Main Article Content

Indepth Analysis of Various Cryptography Techniques


S.G. Auyo
A. Yushau
A.S. Yabo
M.H. Faskari
U. Babandi
A.A. Ibrahim
M.I. Abdullahi
A.I. Marafa

Abstract

In an increasingly digital world, cryptography is essential to guaranteeing the security, privacy, and integrity of data. Even if cryptographic  techniques have advanced significantly, the increasing complexity of cyber threats calls for a deeper comprehension of  these approaches in order to improve data protection. This study conducts a thorough analysis of a number of cryptographic methods, including symmetric algorithms like AES, DES, Blowfish, and 3DES as well as asymmetric strategies like RSA, RC6, ECC and Diffie-Hellman.  Critical characteristics like encryption and decryption time, throughput, power consumption, memory utilisation, and security resilience  are all evaluated in this study. Through simulation-based experiments and a thorough analysis of the body of current literature, the study  determines the strength and weakness of each method in various contexts, such as cloud computing systems, multimedia, and  text files. This study discovered a striking pattern in the areas of previous research. For the most part, researchers have focused on  analysing the encryption and decryption times of popular algorithms like DES, 3DES, Blowfish, and AES. Because of their historical significance, broad use, and vital function in protecting data in a variety of applications, these algorithms have drawn a lot of attention.  They are now among the most studied cryptographic algorithms to date because of the abundance of information gathered on their  performance measures as a result of this intense focus. The RC6, RC4, RC2, ECC, and D-H algorithms, on the other hand, have received  relatively little attention.            


Journal Identifiers


eISSN: 2635-3490
print ISSN: 2476-8316