ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

PERFORMANCE EVALUATION OF CLOUD DATA SECURITY FRAMEWORK USING SYMMETRIC KEY ALGORITHM

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.8, No. 12)

Publication Date:

Authors : ;

Page : 25-33

Keywords : Cryptography; Symmetric Key; DES; AES; Blowfish; Encryption; Decryption;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

There exist numerous kinds of cryptographic structures. In symmetric cryptography, both sending and receiving events share the identical secret key. While symmetric cryptography is computationally green, it requires that the shared secret key is sent to all recipients in a comfy way. Public-key cryptography additionally referred to as uneven cryptography, uses two keys: a public key that can be freely shared and a non-public key, which is mathematically tied to the public key. In public-key signature schemes, the creator of the content material makes use of the private key to signal the content. Afterwards the general public key and the signature are disbursed at the side of the content, permitting the recipient to verify the content material's authenticity. Encryption algorithms play a major role in records security systems. On the alternative side, the ones algorithms eat a massive quantity of computing assets which include CPU time, memory, and battery power. This thesis provides evaluation of six of the maximum not unusual encryption algorithms specifically: AES (Rijndael), DES, and Blowfish. A comparison has been carried out for the ones encryption algorithms at distinctive settings for each set of rules inclusive of one of kind sizes of information blocks, extraordinary statistics sorts, battery power intake, one of a kind key length and eventually encryption/decryption speed. Simulation results are given to illustrate the effectiveness of every algorithm.

Last modified: 2019-12-29 20:49:55