Comparative Analysis of AES and RC4 Algorithms for Better Utilization
| International Journal of Computer Trends and Technology (IJCTT) | |
© July to Aug Issue 2011 by IJCTT Journal | ||
Volume-1 Issue-3 | ||
Year of Publication : 2011 | ||
Authors : Nidhi Singhal, J.P.S.Raina.. |
Nidhi Singhal, J.P.S.Raina. "Comparative Analysis of AES and RC4 Algorithms for Better Utilization"International Journal of Computer Trends and Technology (IJCTT),V1(3):259-263 July to Aug Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: —In the today world, security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. But on the other hand, they consume significant amount of computing resources like CPU time, memory, encryption time etc. Normally, symmetric key algorithms are used over asymmetric key algorithms as they are very fast in nature. Symmetric algorithms are classified as block cipher and stream ciphers algorithms. In this paper, we compare the AES algorithm with different modes of operation (block cipher) and RC4 algorithm (stream cipher) in terms of CPU time, encryption time, memory utilization and throughput at different settings like variable key size and variable data packet size.
References-
[1] Alanazi Hamdan.O., Zaidan B.B., Zaidan A.A., Jalab Hamid.A., Shabbir .M and Al-Nabhani.Y, “New Comparative Study Between DES, 3DES and AES within Nine Factors” Journal of Computing, Volume 2, Issue 3, March2010, ISSN 2151-9617, pp.152-157 .
[2] Salama Diaa , Kader Hatem Abdual , and Hadhoud Mohiy , “Studying the Effects of Most Common Encryption Algorithms” International Arab Journal of e-Technology, Vol. 2, No. 1, January 2011, pp.1-10.
[3] Elminaam Diaa Salama Abdual., Kader Hatem Mohamed Abdual and Hadhoud Mohiy Mohamed,“Performance Evaluation of Symmetric Encryption Algorithms” IJCSNS International Journal of Computer Science and Network Security, VOL.8 ,No.12 , pp. 280-286, December 2008 .
[4] Elminaam Diaa Salama Abdual., Kader Hatem Mohamed Abdual and Hadhoud Mohiy Mohamed, “Tradeoffs between Energy Consumption and Security of Symmetric Encryption Algorithms” International Journal of Computer Theory and Engineering, Vol. 1, No. 3, pp. 325-333, August, 2009.
[5] Elminaam Diaa Salama Abdual., Kader Hatem Mohamed Abdual and Hadhoud Mohiy Mohamed, “Evaluating the Performance of Symmetric Encryption Algorithms” International Journal of Network Security, Vol.10, No.3,pp.213- 219, May 2010.
[6] Elminaam Diaa Salama Abdual., Kader Hatem Mohamed Abdual and Hadhoud Mohiy Mohamed, “Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types” International Journal of Network Security, Vol.11, No.2, pp.78- 87, Sept. 2010.
[7] Çakiroglu, Murat, “Software implementation and performance comparison Of popular block ciphers on 8-bit low-cost microcontroller” International Journal of the Physical Sciences, Vol. 5(9), pp. 1338-1343,August 2010.
[8] Ahmad Shish, Beg Mohd. Rizwan, Abbas Qamar , Ahmad Jameel and Atif Syed Mohd, “Comparative study between stream cipher and block cipher using RC4 and Hill Cipher” International Journal of Computer Applications(0975-8887),Vol.1,No.25, pp. 9-12.
[9] Sharif Suhaila Orner and Mansoor S.P., “Performance analysis of Stream and Block cipher algorithms” 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE), 2010 IEEE, pp. V1-522 - V1- 525.
[10] Bokhari, Mohammad Ubaidullah and Masoodi, Faheem, “Comparative Analysis of Structures And Attacks on Various Stream Ciphers” Proceedings of the 4th National Conference; INDIACom-2010.
KeywordsEncryption, Decryption, Block and Stream Ciphers, AES, RC4.