Comparative Analysis of Cryptographic Algorithms

Zoran Hercigonja


Cyber security ensures a secure information exchange and enables communication through the Internet. The data needs to be protected from unauthorized access and transmitted to the intended receiver with confidentiality and integrity. Cryptography enhances security by encrypting and decrypting raw data in a secured network. Many cryptographic algorithms are available, and they fall under either symmetric or asymmetric techniques. To choose an algorithm for secure data communication, the candidate algorithm should provide higher accuracy, security and efficiency. This paper presents the implementation limitations of existing cryptographic algorithms such as DES, 3DES, CAST-128, BLOWFISH, IDEA, AES, and RC6 of symmetric techniques and RSA of asymmetric techniques. This paper also analyzes parameters like key exchange, flexibility and security issues of the algorithms which determines the efficiency of the cryptosystem.


cryptography, symmetric, asymmetric, architecture, security, limitations, DES, 3DES, CAST-128, BLOWFISH, IDEA, AES, RC6, RSA

Full Text: PDF


  • There are currently no refbacks.