You are on page 1of 1

Comparative Study of Different Cryptographic Algorithms

Author: Mr. Sandeep Tayal

Mr. Ashish Sharma

Ankit Sharma Sagar Tyagi

Algorithms Year Key Size No. of Power Avalanche Effect Known


of Lengt of rounds Consumption Attacks
use h Block
DES 1977 56-bits 64- 16 Low Less than AES Brute Force
bits Attack
AES 2000 128- 128- 10(128- Low Faster Brute Force
bit, bits bits), encryption/decryption Attack,
192-bit 12(192- less than des Chosen
or 256- bits),14(256 Plaintext,
bit key -bits) Known
Plaintext
3DES 1978 168- 64- 48 Low Medium Chosen
bit, bits Compared to Plaintext
112-bit des, aes, Attack
or 56- blowfish and
bit rsa
BLOWFISH 1993 32-Bits 64- 16 high Fastest, Except when
Up to Bit changing keys.
448-
Bits
RSA 1977 >1024- Min No Rounds Very high Slower Encryption Factoring the
Bits 512- Decryption public key
Bits
(01214802716) (08614802716)

DEPARTMENT OF COMPUTER SCIENCE, MAHARAJA AGRASEN INSTITUTE OF TECH., DELHI

ABSTRACT: Data Security is the main concern in today’s era. Private data needs to be
secured so that it cannot be stealed by other intruder. The channel through which the data is
transferred is of more concerned than the quantity of data. Encryption of data is converting plain
text to ciphered text. The cipher text is in unreadable form. In this review paper, we briefly
discussed about the different symmetric and asymmetric cryptographic algorithms for encryption
and decryption like DES, AES, 3 DES, BLOWFISH, RSA. We basically compared the different
algorithms on different parameters like Power Consumption, Key size etc. We try to tell about
the best algorithms in different situations.

You might also like