IJISC
  • Indexed in

  • Latest News

    June 28, 2019
    Volume 8, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2018
    Volume 7, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Comparative Study of Cryptographic Algorithms


    Author(s): ABDULHAMID, Mohanad; GICHUKI, Nyagathu

    Quick view | Full article | Citations | Views: 57


    Author(s) keywords: , ,


    Reference keywords: , ,


    Abstract:

    This paper presents a comparative study of two cryptosystems, Data Encryption Standard (DES) and the Rivest-Shamir-Adleman (RSA) schemes. DES is a symmetric (or private) key cipher. This means that the same key is used for encryption and decryption. RSA, on the other hand, is an asymmetric (or public) key cipher, meaning that two keys are used, one for encryption and the other for decryption. The objective of this paper is to implement these two schemes in software. The program is written in the Java™ language. It generates a key from a passphrase given by the user, encrypts and decrypts a message using the same key, for the case of DES. In RSA, decryption is done by computing the decryption key from the encryption key. Finally, the program returns the time taken to encrypt and decrypt a message.



    References:

    [1]. N. Gichuki, "Comparative DES/RSA performance evaluation", Graduation Project, University of Nairobi, Kenya, 2009.

    [2]. G. Chhabra, "Computer trend with security by RSA, DES and Blowfish algorithm", International Journal of Computer Science and Technology, Vol. 4, Issue 2, PP.618-620, 2013.

    [3]. P. Patil, "A Comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish", Procedia Computer Science, Vol. 78, pp. 617-624, 2016.

    [4]. A. Rao, "Survey paper comparing ECC with RSA, AES and Blowfish Algorithms", International Journal on Recent and Innovation Trends in Computing and Communication, Vol. 5, Issue 1, PP.44-47, 2017.

    [5]. S. Kaur, "Study of multi-level cryptography algorithm: Multi-Prime RSA and DES", International Journal Computer Network and Information Security, Vol. 9, PP. 22-29, 2017.



    Additional Information

    Article Title: Comparative Study of Cryptographic Algorithms
    Author(s): ABDULHAMID, Mohanad; GICHUKI, Nyagathu
    Date of Publication: 2019-06-28
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2019.01.01
    Issue: Volume 8, Issue 1, Year 2019
    Section: Advances in Information Security Research
    Page Range: 13-22 (10 pages)



    Copyright

    Copyright ©2012-2020 IJISC - International Journal of Information Security and Cybercrime

    All rights reserved: International Journal of Information Security and Cybercrime is a trademark of RAISA - Romanian Association for Information Security Assurance.
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.