Comparative analysis of different techniques of encryption for secured data transmission

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Abstract

In today's digital world, it is beyond any doubt that almost everyone uses the Internet for different purposes. Most of the time data transmitted over the Internet contain confidential or private information that people want to remain protected. There are many encryption algorithms available for concealing information. However, none of the studies so far have compared different types of algorithms in more details. This paper will compare commonly used encryption algorithms. This comparison will be performed based on time taken for data encryption and decryption, efficiency in terms of security, memory usage, power consumption, jitter and latency. This report also focused on searching for studies about data encryption techniques available and their commonly used algorithms and comparatively compares each algorithm based on the parameters in common. The comparison of commonly used symmetric encryption algorithms Blowfish, AES, DES and 3DES concluded that Blowfish is best in all parameters (encryption time, decryption time, memory usage, power consumption, latency, jitter and security level). On the other hand, the comparison asymmetric algorithms RSA ECC and Elgamal showed that ECC is best in almost in parameters in comparison with RSA except in signature verification time. The hashing algorithm of SHA256 are more secure than SHA1 and MD5.

Original languageEnglish
Title of host publicationIEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages231-237
Number of pages7
ISBN (Electronic)9781538608135
DOIs
Publication statusPublished - 21 Jun 2018
Event2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017 - Chennai, India
Duration: 21 Sep 201722 Sep 2017

Conference

Conference2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017
CountryIndia
CityChennai
Period21/09/1722/09/17

Fingerprint

data transmission
Data Transmission
Comparative Analysis
Data communication systems
Encryption
Cryptography
Jitter
Power Consumption
Latency
RSA algorithm
SHA-1
Electric power utilization
Signature Verification
Internet
Private Information
Data storage equipment
Hashing
vibration
signatures

Cite this

Mota, A. V., Azam, S., Shanmugam, B., Yeo, K. C., & Kannoorpatti, K. (2018). Comparative analysis of different techniques of encryption for secured data transmission. In IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017 (pp. 231-237). IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ICPCSI.2017.8392158
Mota, Aquino Valentim ; Azam, Sami ; Shanmugam, Bharanidharan ; Yeo, Kheng Cher ; Kannoorpatti, Krishnan. / Comparative analysis of different techniques of encryption for secured data transmission. IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017. IEEE, Institute of Electrical and Electronics Engineers, 2018. pp. 231-237
@inproceedings{a47ebd073ebe42308ab17ae5462a1b26,
title = "Comparative analysis of different techniques of encryption for secured data transmission",
abstract = "In today's digital world, it is beyond any doubt that almost everyone uses the Internet for different purposes. Most of the time data transmitted over the Internet contain confidential or private information that people want to remain protected. There are many encryption algorithms available for concealing information. However, none of the studies so far have compared different types of algorithms in more details. This paper will compare commonly used encryption algorithms. This comparison will be performed based on time taken for data encryption and decryption, efficiency in terms of security, memory usage, power consumption, jitter and latency. This report also focused on searching for studies about data encryption techniques available and their commonly used algorithms and comparatively compares each algorithm based on the parameters in common. The comparison of commonly used symmetric encryption algorithms Blowfish, AES, DES and 3DES concluded that Blowfish is best in all parameters (encryption time, decryption time, memory usage, power consumption, latency, jitter and security level). On the other hand, the comparison asymmetric algorithms RSA ECC and Elgamal showed that ECC is best in almost in parameters in comparison with RSA except in signature verification time. The hashing algorithm of SHA256 are more secure than SHA1 and MD5.",
keywords = "component, formatting, insert (key words), style, styling",
author = "Mota, {Aquino Valentim} and Sami Azam and Bharanidharan Shanmugam and Yeo, {Kheng Cher} and Krishnan Kannoorpatti",
year = "2018",
month = "6",
day = "21",
doi = "10.1109/ICPCSI.2017.8392158",
language = "English",
pages = "231--237",
booktitle = "IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
address = "United States",

