Performance evaluation of cryptographic algorithms: DES and AES

Akash Kumar Mandal, Chandra Parakash, Archana Tiwari
{"title":"Performance evaluation of cryptographic algorithms: DES and AES","authors":"Akash Kumar Mandal, Chandra Parakash, Archana Tiwari","doi":"10.1109/SCEECS.2012.6184991","DOIUrl":null,"url":null,"abstract":"With the fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. These algorithms consume a significant amount of computing resources such as CPU time, memory and computation time. In this paper two most widely used symmetric encryption techniques i.e. data encryption standard (DES) and advanced encryption standard (AES) have been implemented using MATLAB software. After the implementation, these techniques are compared on some points. These points are avalanche effect due to one bit variation in plaintext keeping the key constant, avalanche effect due to one bit variation in key keeping the plaintext constant, memory required for implementation and simulation time required for encryption.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"153","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCEECS.2012.6184991","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 153

Abstract

With the fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. These algorithms consume a significant amount of computing resources such as CPU time, memory and computation time. In this paper two most widely used symmetric encryption techniques i.e. data encryption standard (DES) and advanced encryption standard (AES) have been implemented using MATLAB software. After the implementation, these techniques are compared on some points. These points are avalanche effect due to one bit variation in plaintext keeping the key constant, avalanche effect due to one bit variation in key keeping the plaintext constant, memory required for implementation and simulation time required for encryption.
加密算法的性能评估:DES和AES
随着数字数据交换电子化的快速发展,信息安全在数据的存储和传输中显得越来越重要。加密技术作为一种解决方案,在信息安全系统抵御恶意攻击方面发挥着至关重要的作用。这种安全机制使用一些算法将数据搅乱成不可读的文本,只有拥有相关密钥的一方才能解码或解密。这些算法消耗了大量的计算资源,如CPU时间、内存和计算时间。本文利用MATLAB软件实现了目前应用最广泛的两种对称加密技术,即数据加密标准DES和高级加密标准AES。在实现后,对这些技术进行了一些比较。这些点是雪崩效应,由于明文的一个比特变化保持密钥不变,雪崩效应由于密钥的一个比特变化保持明文不变,实现所需的内存和加密所需的模拟时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信