Article
Version 1
Preserved in Portico This version is not peer-reviewed
Comparison of Modern Cryptography Methods
Version 1
: Received: 12 May 2022 / Approved: 26 July 2022 / Online: 26 July 2022 (06:03:09 CEST)
Version 2 : Received: 25 August 2022 / Approved: 26 August 2022 / Online: 26 August 2022 (04:15:24 CEST)
Version 2 : Received: 25 August 2022 / Approved: 26 August 2022 / Online: 26 August 2022 (04:15:24 CEST)
How to cite: Dutta, A. Comparison of Modern Cryptography Methods. Preprints 2022, 2022070389. https://doi.org/10.20944/preprints202207.0389.v1 Dutta, A. Comparison of Modern Cryptography Methods. Preprints 2022, 2022070389. https://doi.org/10.20944/preprints202207.0389.v1
Abstract
In this paper, different cryptography algorithms were reviewed, and their relative merits were discussed. Symmetric and asymmetric cryptography algorithms were compared for time and space efficiencies. These experiments were run to measure the execution time and the memory footprints of various algorithms to understand the implications of their real-life applications. In the experiment performed, it was observed that elliptic curve cryptography was the most efficient in terms of encryption/decryption time, as well as memory usage.
Keywords
cryptography, elgamal, rsa, ecc, blowfish, encryption, decryption
Subject
Computer Science and Mathematics, Computer Vision and Graphics
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment