Open Access Open Access  Restricted Access Subscription or Fee Access

A Comparative Analysis of Cryptography Algorithms

M.B. Nivetha, S. Sivaramakrishnan


This paper is based on the analysis of the various algorithms in cryptography technique. With the fast changing technologies in today, more data are generated and transmitted. If the confidentiality of the information is very high, it should be protected. Cryptography is used to protect the personal or important data from the unauthorized people who try to access it . Cryptography is widely used by government and intelligence agencies around the world for the transmission of information. It can be either online offline. In this paper various cryptography algorithms are studied and compared.


Cryptography, Hashing, Symmetric Key.

Full Text:



Piyush Gupta et al, “A Comparative Analysis of SHA and MD5 Algorithm”,(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 4492-4495.

MilindMathur, AyushKesarwani, “Comparison between Des, 3des , Rc2 , Rc6 , Blowfish And Aes”Proceedings of National Conference on New Horizons in IT - NCNHIT 2013., “Blowfish Algorithm”., “Information security for government levels”., “Cyber defence : Secure Hash Algorithm”., “AES Vs. 3DES block ciphers”.

W.Stallings, ''Cryptography and Network Security 4th Ed,'' Prentice Hall , 2005,PP. 58-309 .

AtulKahate, ”Cryptography and Network Security”, Tata McGraw-Hill publishing company,New Delhi,2008.

"A Performance Comparison of Data Encryption Algorithms," IEEE [Information and Communication Technologies, 2005. ICICT 2005. First International Conference, 2006-02-27, PP.84- 89.

S.Z.S. Idrus,S.A.Aljunid,S.M.Asi, ''Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers,'' IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008 ,PP 20-25.

Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard,"Dr. Dobb's Journal, March 2001,PP. 137-139.

Coppersmith, D. "The Data Encryption Standard (DES) and Its Strength Against Attacks. "IBM Journal of Research and Development, May 1994.

Hardjono, ''Security In Wireless LANS And MANS,'' Artech House Publishers 2005.

How-Shen Chang, "International Data Encryption Algorithm",2004

ShasiMehlrotraseth, Rajan Mishra ― Comparative Analysis of Encryption Algorithms For Data Communication‖, IJCST Vol. 2, Issue 2, June 2011.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.