2016
DOI: 10.1016/j.procs.2016.02.108
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
123
0
20

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 285 publications
(144 citation statements)
references
References 1 publication
1
123
0
20
Order By: Relevance
“…Where U is the arrangement of URIs (Uniform Resource Identifiers) [5], the blank node identifiers are represented by , and L means the arrangement of RDF literals. Here, The sensitive data of the RDF is encrypted by using the advanced encryption algorithms like AES [28], DES [29] and RSA [30].…”
Section: Framework For Secured Data Modelmentioning
confidence: 99%
“…Where U is the arrangement of URIs (Uniform Resource Identifiers) [5], the blank node identifiers are represented by , and L means the arrangement of RDF literals. Here, The sensitive data of the RDF is encrypted by using the advanced encryption algorithms like AES [28], DES [29] and RSA [30].…”
Section: Framework For Secured Data Modelmentioning
confidence: 99%
“…Every encryption algorithm has some strength and weaknesses. In order to employ a secure encryption scheme to the applications, we need to evaluate the performance parameters [24], [32]- [35]. In this study, some of the evaluation parameters are discussed.…”
Section: E Evaluation Parametersmentioning
confidence: 99%
“…Like the other ciphers, this algorithm also effectively used in VLSI hardware and can be optimized in software application [16], [45]. The input as a plaintext is 64 bits data E. Divide EL into four 8 bits quarters: w, x, y, and z Fn(EL) = ((S1, w + S2, x mod 2 32 ) XOR S3, y) + S4, z mod 2 32 .…”
Section: Blowfishmentioning
confidence: 99%
See 1 more Smart Citation
“…The DES [2,5,6] algorithm was developed back in 1974 with the joint effort of IBM and the U.S. government. The primary objective behind its development was to set a standard that people could follow to securely communicate with each other.…”
Section: Des (Data Encryption Standard)mentioning
confidence: 99%