A Comparative Study of Encryption Techniques for Secure Network Communications

Authors

  • Geetanjali Pandey Shree Govt. College, Bundi, India Author

DOI:

https://doi.org/10.15662/IJARCST.2019.0202001

Keywords:

Encryption, Network Security, Symmetric Encryption, Asymmetric Encryption, AES, RSA, ECC, Hybrid Encryption, Secure Communication, Cryptanalysis

Abstract

With the exponential growth of networked systems and the internet, securing data transmission has become paramount. Encryption techniques serve as the cornerstone for safeguarding confidential information against unauthorized access and cyber threats during communication. This study presents a comparative analysis of various encryption techniques applied in network communications, including symmetric key algorithms (AES, DES), asymmetric key algorithms (RSA, ECC), and hybrid approaches. The paper explores each encryption method's fundamental principles, operational mechanisms, and performance metrics such as speed, computational overhead, key management complexity, and security robustness. It highlights how symmetric encryption provides efficient, fast processing suitable for bulk data, while asymmetric encryption offers secure key exchange and digital signature capabilities, albeit with higher computational costs. A research methodology incorporating experimental simulations and literature synthesis is used to evaluate the encryption schemes in terms of encryption/decryption speed, resource consumption, resistance to cryptanalysis, and suitability for different network environments like wired, wireless, and IoT networks. Key findings indicate that while AES remains the preferred standard for data confidentiality due to its balance of security and performance, ECC is gaining traction in resource-constrained environments owing to smaller key sizes and comparable security levels. Hybrid encryption techniques that combine the strengths of symmetric and asymmetric methods are commonly employed in secure communication protocols like TLS. The workflow of encryption involves key generation, secure key exchange, data encryption, transmission, and decryption, each critical to maintaining confidentiality and integrity. Advantages and disadvantages of each technique are analyzed to guide selection based on application requirements. The study concludes by emphasizing the importance of selecting encryption algorithms that align with specific security goals, performance needs, and network constraints. Future work includes exploring post-quantum cryptography and adaptive encryption frameworks to enhance network communication security further.

References

1. Daemen, J., & Rijmen, V. (2002). The Design of Rijndael: AES — The Advanced Encryption Standard. Springer.

2. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2), 120–126.

3. Miller, V. S. (1985). Use of Elliptic Curves in Cryptography. Advances in Cryptology — CRYPTO ’85 Proceedings.

4. Koblitz, N. (1987). Elliptic Curve Cryptosystems. Mathematics of Computation, 48(177), 203–209.

5. Dierks, T., & Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246.

6. Bernstein, D. J., Buchmann, J., & Dahmen, E. (2009). Post-Quantum Cryptography. Springer.

7. Kaliski, B. S. (2003). RSA Algorithm. In Handbook of Applied Cryptography. CRC Press.

8. Kocher, P. C. (1996). Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Advances in Cryptology — CRYPTO ’96.

Downloads

Published

2019-03-01

How to Cite

A Comparative Study of Encryption Techniques for Secure Network Communications. (2019). International Journal of Advanced Research in Computer Science & Technology(IJARCST), 2(2), 615-619. https://doi.org/10.15662/IJARCST.2019.0202001