Computer
Samara Mohammed Radhi; Raheem Ogla
Abstract
Securing information is difficult in the modern internet era, asterabytes of data are generated daily online and online transactions occurvirtually every second. The current world's information security relies heavily oncryptography, which makes the internet a safer environment. Making informationincoherent ...
Read More ...
Securing information is difficult in the modern internet era, asterabytes of data are generated daily online and online transactions occurvirtually every second. The current world's information security relies heavily oncryptography, which makes the internet a safer environment. Making informationincoherent to an unauthorized person is done through the use of cryptography.Providing legitimate users with confidentiality as a result. There are a widevariety of cryptographic algorithms suitable for this purpose. An idealcryptography method would allow the user to do their job without breaking thebank. Unfortunately, there is no magic formula that can address everyissue.Several algorithms balance cost and performance. A banking applicationneeds robust security at a high cost, while a gaming software that sends userpatterns for analytics cares more about speed and cost. Thus, choosing theappropriate encryption technique for the user. This study offers importantinsights in the process of selecting cryptographic algorithms in terms of eachalgorithm's strengths, weaknesses, cost, and performance . In order todemonstrate an entire performance analysis in this article, as opposed to justtheoretical comparisons, this research developed and thoroughly examined thecost and performance of commonly used cryptographic algorithms, includingDES, 3DES, AES, RSA, and blowfish. According to the findings, blowfishrequires the smallest amount of time to decrypt files of various sizes (25K, 50K,1M, 2M, 3M, and 4M), and it also consumes the smallest amount of memory. Thismakes it approximately three times faster than other cryptographic algorithms.