Comparative analysis of different techniques of encryption for secured data transmission

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Abstract

In today's digital world, it is beyond any doubt that almost everyone uses the Internet for different purposes. Most of the time data transmitted over the Internet contain confidential or private information that people want to remain protected. There are many encryption algorithms available for concealing information. However, none of the studies so far have compared different types of algorithms in more details. This paper will compare commonly used encryption algorithms. This comparison will be performed based on time taken for data encryption and decryption, efficiency in terms of security, memory usage, power consumption, jitter and latency. This report also focused on searching for studies about data encryption techniques available and their commonly used algorithms and comparatively compares each algorithm based on the parameters in common. The comparison of commonly used symmetric encryption algorithms Blowfish, AES, DES and 3DES concluded that Blowfish is best in all parameters (encryption time, decryption time, memory usage, power consumption, latency, jitter and security level). On the other hand, the comparison asymmetric algorithms RSA ECC and Elgamal showed that ECC is best in almost in parameters in comparison with RSA except in signature verification time. The hashing algorithm of SHA256 are more secure than SHA1 and MD5.

Original languageEnglish
Title of host publicationIEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages231-237
Number of pages7
ISBN (Electronic)9781538608135
DOIs
Publication statusPublished - 21 Jun 2018
Event2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017 - Chennai, India
Duration: 21 Sep 201722 Sep 2017

Conference

Conference2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017
CountryIndia
CityChennai
Period21/09/1722/09/17

Fingerprint Dive into the research topics of 'Comparative analysis of different techniques of encryption for secured data transmission'. Together they form a unique fingerprint.

  • Cite this

    Mota, A. V., Azam, S., Shanmugam, B., Yeo, K. C., & Kannoorpatti, K. (2018). Comparative analysis of different techniques of encryption for secured data transmission. In IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017 (pp. 231-237). IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ICPCSI.2017.8392158