{"title":"基于计算时间的不同对称加密技术的比较分析","authors":"Nishant Agnihotri, A. Sharma","doi":"10.1109/PDGC50313.2020.9315848","DOIUrl":null,"url":null,"abstract":"Lately the trend of the internet is taking a front seat for different applications. Organizations are collecting and processing and then sharing the data using the internet. Sharing using public network will invite various security lapses in the data. Security will remain the maj or thrust in the area for providing enough level of security for the data. Encryption is the best way to provide security for the data. There are two different types of approaches for ensuring data security. These techniques are symmetric and asymmetric. The symmetric technique includes different approaches with variation in the time and space complexity. In this research paper five different techniques of the symmetric approaches are compared for three different length strings. AES is the best performing in all the three cases. The time comparison for the AES with different techniques is comparatively better than the other four techniques like IDEA, RC6, Two Fish, MARS.","PeriodicalId":347216,"journal":{"name":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Comparative Analysis of Different Symmetric Encryption Techniques Based on Computation Time\",\"authors\":\"Nishant Agnihotri, A. Sharma\",\"doi\":\"10.1109/PDGC50313.2020.9315848\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Lately the trend of the internet is taking a front seat for different applications. Organizations are collecting and processing and then sharing the data using the internet. Sharing using public network will invite various security lapses in the data. Security will remain the maj or thrust in the area for providing enough level of security for the data. Encryption is the best way to provide security for the data. There are two different types of approaches for ensuring data security. These techniques are symmetric and asymmetric. The symmetric technique includes different approaches with variation in the time and space complexity. In this research paper five different techniques of the symmetric approaches are compared for three different length strings. AES is the best performing in all the three cases. The time comparison for the AES with different techniques is comparatively better than the other four techniques like IDEA, RC6, Two Fish, MARS.\",\"PeriodicalId\":347216,\"journal\":{\"name\":\"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PDGC50313.2020.9315848\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDGC50313.2020.9315848","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparative Analysis of Different Symmetric Encryption Techniques Based on Computation Time
Lately the trend of the internet is taking a front seat for different applications. Organizations are collecting and processing and then sharing the data using the internet. Sharing using public network will invite various security lapses in the data. Security will remain the maj or thrust in the area for providing enough level of security for the data. Encryption is the best way to provide security for the data. There are two different types of approaches for ensuring data security. These techniques are symmetric and asymmetric. The symmetric technique includes different approaches with variation in the time and space complexity. In this research paper five different techniques of the symmetric approaches are compared for three different length strings. AES is the best performing in all the three cases. The time comparison for the AES with different techniques is comparatively better than the other four techniques like IDEA, RC6, Two Fish, MARS.