Full Paper View Go Back

A Comparative Study of Symmetric Cryptography Mechanism on DES, AES and EB64 for Information Security

K.B. Logunleko1 , O.D. Adeniji2 , A.M. Logunleko3

Section:Research Paper, Product Type: Journal-Paper
Vol.8 , Issue.1 , pp.45-51, Feb-2020


Online published on Feb 28, 2020


Copyright © K.B. Logunleko, O.D. Adeniji, A.M. Logunleko . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.B. Logunleko, O.D. Adeniji, A.M. Logunleko, “A Comparative Study of Symmetric Cryptography Mechanism on DES, AES and EB64 for Information Security,” International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.1, pp.45-51, 2020.

MLA Style Citation: K.B. Logunleko, O.D. Adeniji, A.M. Logunleko "A Comparative Study of Symmetric Cryptography Mechanism on DES, AES and EB64 for Information Security." International Journal of Scientific Research in Computer Science and Engineering 8.1 (2020): 45-51.

APA Style Citation: K.B. Logunleko, O.D. Adeniji, A.M. Logunleko, (2020). A Comparative Study of Symmetric Cryptography Mechanism on DES, AES and EB64 for Information Security. International Journal of Scientific Research in Computer Science and Engineering, 8(1), 45-51.

BibTex Style Citation:
@article{Logunleko_2020,
author = {K.B. Logunleko, O.D. Adeniji, A.M. Logunleko},
title = {A Comparative Study of Symmetric Cryptography Mechanism on DES, AES and EB64 for Information Security},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2020},
volume = {8},
Issue = {1},
month = {2},
year = {2020},
issn = {2347-2693},
pages = {45-51},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1690},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1690
TI - A Comparative Study of Symmetric Cryptography Mechanism on DES, AES and EB64 for Information Security
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - K.B. Logunleko, O.D. Adeniji, A.M. Logunleko
PY - 2020
DA - 2020/02/28
PB - IJCSE, Indore, INDIA
SP - 45-51
IS - 1
VL - 8
SN - 2347-2693
ER -

324 Views    392 Downloads    85 Downloads
  
  

Abstract :
The usages of Information technology were numerous in every aspect of life. As it were, an adequate security has often been a great challenge which has to be more focused on. Different methods have been employed to secure and protect the shared and sensitive data. This research work basically focused on cryptography in ensuring zero tolerance for insecurity of data in transit. However, in order to improve security and efficiency of valuable data, the Private or Secret Key Encryption Infrastructure needs to be adopted as the model to implement security. This research work implemented three encryption techniques such as DES, AES and EB64 algorithms and compared their performances on both encryption and decryption techniques based on the analysis of encryption and decryption time allotted at each different experimental stage. The experimental results obtained were used to analyse the effectiveness of each algorithm on a mobile phone. The result that was gathered during the various experiments for SMS plaintext shows that EB64 encryption and decryption time was shorter as compared with AES and DES.

Key-Words / Index Term :
Cryptography, Encryption, Decryption, Private key encryption, Security, AES, DES, EB64

References :
[1] D. S AbdulElminaam, H. M AbdulKader, M.M Hadhoud, “Performance Evaluation of Symmetric Encryption Algorithms” Volume 8, ISSN: 1943-7765, pp 58-64, 2009.
[2] M. Agoyi, D.Seral, “SMS security: an asymmetric encryption Approach” Proc.6th International Conference on Wireles and Mobile Communication, 2012.
[3] Amalraj, Raybin, “A Survey Paper on Cryptography Techniques”. International Journal of Computer Science and Mobile Computing, IJCSMC, Vol. 5, Issue 8, pg.55 – 59, ISSN 2320–088X, 2016.
[4] Bodur, Kara. “Secure SMS Encryption Using RSA Encryption Algorithm on Android Message Application” H. BODUR et al./ ISITES2015 Valencia - algorithms with secret and public key”. International Journal of Engineering Research and Development, e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 8, Issue 2 (August 2013), pp. 45, Spain, Pp 160-170, 2015.
[5] R. Chehal, K.Singh, “Efficiency and Security of Data with Symmetric Encryption Algorithms”. International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X , Volume 2, Issue 8, pp 1. 2012
[6] S. Gurpreet, S. Supriya “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security” International Journal of Computer Applications (0975 – 8887), Vol 67– No.19, pp 33-38.2013
[7] S. Isnar, P Andysah, S. Utama, Arpan “Base64 Character Encoding and Decoding Modeling” International Journal of Recent Trends in Engineering & Research, Volume 02, Issue 12; [ISSN: 2455-1457], pp. 63-68, 2016.
[8] W.K Muhammad, “SMS Security in Mobile Devices: A Survey”,Int. J. Advanced Networking and Applications Volume: 05,. Pages:1873-1882, 2013.
[9] A. Padmapriya , P. Subhasri, “Cloud Computing: Security Challenges & Encryption Practices”. International Journal of Advanced Research in Computer Science and Software Engineering, ISSN:22 77128X, Volume 3, Issue 3, pp. 257, 2013.
[10] P. Paritosh, “Encryption for secure SMS transmission” An international journal of advanced computer technology, 4 (6), (Volume-IV, Issue-VI), pp 1876-1881, 2015.
[11] Prerna, Abhishek “A Study of Encryption Algorithms AES, DES and RSA for Security”. Global Journal of Computer Science and Technology Network, Web & Security Vol.13, Issue 15 Version 1.0. Online ISSN: 0975-4172 & Print ISSN: 0975-4350, 2013.
[12] R. Bhanot, R. Hans, “A Review and Comparative Analysis of Various Encryption Algorithms,” International Journal of Security and Its Applications, vol. 9, no. 4, pp. 289-306, 2015.
[13] H. Monther, Al-Bsool, “Real Implementation for SMS Encryption–Based on Android Message Application”. Network and Complex Systems. ISSN 2224-610X (Paper) ISSN 2225-0603 (Online), Vol.6, No.3, 2016.
[14] S. Pavithra, E. Ramadevi, “Performance evaluation of symmetric algorithms” Journal of Global Research in Computer Science, Volume 3, No. 8, pp 43-45, 2012.
[15] K.B. Logunleko, O.D. Adeniji, A.M. Logunleko, M.O. Odufowora, “Data Encryption Scheme Using an Enhanced Base64 Algorithm”, University of Ibadan Journal of Science and Logics in ICT Research (UIJSLICTR), Vol. 3, No 1 pp 16-24, 2019.
[16] M. Shashi, M. Rajan, “Comparative Analysis of Encryption Algorithms for Data Communication”, IJCST Vol.2, Issue 2, 2011.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation