Explore chapters and articles related to this topic
Security algorithms for secure cloud environment
Published in Muhammad Imran Tariq, Valentina Emilia Balas, Shahzadi Tayyaba, Security and Privacy Trends in Cloud Computing and Big Data, 2022
Maryam Saleem, Maryam Rasheed, Muhammad Imran Tariq, Shahzadi Tayyaba, Muhammad Arfan Jaffar
Table 7.1 shows a detailed comparison between different security algorithms. And the comparison resulted that the AES algorithm is the best algorithm. AES consumes less time for the encryption process. It is too much of a secure algorithm. It is the best algorithm in terms of speed and performance. No attack is found against it. It is a very flexible algorithm, and nowadays it is commonly used in many applications just because of its outstanding security. DES is less securable than AES algorithm. And it is slower than AES algorithm. Its security can be easily broken by attackers if the weak key is used in it. 3DES algorithm provides more security on data as compared with DES but 3DES has slower speed than DES algorithm. Its security is not good as compared to AES algorithm because 3DES consumes too much time for encryption. RSA takes more time and more memory for the execution of data and it is less securable than AES algorithm. BLOWFISH is also a very securable algorithm like as AES algorithm. Diffie-Hellman is less securable than RSA algorithm. It is not too much used. Each algorithm has its own importance and is suitable for many applications. According to the brief literature survey and a comparison study, it shows that AES and BLOWFISH algorithms are the best algorithms in speed and performance. But AES is the best algorithm as compared to other algorithms [32,33].
Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment
Published in IETE Journal of Research, 2021
The key sensitivity test for the encryption algorithms is done by changing a single bit in the key and evaluating the changes in the cipher images. The key sensitivity test reveals that the key for DES is very weak compared to other algorithms. It can be cracked easily. And also it may be affected by the brute force attack because of its weak key. The algorithm RC4 may be attacked because of its weak key scheduling.