127-134
Abstract:
Cyber security ensures a secure information exchange and enables communication through the Internet. The data needs to be protected from unauthorized access and transmitted to the intended receiver with confidentiality and integrity. Cryptography enhances security by encrypting and decrypting raw data in a secured network. Many cryptographic algorithms are available, and they fall under either symmetric or asymmetric techniques. To choose an algorithm for secure data communication, the candidate algorithm should provide higher accuracy, security and efficiency. This paper presents the implementation limitations of existing cryptographic algorithms such as DES, 3DES, CAST-128, BLOWFISH, IDEA, AES, and RC6 of symmetric techniques and RSA of asymmetric techniques. This paper also analyzes parameters like key exchange, flexibility and security issues of the algorithms which determines the efficiency of the cryptosystem.
Keywords: Cryptography; symmetric; asymmetric; architecture; security; limitations; DES; 3DES; CAST-128; BLOWFISH; IDEA; AES; RC6; RSA (search for similar items in EconPapers)
Date: 2016
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://algebra.hr/publications//ijdte/vol1_iss2/IJDTE_01_02_2016_P5.pdf (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:alg:jijdte:v:1:y:2016:i:2:p:127-134
Access Statistics for this article
More articles in International Journal of Digital Technology and Economy from Algebra University College
Bibliographic data for series maintained by Robert Kopal ().