2018
DOI: 10.1007/978-981-13-0589-4_24
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation and Analysis of Advanced Symmetric Key Cryptographic Algorithms for Cloud Computing Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…Wani et al 20 Compared the encryption and decryption times, memory usage, security, and performance of AES, DES, Blowfish, 3DES, RC4, IDEA, and TEA algorithms on 10 different file sizes. The study concluded that encryption time for RC4 is the shortest and that for 3DES is the longest, decryption time for RC4 and AES is the shortest and 3DES is the longest, and memory use for IDEA and TEA is lower and RC4 is higher.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Wani et al 20 Compared the encryption and decryption times, memory usage, security, and performance of AES, DES, Blowfish, 3DES, RC4, IDEA, and TEA algorithms on 10 different file sizes. The study concluded that encryption time for RC4 is the shortest and that for 3DES is the longest, decryption time for RC4 and AES is the shortest and 3DES is the longest, and memory use for IDEA and TEA is lower and RC4 is higher.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In Ref. [21], the performance of some symmetric cryptographic algorithms has been studied in terms of runtime parameters and memory consumption.…”
Section: Related Workmentioning
confidence: 99%
“…To demonstrate the efficacy of the proposed approach, it was compared to seven other methods: DES-based data protection [Elgeldawi, et al (2019)], TDES based data security [Elgeldawi, et al (2019)], AES-based data security [Wani, et al (2019)],…”
Section: Comparative Analysismentioning
confidence: 99%
“…Blow Fish-based data security [Wani, et al (2019)], ECC-based data security [Dheepak T (2021)], RBAC-based data security [Jayasankar T, et al (2021)] and Two Fish based data security [Jayasankar T, et al (2021)]. Figure 25 shows the comparison results analyzed in terms of the retrieval time.…”
Section: Comparative Analysismentioning
confidence: 99%