![]()
Certificate: View Certificate
Published Paper PDF: PDF
Diya Jutt
Independent Researcher
India
Abstract
This paper presents a comparative study of symmetric and asymmetric cryptographic algorithms available up to 2014. Symmetric algorithms considered include Data Encryption Standard (DES), Triple DES (3DES), Advanced Encryption Standard (AES), and RC4; asymmetric algorithms include Rivest–Shamir–Adleman (RSA), Elliptic Curve Cryptography (ECC), and Diffie–Hellman (DH). The study evaluates performance in terms of encryption/decryption speed, key management complexity, and security strength under comparable key sizes. A methodology combining analytical evaluation, statistical performance analysis, and simulation in MATLAB is employed. Five research objectives guide the investigation: (1) quantify throughput of each algorithm under varying data sizes; (2) assess computational overhead; (3) evaluate security margin against known attacks up to 2014; (4) analyze key management complexity; (5) recommend algorithm selection based on application scenario. Statistical analysis of execution times is presented in tabular form. Simulation research uses synthetic datasets to model encryption/decryption processes, and results demonstrate trade-offs between speed and security. Conclusions include guidelines for selecting optimal cryptosystems for resource-constrained vs. high-security applications. Ten references from literature up to 2014 are provided.
Keywords
Symmetric cryptography; asymmetric cryptography; performance analysis; security evaluation; MATLAB simulation
References
- Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
- Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.
- Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203–209.
- Miller, V. S. (1985). Use of elliptic curves in cryptography. In Advances in Cryptology—CRYPTO ’85 (pp. 417–426). Springer.
- Stallings, W. (2011). Cryptography and Network Security: Principles and Practice (5th ed.). Pearson.
- Schneier, B. (1996). Applied Cryptography (2nd ed.). John Wiley & Sons.
- Law, Y. W., & Lee, P. P. C. (2003). An efficient secure XOR scheme for wireless sensor networks. International Conference on Embedded and Ubiquitous Computing, 390–399.
- Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to Elliptic Curve Cryptography. Springer.
- Morris, R. (2013). Predicting the demise of RC4 in TLS. Cryptology ePrint Archive, Report 2013/452.
- National Institute of Standards and Technology (NIST). (2001). Advanced Encryption Standard (AES). FIPS PUB 197.