IJISC
  • Indexed in

  • Latest News

    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Comparative Study of Cryptographic Algorithms


    Author(s): ABDULHAMID, Mohanad; GICHUKI, Nyagathu

    Quick view | Full article | Citations | Views: 446


    Author(s) keywords: , ,


    Reference keywords: , ,


    Abstract:

    This paper presents a comparative study of two cryptosystems, Data Encryption Standard (DES) and the Rivest-Shamir-Adleman (RSA) schemes. DES is a symmetric (or private) key cipher. This means that the same key is used for encryption and decryption. RSA, on the other hand, is an asymmetric (or public) key cipher, meaning that two keys are used, one for encryption and the other for decryption. The objective of this paper is to implement these two schemes in software. The program is written in the Java™ language. It generates a key from a passphrase given by the user, encrypts and decrypts a message using the same key, for the case of DES. In RSA, decryption is done by computing the decryption key from the encryption key. Finally, the program returns the time taken to encrypt and decrypt a message.



    References:

    [1]. N. Gichuki, "Comparative DES/RSA performance evaluation", Graduation Project, University of Nairobi, Kenya, 2009.

    [2]. G. Chhabra, "Computer trend with security by RSA, DES and Blowfish algorithm", International Journal of Computer Science and Technology, Vol. 4, Issue 2, PP.618-620, 2013.

    [3]. P. Patil, "A Comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish", Procedia Computer Science, Vol. 78, pp. 617-624, 2016.

    [4]. A. Rao, "Survey paper comparing ECC with RSA, AES and Blowfish Algorithms", International Journal on Recent and Innovation Trends in Computing and Communication, Vol. 5, Issue 1, PP.44-47, 2017.

    [5]. S. Kaur, "Study of multi-level cryptography algorithm: Multi-Prime RSA and DES", International Journal Computer Network and Information Security, Vol. 9, PP. 22-29, 2017.



    Additional Information

    Article Title: Comparative Study of Cryptographic Algorithms
    Author(s): ABDULHAMID, Mohanad; GICHUKI, Nyagathu
    Date of Publication: 2019-06-28
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2019.01.01
    Issue: Volume 8, Issue 1, Year 2019
    Section: Advances in Information Security Research
    Page Range: 13-22 (10 pages)



    Copyright ©2012-2025
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.