Proceedings of the International Conference on Sustainability Innovation in Computing and Engineering (ICSICE 2024)

Performance Analysis of Various Cryptographic Algorithms

Authors
Sahil Kumar1, *, Sanjeev Kumar1, Seema Rani1, Monika Verma1
1Department of CSE, Guru Jambheshwar University of Science and Technology, Hisar, 125001, Haryana, India
*Corresponding author. Email: sahilkalia1999@gmail.com
Corresponding Author
Sahil Kumar
Available Online 23 May 2025.
DOI
10.2991/978-94-6463-718-2_141How to use a DOI?
Keywords
Cloud computing; Cryptography; Security; 3DES; RSA; FHE; ElGamal
Abstract

The rapid growth of digital technologies has amplified the importance of robust cryptographic systems. As the backbone behind the protection of sensitive data in banking, e-commerce, and secure communications, these algorithms are crucial. This paper compares widely used cryptographic algorithms based on their performance and security. The purpose of cryptography is to encode information and uphold various security principles, including confidentiality, integrity of data, authentication, authorization, and non-repudiation. The study focuses on symmetric algorithms like 3DES, asymmetric algorithms such as RSA, and ElGamal, and the emerging Fully Homomorphic Encryption (FHE) scheme. The methodology involves an exploratory research design, simulating the algorithms using Java programming and the CloudSim toolkit. Evaluation parameters include encryption time, decryption time, level of security, and flexibility. Experimental results show that RSA outperforms 3DES, ElGamal, and FHE in terms of encryption and decryption time. RSA’s asymmetric nature and enhanced security make it a preferred choice. The study concludes that asymmetric algorithms are superior in security, and efficient cryptosystems. Future research directions include testing the algorithms on image and audio data and comparing them with other existing cryptographic algorithms.

Copyright
© 2025 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the International Conference on Sustainability Innovation in Computing and Engineering (ICSICE 2024)
Series
Advances in Computer Science Research
Publication Date
23 May 2025
ISBN
978-94-6463-718-2
ISSN
2352-538X
DOI
10.2991/978-94-6463-718-2_141How to use a DOI?
Copyright
© 2025 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Sahil Kumar
AU  - Sanjeev Kumar
AU  - Seema Rani
AU  - Monika Verma
PY  - 2025
DA  - 2025/05/23
TI  - Performance Analysis of Various Cryptographic Algorithms
BT  - Proceedings of the International Conference on Sustainability Innovation in Computing and Engineering (ICSICE 2024)
PB  - Atlantis Press
SP  - 1697
EP  - 1708
SN  - 2352-538X
UR  - https://doi.org/10.2991/978-94-6463-718-2_141
DO  - 10.2991/978-94-6463-718-2_141
ID  - Kumar2025
ER  -