Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Theory and Algorithms

Institute of Business Administration

Cryptography algorithms

Articles 1 - 1 of 1

Full-Text Articles in Databases and Information Systems

A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed Aug 2005

A Performance Comparison Of Data Encryption Algorithms, Aamer Nadeem, Dr. M. Younus Javed

International Conference on Information and Communication Technologies

The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all practical applications, performance and the cost of implementation are also important concerns. A data encryption algorithm would not be of much use if it is secure enough but slow in performance because it is a common practice to embed encryption algorithms in other applications such as e-commerce, banking, and online transaction processing applications. Embedding of encryption algorithms in other applications also precludes a hardware implementation, and is thus a major cause of degraded overall performance of the system. In this paper, …