Comparison of Algorithms Based CryptographySymmetric DES, AES and 3DES

Authors

  • Yuri Tatiana Medina Vargas Universidad de Pamplona
  • Haider Andrés Miranda Mnedez Universidad de Pamplona

DOI:

https://doi.org/10.61799/2216-0388.55

Abstract

ABSTRACT Security is one of the most challenging aspects of the internet and network applications. Which are growing very quickly, so that the importance and value of the data exchanged via the Internet or other media types are increasing. Hence the search for the best solution to provide the necessary protection against attacks by intruders to our data, together with the provision of these services in the time it is one of the most interesting topics in the communities related to security. Cryptography is the one of the major categories of computer security that converts the information from its normal form in an unreadable format the two main characteristics that identify and differentiat encryption algorithm from one another are its ability to ensure the data protected against attacks and their speed and efficiency to do so. This article provides a fair comparison of three algorithms for symmetric key cryptography more common: DES, AES and 3DES.

Downloads

Download data is not yet available.

Author Biographies

  • Yuri Tatiana Medina Vargas, Universidad de Pamplona
    Facultad de Ingenierías y Arquitecturas Ingeniería de Sistemas (Villa del Rosario)
  • Haider Andrés Miranda Mnedez, Universidad de Pamplona
    Facultad de Ingenierías y Arquitecturas Ingeniería de Sistemas (Villa del Rosario)

References

Abomhara, M.; Zakaria, O.; Othman O.; Khalifa, A.A.; Zaidan, B.B. (2010). Enhancing Selective Encryption for H.264/AVC Using Advance Encryption Standard. International Journal of Computer and Electrical Engineering (IJCEE), 2(2). DOI: https://doi.org/10.7763/IJCEE.2010.V2.141

Edney, J.; Arbaugh W. (2003). Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Ed 1, Addison Wesley.

Elminaam, A.; Kader, A.; Hadhoud, M. (2010). Evaluating the Performance of Sysmmetric Encryption Algorithms. International Journal of Network Security, 10(3), 216-222.

Hamdan A.; Hamid, A.; Zaidan, A.A.; Zaidan, B.B. (2010). New Frame Work of Hidden Data with in Non Multimedia File. International Journal of Computer and Network Security, 2(1), 46-54.

IDRBT (2002). Public Key Cryptography. Recuperado de http://idrbtca.org.in/inf_pki.htm

Naji, A.W.; Shihab, A.; Hameed, B.B.; Zaidan Wajdi F.; Al-Khateeb Othman O.; Khalifa, A.A.; Teddy S. G., (2009). Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advance Encryption Standared and Distortion Techniques. International Journal of Computer Science and Information Security (IJCSIS), 3(1), 3-78.

Network Associates (1999). The Basics of Cryptography, How PGP works. Recuperado de http://www.pgpi.org/doc/pgpintro/

Penchalaiah, N.; Seshadri, R. (2010). Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES). International Journal of Computer Science and Engineering, 2(5), 1641-1645.

Shirey, R. (2000). Internet Security Glossary. Recuperado de http://www.faqs.org/rfcs/rfc2828.html DOI: https://doi.org/10.17487/rfc2828

Singhal, N.; Raina, J. (2011). Comparative Analysis of AES and RC4 Algorithms for Better Utilization. International Journal of Computer Trends and Technology, Aug Issue, 177-181.

Tamimi, A. (2008). Performance Analysis of Data Encryption Algorithms. Recuperado de http://www.cse.wustl.edu/~jain/cse567-06/ftp/encryption_perf.pdf

Downloads

Published

2015-12-22

Issue

Section

Articulos

How to Cite

Medina Vargas, Y. T., & Miranda Mnedez, H. A. (2015). Comparison of Algorithms Based CryptographySymmetric DES, AES and 3DES. Mundo FESC Journal, 5(9), 14-21. https://doi.org/10.61799/2216-0388.55