A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Cryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. These algorithms include DES, 3DES, AES, blowfish, two-fish, RC4, one-time pad, RSA, ECC, Diffie-Hellman, MD5, and SHA-256. To analy...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10804125/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832590319328165888 |
---|---|
author | Donagani Ramakrishna Mohammed Ali Shaik |
author_facet | Donagani Ramakrishna Mohammed Ali Shaik |
author_sort | Donagani Ramakrishna |
collection | DOAJ |
description | Cryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. These algorithms include DES, 3DES, AES, blowfish, two-fish, RC4, one-time pad, RSA, ECC, Diffie-Hellman, MD5, and SHA-256. To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. The assessment also examines known flaws and prospective attacks for each algorithm and highlights current methods and future research gaps. This study provides valuable information on the advantages and disadvantages of different algorithms using a detailed diagram that summarizes the performance outcomes based on secrecy, integrity, and security. In addition, each algorithm’s issues are covered in the review, giving readers a clear grasp of their limitations and possible areas for future research. |
format | Article |
id | doaj-art-3dd076550aa449788ddfb573a85540f1 |
institution | Kabale University |
issn | 2169-3536 |
language | English |
publishDate | 2025-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj-art-3dd076550aa449788ddfb573a85540f12025-01-24T00:01:30ZengIEEEIEEE Access2169-35362025-01-0113115761159310.1109/ACCESS.2024.351853310804125A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future ChallengesDonagani Ramakrishna0https://orcid.org/0009-0008-1313-1831Mohammed Ali Shaik1https://orcid.org/0000-0002-5520-0830SR University, Warangal, Telangana, IndiaSR University, Warangal, Telangana, IndiaCryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. These algorithms include DES, 3DES, AES, blowfish, two-fish, RC4, one-time pad, RSA, ECC, Diffie-Hellman, MD5, and SHA-256. To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. The assessment also examines known flaws and prospective attacks for each algorithm and highlights current methods and future research gaps. This study provides valuable information on the advantages and disadvantages of different algorithms using a detailed diagram that summarizes the performance outcomes based on secrecy, integrity, and security. In addition, each algorithm’s issues are covered in the review, giving readers a clear grasp of their limitations and possible areas for future research.https://ieeexplore.ieee.org/document/10804125/Advanced encryption standardblowfishchaotic cryptographycryptanalysisdenial of service attackhash functions |
spellingShingle | Donagani Ramakrishna Mohammed Ali Shaik A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges IEEE Access Advanced encryption standard blowfish chaotic cryptography cryptanalysis denial of service attack hash functions |
title | A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges |
title_full | A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges |
title_fullStr | A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges |
title_full_unstemmed | A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges |
title_short | A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges |
title_sort | comprehensive analysis of cryptographic algorithms evaluating security efficiency and future challenges |
topic | Advanced encryption standard blowfish chaotic cryptography cryptanalysis denial of service attack hash functions |
url | https://ieeexplore.ieee.org/document/10804125/ |
work_keys_str_mv | AT donaganiramakrishna acomprehensiveanalysisofcryptographicalgorithmsevaluatingsecurityefficiencyandfuturechallenges AT mohammedalishaik acomprehensiveanalysisofcryptographicalgorithmsevaluatingsecurityefficiencyandfuturechallenges AT donaganiramakrishna comprehensiveanalysisofcryptographicalgorithmsevaluatingsecurityefficiencyandfuturechallenges AT mohammedalishaik comprehensiveanalysisofcryptographicalgorithmsevaluatingsecurityefficiencyandfuturechallenges |