2018 IEEE Punecon 2018
DOI: 10.1109/punecon.2018.8745324
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Analysis Between Popular Symmetric Encryption Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…Given the same rising ASCII values, the encrypted data from the Blowfish algorithm tended to be greater in size than the AES-encrypted data. The authors in [21] conducted an experiment to evaluate the effectiveness of the most widely used symmetric algorithms in terms of Security, Architecture, Limitations, and Efficiency and to draw attention to the shortcomings of various algorithms. AES was discovered to be the best algorithm in terms of security, efficiency, and architecture.…”
Section: Related Workmentioning
confidence: 99%
“…Given the same rising ASCII values, the encrypted data from the Blowfish algorithm tended to be greater in size than the AES-encrypted data. The authors in [21] conducted an experiment to evaluate the effectiveness of the most widely used symmetric algorithms in terms of Security, Architecture, Limitations, and Efficiency and to draw attention to the shortcomings of various algorithms. AES was discovered to be the best algorithm in terms of security, efficiency, and architecture.…”
Section: Related Workmentioning
confidence: 99%