Open Access Open Access  Restricted Access Subscription or Fee Access

AES, RSA & ECDSA- Simulation based Comparative Analysis of Cryptographic Algorithms

Gagangeet Singh Aujla, Ravinder Singh Mann, Jaspreet Singh

Abstract


Recent growth of Network Applications and Internet has become backbone of communication between millions of people. Security has become a big challenge due to the rise of e-commerce to e-payments to secure communications and protecting of passwords. The importance and the value of the data exchanged over the internet have increased. Any loss or threat to information can prove to be very harmful for the organizations. Hence the necessary protection against the data intruders and attacks along with providing these services reliably and in time is one of the most worked on research field presently. Cryptography is mostly used by all government and semi government intelligence agencies throughout the world for safe transmission of messages in any format online or offline. Cryptographic algorithms play a crucial character in providing security to data against harmful malicious attacks and intruders. The main problem that lies with cryptographic algorithms is that the a lot of resources like CPU time, memory, encryption time etc are consumed. The main characteristic that identifies and differentiates the encryption algorithms from each other is the ability to secure the already protected data against various types of attacks and the speed with which it works along with efficiency in doing so. Normally, symmetric key algorithms are used over asymmetric key algorithms as they are very fast in nature. A data encryption algorithm is not of use if it provides security but shows slow performance due to the common trend of embedding encryption algorithms into other applications such as e-commerce, e-banking and online transaction processing. In this study, the performance of the three of the popular encryption algorithms AES, RSA and ECDSA was compared. First some terms and concepts behind basic cryptographic methods are defined, and then the three algorithms are compared on the basis of these parameters: time and complexity. Simulation program is implemented using NS 2.34.

Keywords


Cryptography; Cryptographic Algorithms; AES; RSA; ECC; ECDSA.

Full Text:

PDF

References


A.A. Milad, H.Z. Muda, Z.A.B.M. Noh and M.A. Algaet, (2012)“ Comparative Study of Performance in Cryptography Algorithms (Blowfish and Skipjack)” Journal of Computer Science, Vol. 8(7), pp. 1191-1197.

J. Thakur and N. Kumar (2011), “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Vol 1, Issue 2, pp. 6–12.

N.Singal and J.P.S. Rana (2011), “Comparative Analysis of AES and RC4 Algorithms for Better Utilization”, International Journal of Computer Trends and Technology, July-Aug Issue 2011, pp. 177-181.

M.R. Doomun and K.M.S. Sojaudah (2009), “Analytical Comparison of Cryptographic Techniques for Resource-Constrained Wireless Security”, International Journal of Network Security, Vol. 9, No. 1, pp. 82-94.

S. Kumar and A. Puri (2012), “Comparative Analysis of Various Cryptographic Algorithms”, International Journal of Computers and Distributed Systems, Vol. 1, Issue 3, pp. 1-10.

S.P. Singh and R. Miani (2011), “Comparasion of Data Encryption Algorithm”, International Journal of Computer Science and Communication, Vol. 2, No. 1, pp. 125-127.

S. Panithra and E. Ramadevi (2012), “Study and performance Analysis of Cryptography Algorithms”, International Journal of Advanced Research in Computer Engineering & Technology, Vol. 1, Issue 5, pp. 82-86.

P.C. Mandal (2012), “Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES ,AES and Blowfish”, Journal of Global Research in Computer Science, Vol. 3, No. 8, 67-70.

H. Rifa-Pous and J. Herrera-Joancomarti (2011), “Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices”, Future internet, Vol.3, pp. 31-48.

Y. Kumar, R. Munjal and S. Sharma (2012), “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures”, International Journal of Computer Science and Management Studies, Vol. 11, Issue 3, pp. 60-63.

A. Kumar, S. Jakhar and S. Kakkar (2012), “Comparative Anal ysis between DES and RS A Algorithm‟s”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue 7, pp. 386-391.

C. Sanjeev & G. J. A. Jose (2010), “Elliptic Curve Cryptography Enabled Security Wireless Communication”, International Journal Of Computer Science and Engineering, 2010.

M. O. Balitanas (2009), “Wi Fi Protected Access-Pre-Shared Key Hybrid Algorithm”, International Journal of Advanced Science and Technology , Vol. 12, November, 2009


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.