2016 International Conference on Computational Science and Computational Intelligence (CSCI) 2016
DOI: 10.1109/csci.2016.0258
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Performance of Symmetric Encryption Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
2

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 2 publications
0
7
0
2
Order By: Relevance
“…The most popular symmetric encryption algorithms are the Advanced Encryption Standard (AES) and Blowfish algorithms. In [13], the authors conducted a comparative analysis of the AES and Blowfish algorithms and found that AES was faster than Blowfish by nearly 200 ms when used to encrypt or decrypt the same file. Asymmetric encryption, on the other hand, involves using two keys-a public key and a private key-to encrypt and decrypt the data.…”
Section: ) Encryption-based Solutions To Protect Cloud Databasesmentioning
confidence: 99%
See 1 more Smart Citation
“…The most popular symmetric encryption algorithms are the Advanced Encryption Standard (AES) and Blowfish algorithms. In [13], the authors conducted a comparative analysis of the AES and Blowfish algorithms and found that AES was faster than Blowfish by nearly 200 ms when used to encrypt or decrypt the same file. Asymmetric encryption, on the other hand, involves using two keys-a public key and a private key-to encrypt and decrypt the data.…”
Section: ) Encryption-based Solutions To Protect Cloud Databasesmentioning
confidence: 99%
“…if SC i contains range of values then Nodei.addchild('partition value') 13: end while 14: end for We are not concerned about memory consumption in our solutions because the sensitive information in every row is encoded into bits (i.e., the smallest computation unit). Based on the PT, this does not consume memory or searching time.…”
Section: Partitioning Tree (Pt)mentioning
confidence: 99%
“…Their experimentation was conducted on a Raspberry Pi setup. With respect to speed, the authors concluded that AES is Faster than Blowfish [18]. has better performance than the other algorithms in terms of both throughput and encryption/decryption time [19].…”
Section: Blowfish Algorithmmentioning
confidence: 99%
“…algoritma Rijndael sangat kompetitif dengan algoritma Blowfish dilihat dari waktu proses enkripsi dan dekripsi [7]. Namun pada penelitian ini diplih algoritma Rijndael karena evaluasi performa yang dilakukan menggunakan tool Pycrypto package pada bahasa pemrograman phyton mendapatkan hasil algoritma Rijndael lebih cepat 200 sampai 300 ms dibandingkan Blowfish [16].…”
Section: Pendahuluanunclassified
“…Penelitian terkait menyebutkan panjang teks plainteks mempengaruhi terhadap waktu proses enkripsi dan dekripsi dengan kenaikan pada response time dengan adanya peningkatan pada panjang teks dengan panjang kunci setiap teks yang sama [21]. Namun, pada hasil pengujian pada gambar 16 .…”
Section: Pengujian Tingkat Keamananunclassified