INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 267    Submit Your Rating     Cite This   Download        Certificate

COMPARATIVE PERFORMANCE EVALUATION OF ENCRYPTION ALGORITHMS AES AND DES

    1 Author(s):  AMANDEEP KAUR SARAO

Vol -  2, Issue- 2 ,         Page(s) : 25 - 37  (2012 ) DOI : https://doi.org/10.32804/RJSET

Abstract

Internet has an important role in information sharing and transmission of message so encryption is very much essential for the transmission of secure data over the wireless communication network. While the data is transmitted the main focus is on the encryption techniques for secure data transmission. Many encryption techniques are used for security of data over the network. Cryptography has come up with many encryption techniques such as encryption algorithms. In this paper, two encryption algorithms Advanced Encryption Standard (AES) and Data Encryption Standard (DES) are implemented using MATLAB software.

  1. Ro, C. W. and Trivedi, K. S., “Performability Analysis of Calls in Personal Communication Networks”, Proc. Sixth International Conference on Computer Communications and Networks (IC3N'97), Las Vegas, Nevada, Sept. 1997.
  2. Murphy, S., “The Advanced Encryption Standard (AES)”Information Security Technical Report, Volume 4, Issue 4, pp: 12-17 , 1999.
  3. Syed, F., “Children of DES: A Look at the Advanced Encryption Standard”
  4. Network Security, Volume 2000, Issue 9, pp: 11-12, September 2000.
  5. Cooke, J.C. and Brewster, R.L., "Cryptographic Security Techniques for Digital Mobile Telephones," Proceedings of the IEEE International Conference on Selected Topics in Wireless Communications, Vancouver, B.C., Canada, 2004. 
  6. Hardjono, ''Security in Wireless LANS And MANS,'' Artech House Publishers 2005.
  7. Raphael, C. W. P. , “Reducing the exhaustive key search of the Data Encryption Standard(DES)Computer Standards & Interfaces”, Volume 29, Issue 5,  Pages 528-530, July 2007.
  8. YanWang, Ming Hu, “Timing Evaluation of known cryptographic Algorithm”, International Conference on Computational Intelligence and security, 2009.
  9. Hamdan.o.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani, “New Comparative Study between DES, 3DES and AES within Nine Factors”, Journal of Computing, Volume 2, Issue 3, ISSN 2151-9617, March 2010, pp. 152-157.
  10. Das Debasis, Misra Rajiv. “Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm”. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011, pp. 204.
  11. Ajay kakkar “Comparison of Various Encryption Algorithms and Techniques for secured Data Communication in Multimode Network”. International Journal of Engineering and Technology, ISSN: 2049-3444, Volume 2 , 2011 – IJET.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details