Performance Analysis of Various Cryptographic Algorithms
- DOI
- 10.2991/978-94-6463-718-2_141How to use a DOI?
- Keywords
- Cloud computing; Cryptography; Security; 3DES; RSA; FHE; ElGamal
- Abstract
The rapid growth of digital technologies has amplified the importance of robust cryptographic systems. As the backbone behind the protection of sensitive data in banking, e-commerce, and secure communications, these algorithms are crucial. This paper compares widely used cryptographic algorithms based on their performance and security. The purpose of cryptography is to encode information and uphold various security principles, including confidentiality, integrity of data, authentication, authorization, and non-repudiation. The study focuses on symmetric algorithms like 3DES, asymmetric algorithms such as RSA, and ElGamal, and the emerging Fully Homomorphic Encryption (FHE) scheme. The methodology involves an exploratory research design, simulating the algorithms using Java programming and the CloudSim toolkit. Evaluation parameters include encryption time, decryption time, level of security, and flexibility. Experimental results show that RSA outperforms 3DES, ElGamal, and FHE in terms of encryption and decryption time. RSA’s asymmetric nature and enhanced security make it a preferred choice. The study concludes that asymmetric algorithms are superior in security, and efficient cryptosystems. Future research directions include testing the algorithms on image and audio data and comparing them with other existing cryptographic algorithms.
- Copyright
- © 2025 The Author(s)
- Open Access
- Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
Cite this article
TY - CONF AU - Sahil Kumar AU - Sanjeev Kumar AU - Seema Rani AU - Monika Verma PY - 2025 DA - 2025/05/23 TI - Performance Analysis of Various Cryptographic Algorithms BT - Proceedings of the International Conference on Sustainability Innovation in Computing and Engineering (ICSICE 2024) PB - Atlantis Press SP - 1697 EP - 1708 SN - 2352-538X UR - https://doi.org/10.2991/978-94-6463-718-2_141 DO - 10.2991/978-94-6463-718-2_141 ID - Kumar2025 ER -