International Conference on Computing, Communication &Amp; Automation 2015
DOI: 10.1109/ccaa.2015.7148500
|View full text |Cite
|
Sign up to set email alerts
|

DES and AES performance evaluation

Abstract: In these days use of digital data exchange is increasing day by day in every field. Information security plays very important role in storing and transmitting the data. When we transmit a multimedia data such as audio, video, images etc. over the network, cryptography provides security. In cryptography, we encode data before sending it and decode it on receiving, for this purpose, we use many cryptographic algorithms. AES and DES are most commonly used cryptographic algorithms. AES provides the encryption to s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(15 citation statements)
references
References 6 publications
0
15
0
Order By: Relevance
“…This data is decrypted using the AES decryption algorithm [8]. After decryption of data the first task done is validation of user card details wherein the card number, cvv, expiry date and name is verified.…”
Section: Working Of Proposed Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…This data is decrypted using the AES decryption algorithm [8]. After decryption of data the first task done is validation of user card details wherein the card number, cvv, expiry date and name is verified.…”
Section: Working Of Proposed Systemmentioning
confidence: 99%
“…Along with the card details the user location is also detected in terms of latitude and longitude along with current date and time. All this data is then encrypted using AES algorithm [8] and this encrypted data is then embedded in an image using F5 steganography algorithm [10]. This image is used by the user for carrying out the respective transaction thus, ensuring that user details are securely transmitted over a network.…”
Section: Working Of Proposed Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…The area of AES application researches in AES time taken in encrypting and decrypting process can be found in [12][13][14][15][16][17]. The AES also had been used to test the efficiency of data security with optimal data throughput [18][19].…”
Section: Introductionmentioning
confidence: 99%
“…Performance analysis of encryption algorithms for security [1], A Comparative and Analytical Study on Symmetric [2], Dessign of new security algorithm [3], Comparative Analysis of NPN Algorithm & DES [4], Proposed Symmetric Key Cryptography Algorithm [5], Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms [6], Performance Evaluation of Cryptographic Algorithms: DES and AES [7], DES and AES Performance Evaluation [8], Differential fault analysis against AES-192 and AES-256 with minimal faults [9] ,Implementing the IDEA Cryptographic Algorithm in Virtex-E and Virtex-II FPGAs [10], User Defined Encryption Procedure for IDEA Algorithm [11], Performance evaluation for CAST and RC5 encryption algorithms [12], Selection of parameter 'r' in RC5 algorithm on the basis of prime number [13] , Design and implementation of algorithm for des cryptanalysis [14], A-RSA: Augmented RSA [15], High speed implementation of RSA algorithm with modified keys exchange [16].…”
Section: Introductionmentioning
confidence: 99%