International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 1 | Issue 3 | Year 2011 | Article Id. IJCTT-V1I3P104 | DOI : https://doi.org/10.14445/22312803/IJCTT-V1I3P104

Comparative Analysis of AES and RC4 Algorithms for Better Utilization


Nidhi Singhal, J.P.S.Raina

Citation :

Nidhi Singhal, J.P.S.Raina, "Comparative Analysis of AES and RC4 Algorithms for Better Utilization," International Journal of Computer Trends and Technology (IJCTT), vol. 1, no. 3, pp. 259-263, 2011. Crossref, https://doi.org/10.14445/22312803/IJCTT-V1I3P104

Abstract

In the today world, security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. But on the other hand, they consume significant amount of computing resources like CPU time, memory, encryption time etc. Normally, symmetric key algorithms are used over asymmetric key algorithms as they are very fast in nature. Symmetric algorithms are classified as block cipher and stream ciphers algorithms. In this paper, we compare the AES algorithm with different modes of operation (block cipher) and RC4 algorithm (stream cipher) in terms of CPU time, encryption time, memory utilization and throughput at different settings like variable key size and variable data packet size.

Keywords

Encryption, Decryption, Block and Stream Ciphers, AES, RC4.

References

[1] Alanazi Hamdan.O., Zaidan B.B., Zaidan A.A., Jalab Hamid.A., Shabbir .M and Al-Nabhani.Y, “New Comparative Study Between DES, 3DES and AES within Nine Factors” Journal of Computing, Volume 2, Issue 3, March2010, ISSN 2151-9617, pp.152-157 .
[2] Salama Diaa , Kader Hatem Abdual , and Hadhoud Mohiy , “Studying the Effects of Most Common Encryption Algorithms” International Arab Journal of e-Technology, Vol. 2, No. 1, January 2011, pp.1-10.
[3] Elminaam Diaa Salama Abdual., Kader Hatem Mohamed Abdual and Hadhoud Mohiy Mohamed,“Performance Evaluation of Symmetric Encryption Algorithms” IJCSNS International Journal of Computer Science and Network Security, VOL.8 ,No.12 , pp. 280-286, December 2008 .
[4] Elminaam Diaa Salama Abdual., Kader Hatem Mohamed Abdual and Hadhoud Mohiy Mohamed, “Tradeoffs between Energy Consumption and Security of Symmetric Encryption Algorithms” International Journal of Computer Theory and Engineering, Vol. 1, No. 3, pp. 325-333, August, 2009.
[5] Elminaam Diaa Salama Abdual., Kader Hatem Mohamed Abdual and Hadhoud Mohiy Mohamed, “Evaluating the Performance of Symmetric Encryption Algorithms” International Journal of Network Security, Vol.10, No.3,pp.213- 219, May 2010.
[6] Elminaam Diaa Salama Abdual., Kader Hatem Mohamed Abdual and Hadhoud Mohiy Mohamed, “Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types” International Journal of Network Security, Vol.11, No.2, pp.78- 87, Sept. 2010.
[7] Çakiroglu, Murat, “Software implementation and performance comparison Of popular block ciphers on 8-bit low-cost microcontroller” International Journal of the Physical Sciences, Vol. 5(9), pp. 1338-1343,August 2010.
[8] Ahmad Shish, Beg Mohd. Rizwan, Abbas Qamar , Ahmad Jameel and Atif Syed Mohd, “Comparative study between stream cipher and block cipher using RC4 and Hill Cipher” International Journal of Computer Applications(0975-8887),Vol.1,No.25, pp. 9-12.
[9] Sharif Suhaila Orner and Mansoor S.P., “Performance analysis of Stream and Block cipher algorithms” 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE), 2010 IEEE, pp. V1-522 - V1- 525.
[10] Bokhari, Mohammad Ubaidullah and Masoodi, Faheem, “Comparative Analysis of Structures And Attacks on Various Stream Ciphers” Proceedings of the 4th National Conference; INDIACom-2010.