Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation

Data and information in storage, in transit or during processing are found in various computers and computing devices with wide range of hardware specifications. Cryptography is the knowledge of using codes to encrypt and decrypt data. It enables one to store sensitive information or transmit it acr...

Full description

Bibliographic Details
Main Authors: J. B. Awotunde, A. O. Ameen, I. D. Oladipo, A. R. Tomori, M. Abdulraheem
Format: Article
Language:English
Published: Faculty of Engineering and Technology 2016-12-01
Series:Nigerian Journal of Technological Development
Subjects:
Online Access:https://journal.njtd.com.ng/index.php/njtd/article/view/7
_version_ 1818553612230459392
author J. B. Awotunde
A. O. Ameen
I. D. Oladipo
A. R. Tomori
M. Abdulraheem
author_facet J. B. Awotunde
A. O. Ameen
I. D. Oladipo
A. R. Tomori
M. Abdulraheem
author_sort J. B. Awotunde
collection DOAJ
description Data and information in storage, in transit or during processing are found in various computers and computing devices with wide range of hardware specifications. Cryptography is the knowledge of using codes to encrypt and decrypt data. It enables one to store sensitive information or transmit it across computer in a more secured ways so that it cannot be read by anyone except the intended receiver. Cryptography also allows secure storage of sensitive data on any computer. Cryptography as an approach to computer security comes at a cost in terms of resource utilization such as time, memory and CPU usability time which in some cases may not be in abundance to achieve the set out objective of protecting data. This work looked into the memory construction rate, different key size, CPU utilization time period and encryption speed of the four algorithms to determine the amount of computer resource that is expended and how long it takes each algorithm to complete its task. Results shows that key length of the cryptographic algorithm is proportional to the resource utilization in most cases as found out in the key length of Blowfish, AES, 3DES and DES algorithms respectively. Further research can be carried out in order to determine the power utilization of each of these algorithms.
first_indexed 2024-12-12T09:28:06Z
format Article
id doaj.art-4ebeba088e9f46febe4f0256f483e565
institution Directory Open Access Journal
issn 2437-2110
language English
last_indexed 2024-12-12T09:28:06Z
publishDate 2016-12-01
publisher Faculty of Engineering and Technology
record_format Article
series Nigerian Journal of Technological Development
spelling doaj.art-4ebeba088e9f46febe4f0256f483e5652022-12-22T00:28:58ZengFaculty of Engineering and TechnologyNigerian Journal of Technological Development2437-21102016-12-01132Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance EstimationJ. B. Awotunde0A. O. Ameen1I. D. Oladipo2A. R. Tomori3M. Abdulraheem4Department of Computer Science, University of Ilorin, Ilorin, Nigeria.Department of Computer Science, University of Ilorin, Ilorin, Nigeria.Department of Computer Science, University of Ilorin, Ilorin, Nigeria.Computer Sciences and Information Technology, University of Ilorin, Ilorin, Nigeria.Computer Sciences and Information Technology, University of Ilorin, Ilorin, Nigeria.Data and information in storage, in transit or during processing are found in various computers and computing devices with wide range of hardware specifications. Cryptography is the knowledge of using codes to encrypt and decrypt data. It enables one to store sensitive information or transmit it across computer in a more secured ways so that it cannot be read by anyone except the intended receiver. Cryptography also allows secure storage of sensitive data on any computer. Cryptography as an approach to computer security comes at a cost in terms of resource utilization such as time, memory and CPU usability time which in some cases may not be in abundance to achieve the set out objective of protecting data. This work looked into the memory construction rate, different key size, CPU utilization time period and encryption speed of the four algorithms to determine the amount of computer resource that is expended and how long it takes each algorithm to complete its task. Results shows that key length of the cryptographic algorithm is proportional to the resource utilization in most cases as found out in the key length of Blowfish, AES, 3DES and DES algorithms respectively. Further research can be carried out in order to determine the power utilization of each of these algorithms. https://journal.njtd.com.ng/index.php/njtd/article/view/7AlgorithmCryptographyEncryptionEvaluationPerformanceDecryption
spellingShingle J. B. Awotunde
A. O. Ameen
I. D. Oladipo
A. R. Tomori
M. Abdulraheem
Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation
Nigerian Journal of Technological Development
Algorithm
Cryptography
Encryption
Evaluation
Performance
Decryption
title Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation
title_full Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation
title_fullStr Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation
title_full_unstemmed Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation
title_short Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation
title_sort evaluation of four encryption algorithms for viability reliability and performance estimation
topic Algorithm
Cryptography
Encryption
Evaluation
Performance
Decryption
url https://journal.njtd.com.ng/index.php/njtd/article/view/7
work_keys_str_mv AT jbawotunde evaluationoffourencryptionalgorithmsforviabilityreliabilityandperformanceestimation
AT aoameen evaluationoffourencryptionalgorithmsforviabilityreliabilityandperformanceestimation
AT idoladipo evaluationoffourencryptionalgorithmsforviabilityreliabilityandperformanceestimation
AT artomori evaluationoffourencryptionalgorithmsforviabilityreliabilityandperformanceestimation
AT mabdulraheem evaluationoffourencryptionalgorithmsforviabilityreliabilityandperformanceestimation