Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation
Data and information in storage, in transit or during processing are found in various computers and computing devices with wide range of hardware specifications. Cryptography is the knowledge of using codes to encrypt and decrypt data. It enables one to store sensitive information or transmit it acr...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Faculty of Engineering and Technology
2016-12-01
|
Series: | Nigerian Journal of Technological Development |
Subjects: | |
Online Access: | https://journal.njtd.com.ng/index.php/njtd/article/view/7 |
_version_ | 1818553612230459392 |
---|---|
author | J. B. Awotunde A. O. Ameen I. D. Oladipo A. R. Tomori M. Abdulraheem |
author_facet | J. B. Awotunde A. O. Ameen I. D. Oladipo A. R. Tomori M. Abdulraheem |
author_sort | J. B. Awotunde |
collection | DOAJ |
description | Data and information in storage, in transit or during processing are found in various computers and computing devices with wide range of hardware specifications. Cryptography is the knowledge of using codes to encrypt and decrypt data. It enables one to store sensitive information or transmit it across computer in a more secured ways so that it cannot be read by anyone except the intended receiver. Cryptography also allows secure storage of sensitive data on any computer. Cryptography as an approach to computer security comes at a cost in terms of resource utilization such as time, memory and CPU usability time which in some cases may not be in abundance to achieve the set out objective of protecting data. This work looked into the memory construction rate, different key size, CPU utilization time period and encryption speed of the four algorithms to determine the amount of computer resource that is expended and how long it takes each algorithm to complete its task. Results shows that key length of the cryptographic algorithm is proportional to the resource utilization in most cases as found out in the key length of Blowfish, AES, 3DES and DES algorithms respectively. Further research can be carried out in order to determine the power utilization of each of these algorithms.
|
first_indexed | 2024-12-12T09:28:06Z |
format | Article |
id | doaj.art-4ebeba088e9f46febe4f0256f483e565 |
institution | Directory Open Access Journal |
issn | 2437-2110 |
language | English |
last_indexed | 2024-12-12T09:28:06Z |
publishDate | 2016-12-01 |
publisher | Faculty of Engineering and Technology |
record_format | Article |
series | Nigerian Journal of Technological Development |
spelling | doaj.art-4ebeba088e9f46febe4f0256f483e5652022-12-22T00:28:58ZengFaculty of Engineering and TechnologyNigerian Journal of Technological Development2437-21102016-12-01132Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance EstimationJ. B. Awotunde0A. O. Ameen1I. D. Oladipo2A. R. Tomori3M. Abdulraheem4Department of Computer Science, University of Ilorin, Ilorin, Nigeria.Department of Computer Science, University of Ilorin, Ilorin, Nigeria.Department of Computer Science, University of Ilorin, Ilorin, Nigeria.Computer Sciences and Information Technology, University of Ilorin, Ilorin, Nigeria.Computer Sciences and Information Technology, University of Ilorin, Ilorin, Nigeria.Data and information in storage, in transit or during processing are found in various computers and computing devices with wide range of hardware specifications. Cryptography is the knowledge of using codes to encrypt and decrypt data. It enables one to store sensitive information or transmit it across computer in a more secured ways so that it cannot be read by anyone except the intended receiver. Cryptography also allows secure storage of sensitive data on any computer. Cryptography as an approach to computer security comes at a cost in terms of resource utilization such as time, memory and CPU usability time which in some cases may not be in abundance to achieve the set out objective of protecting data. This work looked into the memory construction rate, different key size, CPU utilization time period and encryption speed of the four algorithms to determine the amount of computer resource that is expended and how long it takes each algorithm to complete its task. Results shows that key length of the cryptographic algorithm is proportional to the resource utilization in most cases as found out in the key length of Blowfish, AES, 3DES and DES algorithms respectively. Further research can be carried out in order to determine the power utilization of each of these algorithms. https://journal.njtd.com.ng/index.php/njtd/article/view/7AlgorithmCryptographyEncryptionEvaluationPerformanceDecryption |
spellingShingle | J. B. Awotunde A. O. Ameen I. D. Oladipo A. R. Tomori M. Abdulraheem Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation Nigerian Journal of Technological Development Algorithm Cryptography Encryption Evaluation Performance Decryption |
title | Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation |
title_full | Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation |
title_fullStr | Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation |
title_full_unstemmed | Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation |
title_short | Evaluation of Four Encryption Algorithms for Viability, Reliability and Performance Estimation |
title_sort | evaluation of four encryption algorithms for viability reliability and performance estimation |
topic | Algorithm Cryptography Encryption Evaluation Performance Decryption |
url | https://journal.njtd.com.ng/index.php/njtd/article/view/7 |
work_keys_str_mv | AT jbawotunde evaluationoffourencryptionalgorithmsforviabilityreliabilityandperformanceestimation AT aoameen evaluationoffourencryptionalgorithmsforviabilityreliabilityandperformanceestimation AT idoladipo evaluationoffourencryptionalgorithmsforviabilityreliabilityandperformanceestimation AT artomori evaluationoffourencryptionalgorithmsforviabilityreliabilityandperformanceestimation AT mabdulraheem evaluationoffourencryptionalgorithmsforviabilityreliabilityandperformanceestimation |