Subject Review: Comparison Between 3DES, AES and HiSea Algorithms
DOI:
https://doi.org/10.32628/IJSRSET196625Keywords:
Symmetric Algorithms, Secret Key, Triple DES, AES, HiSeaAbstract
Security is one of the main sources of information protection, especially sensitive information that is transmitted over the Internet. Encryption is one of the most important elements used, which is an effective and necessary element to provide high-level security communication between different entities by transmitting unclear and encrypted information that does not allow unauthorized person to access, the method of choosing the appropriate and correct encryption algorithm is important to provide a secure connection that provides a more efficient and accurate encryption system. In this paper, we will review the algorithms (Triple DES, AES & HiSea) for secret key encryption that are most commonly used for this type of encryption.
References
- D Paul Joseph , M Krishna& K Arun ,( 2015). “Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms”, International Journal of Advanced Research in Computer Science, Volume 6, No. 3, (Special Issue).
- Ali M Alshahrani1 and Prof. Stuart Walker ,( 2014). “IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM”, International Journal on Cryptography and Information Security (IJCIS), Vol. 4, No. 4.
- E. Kalai Kavitha, (2012). “Performance Evaluation of Cryptographic Algorithms: AES and DES for Implementation of Secured Customer Relationship Management (CRM) System”, IOSR Journal of Computer Engineering (IOSRJCE) ,ISSN: 2278-0661, Volume 7, Issue 4, PP 01-07 www.iosrjournals.org
- M. S. Premalatha, B. Ramakrishnan,( 2019). “TDWOA: Effective Triple DES with Whale Optimization Algorithm for Trust Based Offloading System”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8 Issue-4.
- Mohit Marwaha, Rajeev Bedi, *Amritpal Singh, and Tejinder Singh , (2013). “COMPARATIVE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS”, Singh et al., International Journal of Advanced Engineering Technology, July-Sept,pp.16-18.
- Singh, G, (2013).“A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”, International Journal of Computer Applications, Vol. 67, No. 19.
- Singh, M. G., Singla, M. A., & Sandha, M. K, (2011).”Cryptography Algorithm Comparison for Security Enhancement in Wireless Intrusion Detection System”, International Journal of Multidisciplinary Research, Vol. 1, No. 4, pp.143-151.
- Mandal, A. K., Parakash, C., & Tiwari, A. (2012). “Performance evaluation of cryptographic algorithms: DES and AES”, 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science. doi:10.1109/sceecs.2012.6184991.
- Omar G. Abood, Shawkat K. Guirguis ,( 2018). “A Survey on Cryptography Algorithms”, International Journal of Scientific and Research Publications, Volume 8, Issue 7. DOI: 10.29322/IJSRP.8.7.2018.p7978.
- S. Jamel, T. Herawan, and M. M. Deris,( 2010). “A cryptographic algorithm based on hybrid cubes,” Computational Science and Its Applications ICCSA, vol. 6019, pp. 175–187.
- S. Jamel, M. M. Deris, I. Tri, R. Yanto, and T. Herawan,( 2011). “HiSea: A non binary toy cipher,” Journal of Computing, vol. 3, no. 6, pp. 20–27.
- M. F. Mushtaq, S. Jamel, and M. M. Deris,( 2017). “Triangular Coordinate Extraction (TCE) for hybrid cubes,” Journal of Engineering and Applied Sciences, vol. 12, no. 8, pp. 2164–2169.
- Muhammad Faheem Mushtaq, Sapiee Jamel, Abdulkadir Hassan Disina, Zahraddeen A. Pindar, Nur Shafinaz Ahmad Shakir, and Mustafa Mat Deris, (2017). “ A Survey on the Cryptographic Encryption Algorithms”, (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 8, No. 11.
- S. Jamel, M. M. Deris, I. T. R. Yanto, and T. Herawan,( 2011).“The hybrid cubes encryption algorithm (HiSea),” Communications in Computer and Information Science, Springer-Verlag Berlin Heidelberg, vol. 154, pp. 191–200.
- M. F. Mushtaq, S. Jamel, K. M. Mohamad, S. A. A. Khalid, and M. M. Deris,( 2017).“Key generation technique based on triangular coordinate extraction for hybrid cubes,”Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. 9, no. 3-4, pp. 195-200.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.