Abstract
Computers have become more and more potent over the years, and consequently, it has become more comfortable and easier to break encryption and hashing algorithms. Hence, it is essential to study the performance of these algorithms and analyze them, and possibly come up with better algorithms based on the knowledge we have gained from the analysis. In this paper, a comprehensive literature study of the conventional encryption and hashing algorithms is done, followed by a practical comparison of the time-efficiency and CPU usage of these algorithms, two important performance evaluation parameters.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
AlAhmad MA, Alshaikhli IF (2013) Broad view of cryptographic hash functions. Int J Comput Sci Issues (IJCSI) 10(4):239. https://pdfs.semanticscholar.org/a5ea/6caf93c2d4b74b30ff095cb7e1b91c19a085.pdf
Ramachandran J (2002) Designing security architecture solutions. Wiley, New York
Tiwari H (2017) Merkle-Damgård construction method and alternatives: a review. J Inf Organ Sci 41(2):283–304. https://pdfs.semanticscholar.org/7abf/5eb51960c26dfe5fedbd0404c97ab4df5277.pdf?_ga=2.221023384.1428183823.1560855221-910554265.1559028851
Rivest R (1992) The MD4 message-digest algorithm (No. RFC 1320). https://tools.ietf.org/rfc/rfc1186.txt
Rivest R (1992) The MD5 message-digest algorithm (No. RFC 1321). https://www.ietf.org/rfc/rfc1321.txt
Eastlake D 3rd, Jones P (2001) US secure hash algorithm 1 (SHA1) (No. RFC 3174). https://www.ietf.org/rfc/rfc3174.txt
Eastlake D 3rd, Hansen T (2006) US secure hash algorithms (SHA and HMAC-SHA) (No. RFC 4634). https://tools.ietf.org/html/rfc4634
Kanthety SS (2017) Network security—feistel structure (Video file). https://www.youtube.com/watch?v=drI2shandyk
Wikipedia Contributors (2019) Feistel cipher. In: Wikipedia, the free encyclopedia. https://en.wikipedia.org/w/index.php?title=Feistel_cipher&oldid=877632002
Rachmawati D, Tarigan JT, Ginting ABC (2018) A comparative study of Message Digest 5 (MD5) and SHA256 algorithm. J Phys Conf Ser 978(1):012116. https://pdfs.semanticscholar.org/0bd7/dfda1dfca713044dac2c16d23124968e9c1b.pdf?_ga=2.210161429.1428183823.1560855221-910554265.1559028851 (IOP Publishing)
StackOverflow Contributors (2017) Space & time complexity of SHA-2. https://stackoverflow.com/questions/47557136/space-time-complexity-of-sha-2
StackExchange Contributors (2015) Is encryption time greater than decryption time? https://crypto.stackexchange.com/questions/25465/is-encryption-time-greater-than-decryption-time
lucaskauffman (2013) About secure password hashing (Blog post). https://security.blogoverflow.com/2013/09/about-secure-password-hashing/
Weerasinghe TDB, Disanayake C (2018) A research study: usage of RC4 stream cipher in SSL configurations of web servers used by Sri Lankan Financial Institutes. Int J Cyber Secur Digit Forensics 7(2):111–119. https://www.researchgate.net/publication/323118887_A_research_study_Usage_of_RC4_stream_cipher_in_SSL_configurations_of_web_servers_used_by_Sri_Lankan_Financial_Institutes
Nkiama M, Herve MS, Herve S. Comparative study Of AES, Blowfish, CAST-128 and DES encryption algorithm. Structure 4(8):4. https://pdfs.semanticscholar.org/7af1/ac803d2ba5a2a9b419eb41974811c8fcf558.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Soundararajan, E., Kumar, N., Sivasankar, V., Rajeswari, S. (2020). Performance Analysis of Security Algorithms. In: Jayakumari, J., Karagiannidis, G., Ma, M., Hossain, S. (eds) Advances in Communication Systems and Networks . Lecture Notes in Electrical Engineering, vol 656. Springer, Singapore. https://doi.org/10.1007/978-981-15-3992-3_39
Download citation
DOI: https://doi.org/10.1007/978-981-15-3992-3_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3991-6
Online ISBN: 978-981-15-3992-3
eBook Packages: EngineeringEngineering (R0)