Asian Journal of Information Technology

Year: 2017
Volume: 16
Issue: 1
Page No. 125 - 130

Performance Analysis of Various Encryption Techniques in Communication Network

Authors : Elvis Ximenes, Kheng Cher Yeo, Sami Azam and Bharanidharan Shanmugam

References

Aggarwal, K., J.K. Saini and H.K. Verma, 2013. Performance evaluation of rc6, blowfish, des, idea, cast-128 block ciphers. Intl. J. Comput. Appl., 68: 10-16.
Direct Link  |  

Botta, A., A. Dainotti and A. Pescape, 2012. A tool for the generation of realistic network workload for emerging networking scenarios. Comput. Netw., 56: 3531-3547.
Direct Link  |  

Daemen, J. and V. Rijmen, 2013. The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, Berlin, Germany, ISBN:978-3-642-07646-6, Pages: 237.

Doraswamy, N. and D. Harkins, 2003. IPSec: The New Security Standard for the Internet, Intranets and Virtual Private Networks. 2nd Edn., Prentice Hall, Upper Saddle River, New Jersey, ISBN:0-13-046189X, Pages: 139.

FIPS., 1999. Data Encryptions Standard (DES). National Institute of Standards and Technology, Gaithersburg, Maryland.

Frankel, S., 2011. Demistifying the IPsec Puzzle. Artech House, Norwood, Massachusetts,.

Hattingh, C. and T. Szigeti, 2004. End-to-End Qos Network Design: Quality of Service in Lans WANs and VPNs. 1st Edn., Cisco Press, Indianapolis, Indiana,.

Kumar, A., S. Sinha and R. Chaudhary, 2013. A comparative analysis of encryption algorithms for better utilization. Intl. J. Comput. Appl., 71: 19-23.
Direct Link  |  

Kumar, V.H. and S.R. Kumar, 2012. Performance analysis of rc6, twofish and RIJNDAEL block cipher algorithms. Intl. J. Comput. Appl., 42: 1-7.
Direct Link  |  

Malik, R. and R. Syal, 2010. Performance analysis of IP security VPN. Intl. J. Comput. Appl., 8: 5-9.
Direct Link  |  

Rogaway, P. and D. Coppersmith, 1998. A software-optimized encryption algorithm. J. Cryptology, 11: 273-287.
CrossRef  |  Direct Link  |  

Saxena, P. and S. Shibhu, 2013. Performance analysis of best and njjsaa. Intl. J. Comput. Appl., 72: 33-37.
Direct Link  |  

Schneier, B. and D. Whiting, 1997. Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor. Proceedings of the International Workshop on Fast Software Encryption, January 20-22, 1997, Springer, Berlin, Germany, ISBN:978-3-540-63247-4, pp: 242-259.

Sharif, S.O. and S.P. Mansoor, 2010. Performance analysis of stream and block cipher algorithms. Proceedings of the 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), August 20-22, 2010, IEEE, Bangor, Maine, ISBN:978-1-4244-6539-2, pp: V1-522-V1-525.

Sharma, V. and M. Kalra, 2009. Performance analysis and enhancement in IPSEC VPN to reduce connection establishment overhead and transmission delay: Part 1. Intl. J. Adv. Sci. Technol., 8: 422-430.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved