Comparative Study of Symmetric Key Cryptographic Algorithms CAST, IDEA, RC, Camellia and SAFER

Authors

  • Dr. Harshala B. Pethe  Dr. Ambedkar College, Deekshabhoomi Nagpur, Maharashtra, India
  • Dr. Manish T. Wanjari  SSESA's, Science College, Congress Nagar, Nagpur, Maharashtra, India

Keywords:

Symmetric key cryptography, CAST, IDEA, RC, Camellia and SAFER

Abstract

Information security plays very important role in storing and transmitting the data through unsecured channel. In the network security, cryptography plays vital role to maintain the CIA triad that is Confidentiality, Integrity, Authentication and non-repudiation of information. Therefore the security of information is much important in data storage and transmission process. Cryptography also ensures that the message should be sent without any change and only the intended authorized person can be able to read the message. There are various cryptographic techniques developed for achieving secure communication. Using cryptography, the data is encoded before sending it and decoded after receiving, Cryptographic algorithms are broadly divided into two types, symmetric key and asymmetric key cryptographic algorithms. This paper deals with the comparative study of various symmetric key cryptographic algorithms CAST, IDEA, RC, Camellia and SAFER.

References

  1. William Stalling “Cryptography and network security” Pearson education, 2nd Edition.
  2. H B. Pethe, Dr. S. R. Pande “Implementation of Advanced Encryption Standard Algorithm” International Journal of Computer Science and Information Technologies, Vol. 7 (4) , 2016, 1868-1871.
  3. Rishabh Jain, Rahul Jejurkar, Shrikrishna Chopade, Someshwar Vaidya, Mahesh Sanap “AES Algorithm Using 512 Bit Key Implementation for Secure Communication” International Journal of Innovative Research in Computer and Communication Engineering Vol. 2, Issue 3, March 2014 ISSN(Online): 2320-9801 ISSN (Print): 2320-9798
  4. Sandipan Basu, "INTERNATIONAL DATA ENCRYPTION ALGORITHM (IDEA) – A TYPICAL ILLUSTRATION" Journal of Global Research in Computer Science Volume 2, No. 7, July 2011 ISSN: 2229-371X.
  5. Harivans Pratap Singh et al, "Secure-International Data Encryption Algorithm" International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 2, February 2013 ISSN (Print) : 2320 – 3765 ISSN (Online) : 2278 – 8875.
  6. Snehal Patil et al, "An Enhancement In International Data Encryption Algorithm For Increasing Security" International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 3, Issue 8, August 2014 ISSN 2319 - 4847.
  7. Sheetal Charbathia and Sandeep Sharma, "A Comparative Study of Rivest Cipher Algorithms" International Journal of Information & Computation Technology.ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1831-1838.
  8. MILIND MATHUR, AYUSH KESARWANI, "COMPARISON BETWEEN DES , 3DES , RC2 , RC6 , BLOWFISH AND AES" Proceedings of National Conference on New Horizons in IT - NCNHIT 2013.
  9. Allam Mousa et al, "Evaluation of the RC4 Algorithm for Data Encryption" International journal of Computer Science and Applications, Volume 3, No 2, June 2006.
  10. P. Prasithsangaree, P. Krishnamurthy, "Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs" GLOBECOM 2003.
  11. Vikas Tyagi, Shrinivas Singh, "ENHANCEMENT OF RC6 (RC6_EN) BLOCK CIPHER ALGORITHM AND COMPARISON WITH RC5 & RC6" Journal of Global Research in Computer Science Volume 3, No. 4, April 2012 ISSN:2229-371X.
  12. P.Sritha1, R.Ashokkumar et al, "A new modified RC6 algorithm for cryptographic applications" International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 12, December 2014 ISSN (Online) : 2278-1021 ISSN (Print) : 2319-5940.
  13. T. Shimoyama, K. Takeuchi and J. Hayakawa, “Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6”, 3rd AES Conference, (2004).
  14. Rashmi, Vicky Chawla et al, "The RC7 Encryption Algorithm" International Journal of Security and Its Applications Vol. 9, No. 5 (2015), pp. 55-60.
  15. James L. Massey , "SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm" Reprinted from Fast Software Encryption (Ed. R. Anderson), Lecture Notes in Computer Science No. 809. New York: Springer, 1994, pp. 1-17.

Downloads

Published

2019-03-11

Issue

Section

Research Articles

How to Cite

[1]
Dr. Harshala B. Pethe, Dr. Manish T. Wanjari, " Comparative Study of Symmetric Key Cryptographic Algorithms CAST, IDEA, RC, Camellia and SAFER, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 4, pp.117-122, March-April-2019.