}

Mota, AV, Azam, S, Shanmugam, B, Yeo, KC & Kannoorpatti, K 2018, Comparative analysis of different techniques of encryption for secured data transmission. in IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017. IEEE, Institute of Electrical and Electronics Engineers, pp. 231-237, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017, Chennai, India, 21/09/17. https://doi.org/10.1109/ICPCSI.2017.8392158

Comparative analysis of different techniques of encryption for secured data transmission. / Mota, Aquino Valentim; Azam, Sami; Shanmugam, Bharanidharan; Yeo, Kheng Cher; Kannoorpatti, Krishnan.

IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017. IEEE, Institute of Electrical and Electronics Engineers, 2018. p. 231-237.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

TY - GEN

T1 - Comparative analysis of different techniques of encryption for secured data transmission

AU - Mota, Aquino Valentim

AU - Azam, Sami

AU - Shanmugam, Bharanidharan

AU - Yeo, Kheng Cher

AU - Kannoorpatti, Krishnan

PY - 2018/6/21

Y1 - 2018/6/21

N2 - In today's digital world, it is beyond any doubt that almost everyone uses the Internet for different purposes. Most of the time data transmitted over the Internet contain confidential or private information that people want to remain protected. There are many encryption algorithms available for concealing information. However, none of the studies so far have compared different types of algorithms in more details. This paper will compare commonly used encryption algorithms. This comparison will be performed based on time taken for data encryption and decryption, efficiency in terms of security, memory usage, power consumption, jitter and latency. This report also focused on searching for studies about data encryption techniques available and their commonly used algorithms and comparatively compares each algorithm based on the parameters in common. The comparison of commonly used symmetric encryption algorithms Blowfish, AES, DES and 3DES concluded that Blowfish is best in all parameters (encryption time, decryption time, memory usage, power consumption, latency, jitter and security level). On the other hand, the comparison asymmetric algorithms RSA ECC and Elgamal showed that ECC is best in almost in parameters in comparison with RSA except in signature verification time. The hashing algorithm of SHA256 are more secure than SHA1 and MD5.

AB - In today's digital world, it is beyond any doubt that almost everyone uses the Internet for different purposes. Most of the time data transmitted over the Internet contain confidential or private information that people want to remain protected. There are many encryption algorithms available for concealing information. However, none of the studies so far have compared different types of algorithms in more details. This paper will compare commonly used encryption algorithms. This comparison will be performed based on time taken for data encryption and decryption, efficiency in terms of security, memory usage, power consumption, jitter and latency. This report also focused on searching for studies about data encryption techniques available and their commonly used algorithms and comparatively compares each algorithm based on the parameters in common. The comparison of commonly used symmetric encryption algorithms Blowfish, AES, DES and 3DES concluded that Blowfish is best in all parameters (encryption time, decryption time, memory usage, power consumption, latency, jitter and security level). On the other hand, the comparison asymmetric algorithms RSA ECC and Elgamal showed that ECC is best in almost in parameters in comparison with RSA except in signature verification time. The hashing algorithm of SHA256 are more secure than SHA1 and MD5.

KW - component

KW - formatting

KW - insert (key words)

KW - style

KW - styling

UR - http://www.scopus.com/inward/record.url?scp=85050118607&partnerID=8YFLogxK

U2 - 10.1109/ICPCSI.2017.8392158

DO - 10.1109/ICPCSI.2017.8392158

M3 - Conference Paper published in Proceedings

SP - 231

EP - 237

BT - IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017

PB - IEEE, Institute of Electrical and Electronics Engineers

ER -

Mota AV, Azam S, Shanmugam B, Yeo KC, Kannoorpatti K. Comparative analysis of different techniques of encryption for secured data transmission. In IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017. IEEE, Institute of Electrical and Electronics Engineers. 2018. p. 231-237 https://doi.org/10.1109/ICPCSI.2017.8392158