A Data Specific Comparative Study for Choosing Best Cryptographic Technique

Muhammad Usman, Shahid M Awan


Data security has gauged much attention for over a past few decades. Cryptography is one of the most serious domains as far as security is concerned. This article evaluates and compares among few of the well-known state of art cryptographic algorithm like AES, DES and Serpent depending on the nature of data by different authors in different years. Benchmark techniques (True Positive rate, False Positive rate, ROC curves etc) are used to analyze the sensitivity and specificity for the respective algorithms. Paper is concluded with the best possible algorithm that suits a respective dataset.

Full Text:



Xie, H., Zhou, L., & Bhuyan, L. (2002, February). Architectural analysis of cryptographic applications for network processors. In Proceedings of the IEEE First Workshop on Network Processors with HPCA-8.

Schneier, B., & Whiting, D. (2000, April). A Performance Comparison of the Five AES Finalists. In AES Candidate Conference (pp. 123-135).

Elbaz, L., & Bar-EI, H. (2000). Strength Assessment of Encryption Algorithm (white paper). CA, US: Discretix Technologies Ltd.

Meyer, C. H. (1989, May). Cryptography-A state of the art review. In CompEuro'89.,'VLSI and Computer Peripherals. VLSI and Microelectronic Applications in Intelligent Peripherals and their Interconnection Networks', Proceedings.(pp. 4-150). IEEE.

Standard, D. E. (1978). Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, US Department of Commerce, Washington DC, January 1977. Google Scholar.

Abid, A., Hussain, N., Abid, K., Ahmad, F., Farooq, M. S., Farooq, U., ... & Sabir, N. (2016). A survey on search results diversification techniques. Neural Computing and Applications, 27(5), 1207-1229

DOI: http://dx.doi.org/10.21015/vtcs.v15i1.480


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.