II INTERNATIONAL SCIENTIFIC CONFERENCE OF YOUNG RESEARCHERS
596
Qafqaz University
18-19 April 2014, Baku, Azerbaijan
and we cannot choose best ones. It depends on the situations; they all have advantages and disadvantages. Let’s look some
characteristics of several cryptographic algorithms.
-
Data Encryption Standard (DES) algorithm
DES is one of the most known cryptographic algorithms in last 30 years. This algorithm is an efficient one and easy to
understand. Here, efficiency of DES is its less time and memory requirements during its execution. The cryptographic key
length is 56 bits. This fact is one detriment for DES.
-
Blowfish algorithm
Blowfish algorithm is designed for large microprocessors. It is a compact and fast algorithm which means time and
memory complexity is enough for execution. The secret key length is variable between 32 bits and 448 bits. This is an
advantage of Blowfish over DES. But the key strength of Blowfish algorithm is low.
-
Advanced Encryption Standard (AES) algorithm
This algorithm is more secure and developed form of DES algorithm. It is like a modern cryptographic algorithm. The
key length can be 128, 192 or 256 bits. This attribute makes it more secure than DES algorithm. One more thing, AES is
unbreakable compared to other algorithms.
-
Ron’s Code 2 (RC2) algorithm
RC2 algorithm is designed for RSA Data Security. The algorithm takes variable-length cryptographic key as an input
parameter. It is not fast cipher however is three times faster than DES.
-
CAST (Carlisle Adams and Stafford Tavares) algorithm
CAST was designed in Canada and the algorithm was created in 1996. It has secret key with length 64 bits. Based on
this, that is not so secure one, however brute force one and only method to break it.
Reality says that most of dependency of security relates to the key length and strength. There are still different kinds of
methods and attacks to break cipher text. Now I want to show and explain main properties for good cryptographic
algorithms.
Security: The algorithm must be secured as much as possible.
Secret key: The length and strength of the key must obey to cryptographic key standards. The key should be in
variable-length. Because knowing the length of the secret key is a hint for attackers.
Reliability: The algorithm must be validated and verified.
Efficiency: The algorithm must work fast and use less memory (Time and Memory complexity concepts).
Understandability: The algorithm must be well designed and easy to understand.
Implement ability: The implementation of cryptographic algorithm must be economic implementation.
Availability: Every user must have permission to use the algorithms.
All of features mentioned above are top for cryptographic algorithms. Anyone who wants to discover or find an
algorithm for cryptography must take into consideration of all those concepts.
Dostları ilə paylaş: |