Performance Evaluation of Symmetric Block Cipher RC6 with ECB and CBC Operation Modes

  • Purva SharmaEmail author
  • Rajendra Purohit
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)


In today’s scene, many applications which are needed to transfer bulk of information among the users in secure manner. The best path to secure information is Cryptography. In cryptography, symmetric block ciphers are one of the most important fundamental methods to transfer bulk of data at high speed. RC6 cipher is used to transfer only 128-bits. To transfer more than 128 bits, utilize the mode of operations like Electronic Codebook Mode (ECB mode) and Cipher Block Chaining Mode (CBC mode). In this research paper, symmetric block cipher RC6 is performed along with two mode of operations: ECB mode and CBC mode.


Cryptography Symmetric block cipher RC6 cipher ECB mode CBC mode 


  1. 1.
    Albermany, S.A.K., RadiHamade, F.: Survey: block cipher methods. Int. J. Adv. Res. Technol. 5(11), 11 November 2016. ISSN 2278-7763Google Scholar
  2. 2.
    Jindal, P., Singh, B.: Analyzing the security-performance trade off in block ciphers. In: International Conference on Computing, Communication and Automation (ICCCA 2015). IEEE (2015). ISBN 978-1-4799-8890-7/15Google Scholar
  3. 3.
    Aggarwal, K.: Comparison of RC6, modified RC6 & enhancement of RC6. In: International Conference on Advances in Computer Engineering and Applications (ICACEA), IMS Engineering College, Ghaziabad, India. IEEE (2015). ISBN 978-1-4673-6911-4/15Google Scholar
  4. 4.
    Sritha, P., Ashokkumar, R., Bhuvaneswari, S., Vidhya, M.: A new modified RC6 algorithm for cryptographic applications. Int. J. Adv. Res. Comput. Commun. Eng. 3(12), (2014). ISSN (Online) 2278-1021, ISSN (Print) 2319-5940Google Scholar
  5. 5.
    Sagar Babu, P., Srinivasa Kumar, Ch.: An effective performance evaluation of Rc6, Blowfish, DES algorithms. Int. J. Res. Sci. Adv. Eng. (IJRSAE) 2(7) (2014). ISSN 2319–6106Google Scholar
  6. 6.
    Ebrahim, M., Khan, S., Khalid, U.B.: Symmetric algorithm survey: a comparative analysis. Int. J. Comput. Appl. 61, 0975–8887 (2013)Google Scholar
  7. 7.
    Verma, H.K., Singh, R.K.: Enhancement of RC6 block cipher algorithm and comparison with RC5 & RC6. In: 3rd IEEE International Advance Computing Conference (IACC), ISSN 978-1-4673-4529-3/12. IEEE (2012)Google Scholar
  8. 8.
    Ramdeo, N.: Evaluation of data encryption algorithms. Int. J. Sci. Eng. Res. 3(9), (2012). ISSN 2229-5518Google Scholar
  9. 9.
    Yawale, R.R., Rode, S.V.: Analysis of RC6 symmetric encryption algorithm. Int. J. Adv. Res. Comput. Sci. 2, (2011). ISSN 0976-5697Google Scholar
  10. 10.
    Monger, M.: RC6: The Simple Cipher. CS-627-0001: Cryptography (2004)Google Scholar
  11. 11.
    Robshaw, M.J.B.: RC6 and the AES. Licensing terms for RC6 can be obtained by contacting RSA Security directly, 9 January 2001Google Scholar
  12. 12.
    Dworkin, M.: Cipher Modes of Operation Methods and Techniques. NIST Special Publication 800-38A Recommendation for Block. Edition (2001)Google Scholar
  13. 13.
    Rivest, R.L., Robshaw, M.J.B., Sidney, R., Yin, Y.L.: The RC6TM Block Cipher. Version 1.1, 20 August 1998Google Scholar
  14. 14.
    Chakraborty, D., Rodriguez-Henriquez, F.: Block Cipher Modes of Operation from a Hardware Implementation PerspectiveGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringJodhpur Institute of Engineering and TechnologyJodhpurIndia

Personalised recommendations