ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Study of Symmetric Key Network Security Algorithms

Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 11)

Publication Date:

Authors : ; ;

Page : 458-461

Keywords : Cryptography; Symmetric Key; AES; RC6 & Blowfish;

Source : Downloadexternal Find it from : Google Scholarexternal


Cryptography is an protecting the information by transforming it into an unreadable format in which a message can be concealed from the casual reader and only the intended recipient will be able to convert it into original text. In this research work the analysis is made between symmetric key algorithms such as AES, RC6 and Blowfish. The algorithms are compared in terms of various factors such as key length, cipher type, block size, resistance, security, possible keys, CPU time, encryption time, memory utilization and throughput. To analyze the performance of the algorithms it is required to know its strength and limitation. Consequently the assessment of different existing algorithms based on certain parameters is necessary. The parameters may include Architecture, Security, Scalability (in terms of Encryption rate, Memory Usage, Software hardware performance and computational time), Limitations, and Flexibility.

Last modified: 2016-01-28 16:18:29