Main Article Content
Indepth Analysis of Various Cryptography Techniques
Abstract
In an increasingly digital world, cryptography is essential to guaranteeing the security, privacy, and integrity of data. Even if cryptographic techniques have advanced significantly, the increasing complexity of cyber threats calls for a deeper comprehension of these approaches in order to improve data protection. This study conducts a thorough analysis of a number of cryptographic methods, including symmetric algorithms like AES, DES, Blowfish, and 3DES as well as asymmetric strategies like RSA, RC6, ECC and Diffie-Hellman. Critical characteristics like encryption and decryption time, throughput, power consumption, memory utilisation, and security resilience are all evaluated in this study. Through simulation-based experiments and a thorough analysis of the body of current literature, the study determines the strength and weakness of each method in various contexts, such as cloud computing systems, multimedia, and text files. This study discovered a striking pattern in the areas of previous research. For the most part, researchers have focused on analysing the encryption and decryption times of popular algorithms like DES, 3DES, Blowfish, and AES. Because of their historical significance, broad use, and vital function in protecting data in a variety of applications, these algorithms have drawn a lot of attention. They are now among the most studied cryptographic algorithms to date because of the abundance of information gathered on their performance measures as a result of this intense focus. The RC6, RC4, RC2, ECC, and D-H algorithms, on the other hand, have received relatively little attention.