Advertisement

Performance Analysis of Security Algorithms

  • E. SoundararajanEmail author
  • Nikhil Kumar
  • V. Sivasankar
  • S. Rajeswari
Conference paper
  • 31 Downloads
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 656)

Abstract

Computers have become more and more potent over the years, and consequently, it has become more comfortable and easier to break encryption and hashing algorithms. Hence, it is essential to study the performance of these algorithms and analyze them, and possibly come up with better algorithms based on the knowledge we have gained from the analysis. In this paper, a comprehensive literature study of the conventional encryption and hashing algorithms is done, followed by a practical comparison of the time-efficiency and CPU usage of these algorithms, two important performance evaluation parameters.

Keywords

Hashing Encryption Running time CPU usage 

References

  1. 1.
    AlAhmad MA, Alshaikhli IF (2013) Broad view of cryptographic hash functions. Int J Comput Sci Issues (IJCSI) 10(4):239. https://pdfs.semanticscholar.org/a5ea/6caf93c2d4b74b30ff095cb7e1b91c19a085.pdf
  2. 2.
    Ramachandran J (2002) Designing security architecture solutions. Wiley, New YorkGoogle Scholar
  3. 3.
    Tiwari H (2017) Merkle-Damgård construction method and alternatives: a review. J Inf Organ Sci 41(2):283–304. https://pdfs.semanticscholar.org/7abf/5eb51960c26dfe5fedbd0404c97ab4df5277.pdf?_ga=2.221023384.1428183823.1560855221-910554265.1559028851
  4. 4.
    Rivest R (1992) The MD4 message-digest algorithm (No. RFC 1320). https://tools.ietf.org/rfc/rfc1186.txt
  5. 5.
    Rivest R (1992) The MD5 message-digest algorithm (No. RFC 1321). https://www.ietf.org/rfc/rfc1321.txt
  6. 6.
    Eastlake D 3rd, Jones P (2001) US secure hash algorithm 1 (SHA1) (No. RFC 3174). https://www.ietf.org/rfc/rfc3174.txt
  7. 7.
    Eastlake D 3rd, Hansen T (2006) US secure hash algorithms (SHA and HMAC-SHA) (No. RFC 4634). https://tools.ietf.org/html/rfc4634
  8. 8.
    Kanthety SS (2017) Network security—feistel structure (Video file). https://www.youtube.com/watch?v=drI2shandyk
  9. 9.
    Wikipedia Contributors (2019) Feistel cipher. In: Wikipedia, the free encyclopedia. https://en.wikipedia.org/w/index.php?title=Feistel_cipher&oldid=877632002
  10. 10.
    Rachmawati D, Tarigan JT, Ginting ABC (2018) A comparative study of Message Digest 5 (MD5) and SHA256 algorithm. J Phys Conf Ser 978(1):012116. https://pdfs.semanticscholar.org/0bd7/dfda1dfca713044dac2c16d23124968e9c1b.pdf?_ga=2.210161429.1428183823.1560855221-910554265.1559028851 (IOP Publishing)
  11. 11.
    StackOverflow Contributors (2017) Space & time complexity of SHA-2. https://stackoverflow.com/questions/47557136/space-time-complexity-of-sha-2
  12. 12.
    StackExchange Contributors (2015) Is encryption time greater than decryption time? https://crypto.stackexchange.com/questions/25465/is-encryption-time-greater-than-decryption-time
  13. 13.
    lucaskauffman (2013) About secure password hashing (Blog post). https://security.blogoverflow.com/2013/09/about-secure-password-hashing/
  14. 14.
    Weerasinghe TDB, Disanayake C (2018) A research study: usage of RC4 stream cipher in SSL configurations of web servers used by Sri Lankan Financial Institutes. Int J Cyber Secur Digit Forensics 7(2):111–119. https://www.researchgate.net/publication/323118887_A_research_study_Usage_of_RC4_stream_cipher_in_SSL_configurations_of_web_servers_used_by_Sri_Lankan_Financial_Institutes
  15. 15.
    Nkiama M, Herve MS, Herve S. Comparative study Of AES, Blowfish, CAST-128 and DES encryption algorithm. Structure 4(8):4. https://pdfs.semanticscholar.org/7af1/ac803d2ba5a2a9b419eb41974811c8fcf558.pdf

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • E. Soundararajan
    • 1
    Email author
  • Nikhil Kumar
    • 2
  • V. Sivasankar
    • 1
  • S. Rajeswari
    • 1
  1. 1.Indira Gandhi Centre for Atomic ResearchKalpakkamIndia
  2. 2.Birla Institute of Technology and SciencePilaniIndia

Personalised recommendations