Skip to main content

Performance Analysis of Security Algorithms

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 656))

Abstract

Computers have become more and more potent over the years, and consequently, it has become more comfortable and easier to break encryption and hashing algorithms. Hence, it is essential to study the performance of these algorithms and analyze them, and possibly come up with better algorithms based on the knowledge we have gained from the analysis. In this paper, a comprehensive literature study of the conventional encryption and hashing algorithms is done, followed by a practical comparison of the time-efficiency and CPU usage of these algorithms, two important performance evaluation parameters.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. AlAhmad MA, Alshaikhli IF (2013) Broad view of cryptographic hash functions. Int J Comput Sci Issues (IJCSI) 10(4):239. https://pdfs.semanticscholar.org/a5ea/6caf93c2d4b74b30ff095cb7e1b91c19a085.pdf

  2. Ramachandran J (2002) Designing security architecture solutions. Wiley, New York

    Google Scholar 

  3. Tiwari H (2017) Merkle-Damgård construction method and alternatives: a review. J Inf Organ Sci 41(2):283–304. https://pdfs.semanticscholar.org/7abf/5eb51960c26dfe5fedbd0404c97ab4df5277.pdf?_ga=2.221023384.1428183823.1560855221-910554265.1559028851

  4. Rivest R (1992) The MD4 message-digest algorithm (No. RFC 1320). https://tools.ietf.org/rfc/rfc1186.txt

  5. Rivest R (1992) The MD5 message-digest algorithm (No. RFC 1321). https://www.ietf.org/rfc/rfc1321.txt

  6. Eastlake D 3rd, Jones P (2001) US secure hash algorithm 1 (SHA1) (No. RFC 3174). https://www.ietf.org/rfc/rfc3174.txt

  7. Eastlake D 3rd, Hansen T (2006) US secure hash algorithms (SHA and HMAC-SHA) (No. RFC 4634). https://tools.ietf.org/html/rfc4634

  8. Kanthety SS (2017) Network security—feistel structure (Video file). https://www.youtube.com/watch?v=drI2shandyk

  9. Wikipedia Contributors (2019) Feistel cipher. In: Wikipedia, the free encyclopedia. https://en.wikipedia.org/w/index.php?title=Feistel_cipher&oldid=877632002

  10. Rachmawati D, Tarigan JT, Ginting ABC (2018) A comparative study of Message Digest 5 (MD5) and SHA256 algorithm. J Phys Conf Ser 978(1):012116. https://pdfs.semanticscholar.org/0bd7/dfda1dfca713044dac2c16d23124968e9c1b.pdf?_ga=2.210161429.1428183823.1560855221-910554265.1559028851 (IOP Publishing)

  11. StackOverflow Contributors (2017) Space & time complexity of SHA-2. https://stackoverflow.com/questions/47557136/space-time-complexity-of-sha-2

  12. StackExchange Contributors (2015) Is encryption time greater than decryption time? https://crypto.stackexchange.com/questions/25465/is-encryption-time-greater-than-decryption-time

  13. lucaskauffman (2013) About secure password hashing (Blog post). https://security.blogoverflow.com/2013/09/about-secure-password-hashing/

  14. Weerasinghe TDB, Disanayake C (2018) A research study: usage of RC4 stream cipher in SSL configurations of web servers used by Sri Lankan Financial Institutes. Int J Cyber Secur Digit Forensics 7(2):111–119. https://www.researchgate.net/publication/323118887_A_research_study_Usage_of_RC4_stream_cipher_in_SSL_configurations_of_web_servers_used_by_Sri_Lankan_Financial_Institutes

  15. Nkiama M, Herve MS, Herve S. Comparative study Of AES, Blowfish, CAST-128 and DES encryption algorithm. Structure 4(8):4. https://pdfs.semanticscholar.org/7af1/ac803d2ba5a2a9b419eb41974811c8fcf558.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Soundararajan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Soundararajan, E., Kumar, N., Sivasankar, V., Rajeswari, S. (2020). Performance Analysis of Security Algorithms. In: Jayakumari, J., Karagiannidis, G., Ma, M., Hossain, S. (eds) Advances in Communication Systems and Networks . Lecture Notes in Electrical Engineering, vol 656. Springer, Singapore. https://doi.org/10.1007/978-981-15-3992-3_39

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-3992-3_39

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-3991-6

  • Online ISBN: 978-981-15-3992-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics