突然被同事问到选择什么加密算法合适,虽然结果是答对了,但是还是觉得欠说服力,故找了篇文章补充,不想看长篇大论的直接看对比结果图
转自:http://www.brighthub.com/computing/smb-security/articles/75099.aspx
The need for data encryption arose by the growing concern fo the safety and security of the data. In this article, various data encryption algorithms under comparison are DES (Data Encryption Standard), 3DES (Triple DES), AES (Advanced Encryption Standard) and Blowfish (Best performance).
Introduction
Computer encryption techniques have been divided into 2 categories, Symmetric and Asymmetric encrypting techniques.
In symmetric encryption technique, both sender and receiver use a shared key to encrypt and/or decrypt the data. The only problem with this technique is that if the key is known to others the entire conversation is compromised.
In asymmetric encryption technique, both sender and receiver use a separate key to encrypt and decrypt the data. For example, key 1 can only be used to encrypt the data, whereas, key 2 to decrypt the data. However, this technique is more prone to attacks as the sender and receiver continuously exchanges the key in order to encrypt or decrypt the data. Thus, we require a combination of both techniques in order to build a stronger encryption technique.
Various data encryption algorithms under comparison are DES (Data Encryption Standard), 3DES (Triple DES), AES (Advanced Encryption Standard) and Blowfish.
DES
Data Encryption Standard was the first encryption technique based on the Lucifer algorithm proposed by IBM. Being the first encryption standard it had many defects and several exploits were discovered which made it very unsafe.
3DES
Triple DES is an enhancement to DES, which provided triple security in comparison to DES. The algorithm is same, only the encryption technique is applied thrice in order to increase the level of security.
AES
Advanced Encryption Standard was proposed by National Institute of Standard and technology (NIST) in order to replace DES. The only known attack to AES is the brute force attack that allows an attacker to test combination of characters in order to break the security. However, Brute Force is not an easy job even for a super computer if the number of combination is arbitrarily high.
Blowfish
Blowfish is the most commonly used algorithm around the world, developed by Bruce Schneier, the president of Counterpane Systems, a firm that deals with cryptography and security. Blowfish is known to be the secret-key cipher that uses a variable number of bits ranging from 16 - 448 bits and encrypts the data 16 times to make it impossible for a hacker to decrypt it. Until now, no attack has been discovered to break the blowfish encryption. (B. Schneier)
Performance Comparison
As far as performance comparison is confirmed, AES and blowfish perform better in comparison to others.
For a data of about 256 MB, following were the results.
The performance of each algorithm depends on the configuration of the system used. These tests were conducted on P4 2.1 GHZ CPU running Windows XP SP1.
The above test clearly shows that Blowfish is the best of all, where the performance is very high. Also, AES had a high performance rate in comparison to DES and 3DES, and the throughput is almost 1/3rd of them.
放个完整的大图:
- 大小: 28.2 KB
分享到:
相关推荐
Triple Data Encryption Algorithm Modes of Operation (Approved: July 29,1998)
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-...
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-...
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-...
The Tiny Encryption Algorithm (TEA) The principal web resource for one of the most secure cipher algorithms ever devised ... ... and certainly the simplest! Maintained by Simon Shepherd, Professor of...
data encryption technology and algorithsm.very good for begginer
The Data Encryption Standard (DES) shall consist of the following Data Encryption Algorithm (DE S) and Triple Data Encryption Algorithm ( TDEA, as described in ANSI X9.52). These devices shall be ...
Data encryption Standard algorithm for secured Message
Data Encryption Standard Algorithm with time variable Key permutations
A FAST AND SECURE ENCRYPTION ALGORITHM FOR MESSAGE COMMUNICATION 论文 讲的是 一种适用于大吞吐网络的加密方法
pdf, 闡述TDE的用途,原理等。包括什麽是master key, table keys;以及column encryption, table encryption.
Data Encryption Standard
data aesssss encryption
PowerCiph数据加密算法是一种通用且简单的加密算法/协议。 该算法的最终目标是简单,紧凑和缺少先决条件。
CSA Cloud Data Encryption Guideline, 有助CISSP, CCSP 等考試
DES data encryption standard数据加密算法。DES算法。
RSA Algorithm in a Nut Shell
a simple project with 64 bit scrambler as data encryption/decryption
大型企业如何选择满足业务需求的安全密码算法、如何选择合适的密钥长度,安全协议选择哪些安全的版本,本文进行了详细的介绍,可供运营商、解决方案供应商和网络安全爱好者参考
数据加密算法(Data Encryption Algorithm,DEA)的数据加密标准(Data Encryption Standard,DES)是规范的描述