The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Cryptography is the lynchpin of data security- besides providing message confidentiality it facilitates message integrity, authentication and digital signatures. The design of a secure application is not possible without the use of some encryption and decryption techniques. An important task for cryptographers is the analysis and recommendation of parameters, crucially including key size and thus implying key strength, for cryptographic primitives.

Cryptographic hash functions are important tool in cryptography to achieve certain security goals such as authenticity, digital signature, and digital time stamping and entity authentication. This paper presents an analysis of the speed and the performance of various security algorithms by varying key size and file size. Comparative study is based on symmetric encryption algorithm Data Encryption Standard (DES), asymmetric encryption technique RSA proposed by Rivest, Shamir, and Adelman and the widely used cryptographic hash function Secure Hash algorithm (SHA1).


Keywords

Cryptography, Hashing, RSA, DES, SHA1, Performance Estimates.
User
Notifications
Font Size