A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges

Cryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. These algorithms include DES, 3DES, AES, blowfish, two-fish, RC4, one-time pad, RSA, ECC, Diffie-Hellman, MD5, and SHA-256. To analy...

Full description

Saved in:
Bibliographic Details
Main Authors: Donagani Ramakrishna, Mohammed Ali Shaik
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10804125/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832590319328165888
author Donagani Ramakrishna
Mohammed Ali Shaik
author_facet Donagani Ramakrishna
Mohammed Ali Shaik
author_sort Donagani Ramakrishna
collection DOAJ
description Cryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. These algorithms include DES, 3DES, AES, blowfish, two-fish, RC4, one-time pad, RSA, ECC, Diffie-Hellman, MD5, and SHA-256. To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. The assessment also examines known flaws and prospective attacks for each algorithm and highlights current methods and future research gaps. This study provides valuable information on the advantages and disadvantages of different algorithms using a detailed diagram that summarizes the performance outcomes based on secrecy, integrity, and security. In addition, each algorithm’s issues are covered in the review, giving readers a clear grasp of their limitations and possible areas for future research.
format Article
id doaj-art-3dd076550aa449788ddfb573a85540f1
institution Kabale University
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-3dd076550aa449788ddfb573a85540f12025-01-24T00:01:30ZengIEEEIEEE Access2169-35362025-01-0113115761159310.1109/ACCESS.2024.351853310804125A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future ChallengesDonagani Ramakrishna0https://orcid.org/0009-0008-1313-1831Mohammed Ali Shaik1https://orcid.org/0000-0002-5520-0830SR University, Warangal, Telangana, IndiaSR University, Warangal, Telangana, IndiaCryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. These algorithms include DES, 3DES, AES, blowfish, two-fish, RC4, one-time pad, RSA, ECC, Diffie-Hellman, MD5, and SHA-256. To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. The assessment also examines known flaws and prospective attacks for each algorithm and highlights current methods and future research gaps. This study provides valuable information on the advantages and disadvantages of different algorithms using a detailed diagram that summarizes the performance outcomes based on secrecy, integrity, and security. In addition, each algorithm’s issues are covered in the review, giving readers a clear grasp of their limitations and possible areas for future research.https://ieeexplore.ieee.org/document/10804125/Advanced encryption standardblowfishchaotic cryptographycryptanalysisdenial of service attackhash functions
spellingShingle Donagani Ramakrishna
Mohammed Ali Shaik
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
IEEE Access
Advanced encryption standard
blowfish
chaotic cryptography
cryptanalysis
denial of service attack
hash functions
title A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
title_full A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
title_fullStr A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
title_full_unstemmed A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
title_short A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
title_sort comprehensive analysis of cryptographic algorithms evaluating security efficiency and future challenges
topic Advanced encryption standard
blowfish
chaotic cryptography
cryptanalysis
denial of service attack
hash functions
url https://ieeexplore.ieee.org/document/10804125/
work_keys_str_mv AT donaganiramakrishna acomprehensiveanalysisofcryptographicalgorithmsevaluatingsecurityefficiencyandfuturechallenges
AT mohammedalishaik acomprehensiveanalysisofcryptographicalgorithmsevaluatingsecurityefficiencyandfuturechallenges
AT donaganiramakrishna comprehensiveanalysisofcryptographicalgorithmsevaluatingsecurityefficiencyandfuturechallenges
AT mohammedalishaik comprehensiveanalysisofcryptographicalgorithmsevaluatingsecurityefficiencyandfuturechallenges