Subject Review: Comparison Between 3DES, AES and HiSea Algorithms

Authors

  • Shaimaa Khudhair Salah  Department of Computer Science, Collage of Education, University of Mustansiriyah, Baghdad, Iraq
  • Waleed Rasheed Humood  Department of Computer Science, Collage of Education, University of Mustansiriyah, Baghdad, Iraq
  • Ahmed Othman Khalaf  Department of Computer Science, Collage of Education, University of Mustansiriyah, Baghdad, Iraq
  • Zainab Khyioon Abdalrdha  Department of Computer Science, Collage of Education, University of Mustansiriyah, Baghdad, Iraq

DOI:

https://doi.org//10.32628/IJSRSET196625

Keywords:

Symmetric Algorithms, Secret Key, Triple DES, AES, HiSea

Abstract

Security is one of the main sources of information protection, especially sensitive information that is transmitted over the Internet. Encryption is one of the most important elements used, which is an effective and necessary element to provide high-level security communication between different entities by transmitting unclear and encrypted information that does not allow unauthorized person to access, the method of choosing the appropriate and correct encryption algorithm is important to provide a secure connection that provides a more efficient and accurate encryption system. In this paper, we will review the algorithms (Triple DES, AES & HiSea) for secret key encryption that are most commonly used for this type of encryption.

References

  1. D Paul Joseph , M Krishna& K Arun ,( 2015). “Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms”, International Journal of Advanced Research in Computer Science, Volume 6, No. 3, (Special Issue).
  2. Ali M Alshahrani1 and Prof. Stuart Walker ,( 2014). “IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM”, International Journal on Cryptography and Information Security (IJCIS), Vol. 4, No. 4.
  3. E. Kalai Kavitha, (2012). “Performance Evaluation of Cryptographic Algorithms: AES and DES for Implementation of Secured Customer Relationship Management (CRM) System”, IOSR Journal of Computer Engineering (IOSRJCE) ,ISSN: 2278-0661, Volume 7, Issue 4, PP 01-07 www.iosrjournals.org
  4. M. S. Premalatha, B. Ramakrishnan,( 2019). “TDWOA: Effective Triple DES with Whale Optimization Algorithm for Trust Based Offloading System”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8 Issue-4.
  5. Mohit Marwaha, Rajeev Bedi, *Amritpal Singh, and Tejinder Singh , (2013). “COMPARATIVE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS”, Singh et al., International Journal of Advanced Engineering Technology, July-Sept,pp.16-18.
  6. Singh, G, (2013).“A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”, International Journal of Computer Applications, Vol. 67, No. 19.
  7. Singh, M. G., Singla, M. A., & Sandha, M. K, (2011).”Cryptography Algorithm Comparison for Security Enhancement in Wireless Intrusion Detection System”, International Journal of Multidisciplinary Research, Vol. 1, No. 4, pp.143-151.
  8. Mandal, A. K., Parakash, C., & Tiwari, A. (2012). “Performance evaluation of cryptographic algorithms: DES and AES”, 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science. doi:10.1109/sceecs.2012.6184991.
  9. Omar G. Abood, Shawkat K. Guirguis ,( 2018). “A Survey on Cryptography Algorithms”, International Journal of Scientific and Research Publications, Volume 8, Issue 7. DOI: 10.29322/IJSRP.8.7.2018.p7978.
  10. S. Jamel, T. Herawan, and M. M. Deris,( 2010). “A cryptographic algorithm based on hybrid cubes,” Computational Science and Its Applications ICCSA, vol. 6019, pp. 175–187.
  11. S. Jamel, M. M. Deris, I. Tri, R. Yanto, and T. Herawan,( 2011). “HiSea: A non binary toy cipher,” Journal of Computing, vol. 3, no. 6, pp. 20–27.
  12. M. F. Mushtaq, S. Jamel, and M. M. Deris,( 2017). “Triangular Coordinate Extraction (TCE) for hybrid cubes,” Journal of Engineering and Applied Sciences, vol. 12, no. 8, pp. 2164–2169.
  13. Muhammad Faheem Mushtaq, Sapiee Jamel, Abdulkadir Hassan Disina, Zahraddeen A. Pindar, Nur Shafinaz Ahmad Shakir, and Mustafa Mat Deris, (2017). “ A Survey on the Cryptographic Encryption Algorithms”, (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 8, No. 11.
  14. S. Jamel, M. M. Deris, I. T. R. Yanto, and T. Herawan,( 2011).“The hybrid cubes encryption algorithm (HiSea),” Communications in Computer and Information Science, Springer-Verlag Berlin Heidelberg, vol. 154, pp. 191–200.
  15. M. F. Mushtaq, S. Jamel, K. M. Mohamad, S. A. A. Khalid, and M. M. Deris,( 2017).“Key generation technique based on triangular coordinate extraction for hybrid cubes,”Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. 9, no. 3-4, pp. 195-200.

Downloads

Published

2019-12-30

Issue

Section

Research Articles

How to Cite

[1]
Shaimaa Khudhair Salah, Waleed Rasheed Humood, Ahmed Othman Khalaf, Zainab Khyioon Abdalrdha, " Subject Review: Comparison Between 3DES, AES and HiSea Algorithms , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 6, Issue 6, pp.97-103, November-December-2019. Available at doi : https://doi.org/10.32628/IJSRSET196625