突然被同事问到选择什么加密算法合适,虽然结果是答对了,但是还是觉得欠说服力,故找了篇文章补充,不想看长篇大论的直接看对比结果图
转自:http://www.brighthub.com/computing/smb-security/articles/75099.aspx
The need for data encryption arose by the growing concern fo the safety and security of the data. In this article, various data encryption algorithms under comparison are DES (Data Encryption Standard), 3DES (Triple DES), AES (Advanced Encryption Standard) and Blowfish (Best performance).
Introduction
Computer encryption techniques have been divided into 2 categories, Symmetric and Asymmetric encrypting techniques.
In symmetric encryption technique, both sender and receiver use a shared key to encrypt and/or decrypt the data. The only problem with this technique is that if the key is known to others the entire conversation is compromised.
In asymmetric encryption technique, both sender and receiver use a separate key to encrypt and decrypt the data. For example, key 1 can only be used to encrypt the data, whereas, key 2 to decrypt the data. However, this technique is more prone to attacks as the sender and receiver continuously exchanges the key in order to encrypt or decrypt the data. Thus, we require a combination of both techniques in order to build a stronger encryption technique.
Various data encryption algorithms under comparison are DES (Data Encryption Standard), 3DES (Triple DES), AES (Advanced Encryption Standard) and Blowfish.
DES
Data Encryption Standard was the first encryption technique based on the Lucifer algorithm proposed by IBM. Being the first encryption standard it had many defects and several exploits were discovered which made it very unsafe.
3DES
Triple DES is an enhancement to DES, which provided triple security in comparison to DES. The algorithm is same, only the encryption technique is applied thrice in order to increase the level of security.
AES
Advanced Encryption Standard was proposed by National Institute of Standard and technology (NIST) in order to replace DES. The only known attack to AES is the brute force attack that allows an attacker to test combination of characters in order to break the security. However, Brute Force is not an easy job even for a super computer if the number of combination is arbitrarily high.
Blowfish
Blowfish is the most commonly used algorithm around the world, developed by Bruce Schneier, the president of Counterpane Systems, a firm that deals with cryptography and security. Blowfish is known to be the secret-key cipher that uses a variable number of bits ranging from 16 - 448 bits and encrypts the data 16 times to make it impossible for a hacker to decrypt it. Until now, no attack has been discovered to break the blowfish encryption. (B. Schneier)
Performance Comparison
As far as performance comparison is confirmed, AES and blowfish perform better in comparison to others.
For a data of about 256 MB, following were the results.
The performance of each algorithm depends on the configuration of the system used. These tests were conducted on P4 2.1 GHZ CPU running Windows XP SP1.
The above test clearly shows that Blowfish is the best of all, where the performance is very high. Also, AES had a high performance rate in comparison to DES and 3DES, and the throughput is almost 1/3rd of them.
放个完整的大图:
- 大小: 28.2 KB
分享到:
相关推荐
ANSI-X9.52-1998标准详细介绍了Triple Data Encryption Algorithm(TDEA)的运行模式,这是一项在金融服务业中使用的加密技术。TDEA也被称为3DES(Triple DES),是一种对称密钥加密算法,它通过三次应用DES(Data ...
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-...
### Tiny Encryption Algorithm (TEA):一种高效且简单的加密算法 #### 一、TEA算法简介 Tiny Encryption Algorithm(简称TEA),是一种高效且简单的加密算法。它由David Wheeler和Roger Needham在剑桥大学计算机...
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-...
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-...
data encryption technology and algorithsm.very good for begginer
Encryption algorithm not supported(解决方案).md
The Data Encryption Standard (DES) shall consist of the following Data Encryption Algorithm (DE S) and Triple Data Encryption Algorithm ( TDEA, as described in ANSI X9.52). These devices shall be ...
Data encryption Standard algorithm for secured Message
Data Encryption Standard Algorithm with time variable Key permutations
Oracle Database 11g通过引入透明数据加密(Transparent Data Encryption, TDE)技术,提供了一种有效的方法来保护存储在数据库中的敏感数据。本文档将深入探讨Oracle Database 11g TDE的功能及其与nCipher硬件安全...
Data Encryption Standard
**PowerCiph数据加密算法详解** PowerCiph数据加密算法是一种专为通用性和简洁性设计的加密技术。在当今信息安全至关重要的时代,这种算法的出现为个人和组织提供了一种简单而有效的保护数据的方式。...
CSA Cloud Data Encryption Guideline, 有助CISSP, CCSP 等考試
"code.rar_data encryption_encryption" 的标题暗示我们关注的重点是代码或数据的加密过程,以及可能涉及的加密算法。描述中的 "data aesssss encryption" 提到了"AES",这代表了高级加密标准(Advanced Encryption ...
a simple project with 64 bit scrambler as data encryption/decryption
The National Institute of Standards and Technology (NIST) Triple Data Encryption Algorithm (TDEA) Modes of Operation Validation System (TMOVS) specifies the procedures involved in validating ...
在本次提交中,我展示了使用名为 Secure IoT (SIT) 的轻量级加密算法对图像加密的模拟。 它是一个 64 位分组密码,需要 64 位密钥来加密数据。 该算法的架构是 feistel 和统一替换置换网络的混合体。...
1. 对于DES算法的密钥长度进行加强,推荐使用更长密钥的加密算法,比如 Triple Data Encryption Algorithm (3DES)。3DES是DES的一种扩展,通过三重DES操作,使密钥长度增加到112或168位(实际有效长度取决于实现方式...
数据加密算法(Data Encryption Algorithm,DEA)是一种对称加密算法,很可能是使用最广泛的密钥系统,特别是在保护金融数据的安全中,最初开发的DEA是嵌入硬件中的。