{"title":"对称密码算法的比较研究","authors":"Alibek Nurgaliyev, Hua Wang","doi":"10.1109/NaNA53684.2021.00026","DOIUrl":null,"url":null,"abstract":"This article provides an unbiased comparison of the most popular and commonly used algorithms in the field of data encryption. The capacity to secure data from various attacks, as well as the elapsed time and efficiency of data encryption, are the main features that distinguish encryption algorithms. We compared the most prevalent symmetric encryption algorithms, including DES, 3DES, Blowfish, MARS, and AES, in this study. Each algorithm was compared by processing data blocks of various sizes to estimate encryption and decryption speeds and compare entropy. The given comparison takes into account the behavior and performance of the algorithms while utilizing varied data loads because the main objective is to execute these algorithms with various settings. We also looked at characteristics including flexibility, key extension possibilities, potential attacks, entropy, and security vulnerability of the algorithms, all of which affect the cryptosystem’s efficiency.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Comparative study of symmetric cryptographic algorithms\",\"authors\":\"Alibek Nurgaliyev, Hua Wang\",\"doi\":\"10.1109/NaNA53684.2021.00026\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article provides an unbiased comparison of the most popular and commonly used algorithms in the field of data encryption. The capacity to secure data from various attacks, as well as the elapsed time and efficiency of data encryption, are the main features that distinguish encryption algorithms. We compared the most prevalent symmetric encryption algorithms, including DES, 3DES, Blowfish, MARS, and AES, in this study. Each algorithm was compared by processing data blocks of various sizes to estimate encryption and decryption speeds and compare entropy. The given comparison takes into account the behavior and performance of the algorithms while utilizing varied data loads because the main objective is to execute these algorithms with various settings. We also looked at characteristics including flexibility, key extension possibilities, potential attacks, entropy, and security vulnerability of the algorithms, all of which affect the cryptosystem’s efficiency.\",\"PeriodicalId\":414672,\"journal\":{\"name\":\"2021 International Conference on Networking and Network Applications (NaNA)\",\"volume\":\"64 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Networking and Network Applications (NaNA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NaNA53684.2021.00026\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA53684.2021.00026","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparative study of symmetric cryptographic algorithms
This article provides an unbiased comparison of the most popular and commonly used algorithms in the field of data encryption. The capacity to secure data from various attacks, as well as the elapsed time and efficiency of data encryption, are the main features that distinguish encryption algorithms. We compared the most prevalent symmetric encryption algorithms, including DES, 3DES, Blowfish, MARS, and AES, in this study. Each algorithm was compared by processing data blocks of various sizes to estimate encryption and decryption speeds and compare entropy. The given comparison takes into account the behavior and performance of the algorithms while utilizing varied data loads because the main objective is to execute these algorithms with various settings. We also looked at characteristics including flexibility, key extension possibilities, potential attacks, entropy, and security vulnerability of the algorithms, all of which affect the cryptosystem’s efficiency.