Abstract
Cloud computing environment is adopted by a large number of organizations, so the rapid transition toward the cloud has fueled concerns on security perspective. Encryption algorithms play the main role in solving such kind of problems in the cloud computing environment. The problem with these encryption algorithms is that they consume a substantial amount of CPU time, memory, and other resources. This paper provides the performance comparison of seven popular symmetric algorithms: AES, DES, 3DES, Blowfish, RC4, IDEA, and TEA. This comparison is done on the basis of encryption time, decryption time, memory usage, flexibility, security, and scalability. The results achieved can be used in cloud-based application and services for the efficient working of cloud computing environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Meyer, C.H.: Cryptography-a state of the art review. In: CompEuro’89., VLSI and Computer Peripherals. VLSI and Microelectronic Applications in Intelligent Peripherals and their Interconnection Networks’, Proceedings. IEEE (1989)
Krutz, R.L., Dean Vines, R.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Publishing (2010)
Ruangchaijatupon, N., Krishnamurthy, P.: Encryption and Power Consumption in Wireless LANs-N. In: The Third IEEE Workshop on Wireless LANS (2001)
Hirani, S.: Energy Consumption of Encryption Schemes in Wireless Devices Thesis, University of Pittsburgh, April 9, 2003. Accessed 1 Oct 2008
Thakur, J., Kumar, N.: DES, AES and blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg. Technol. Adv. Eng. 1(2), 6–12 (2011)
Penchalaiah, N., Seshadri, R.: Effective comparison and evaluation of DES and Rijndael Algorithm (AES). Int. J. Comput. Sci. Eng. 2(05), 1641–1645 (2010)
Elminaam, D.S.A., Abdual-Kader, H.M., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. IJ Netw. Secur. 10(3), 216–222 (2010)
Mushtaque, M.A.: Comparative analysis on different parameters of encryption algorithms for information security. JCSE Int. J. Comput. Sci. 2(4) (2014)
Ebrahim, M., Khan, S., Khalid, U.B.: Symmetric algorithm survey: a comparative analysis. arXiv:1405.0398 (2014)
Schneier, B.: The Blowfish Encryption Algorithm-One-Year Later, p. 137 (1995)
Singh, S.P., Maini, R.: Comparison of data encryption algorithms. Int. J. Comput. Sci. Commun. 2(1), 125–127 (2011)
Standard, Data Encryption.: Federal information processing standards publication 46. National Bureau of Standards, US Department of Commerce (1977)
Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson Education India (2006)
Lai, X., Massey, J.L.: A proposal for a new block encryption standard. In: Workshop on the Theory and Application of Cryptographic Techniques. Springer, Heidelberg (1990)
Elbaz, L., Bar-El, H.: Strength Assessment of Encryption Algorithms. White paper (2000)
Forouzan, B.A., Mukhopadhyay, D.: Cryptography and Network Security (Sie). McGraw-Hill Education (2011)
Xie, H., Zhou, L., Bhuyan, L.: Architectural analysis of cryptographic applications for network processors. In: Proceedings of the IEEE First Workshop on Network Processors with HPCA-8 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wani, A.R., Rana, Q.P., Pandey, N. (2019). Performance Evaluation and Analysis of Advanced Symmetric Key Cryptographic Algorithms for Cloud Computing Security. In: Ray, K., Sharma, T., Rawat, S., Saini, R., Bandyopadhyay, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 742. Springer, Singapore. https://doi.org/10.1007/978-981-13-0589-4_24
Download citation
DOI: https://doi.org/10.1007/978-981-13-0589-4_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0588-7
Online ISBN: 978-981-13-0589-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)