International Journal of Scientific Research and Engineering Development

International Journal of Scientific Research and Engineering Development


( International Peer Reviewed Open Access Journal ) ISSN [ Online ] : 2581 - 7175

IJSRED » Archives » Volume 8 -Issue 6


Submit Your Manuscript OnlineIJSRED

📑 Paper Information
📑 Paper Title Cryptography Algorithms Analysis
👤 Authors Tushar Galande, Yash Kamble, Rupali Pawar, Trupti Tasgaokar
📘 Published Issue Volume 8 Issue 6
📅 Year of Publication 2025
🆔 Unique Identification Number IJSRED-V8I6P87
📝 Abstract
Data security has become a critical issue in today’s information technology landscape. The concern grows even more in cloud environments, where data is stored across multiple global locations. Encryption serves as an effective way to address this challenge, and various encryption algorithms play a key role in protecting cloud-based information. These algorithms ensure that stored data is accessible only to authorized users.
In this paper, we present the fundamental features—such as key length and block size—of different encryption categories: symmetric algorithms (AES, DES, 3DES, Blowfish [8], RC4), asymmetric algorithms (RSA, DSA, Diffie–Hellman [6], ElGamal, Paillier), and hashing techniques (MD5, MD6, SHA, SHA-256). Additionally, we implemented five commonly used encryption methods, including AES, DES, Blowfish [8], RC4, and RSA, and evaluated their performance by measuring the encryption and decryption time for files of varying sizes on a local system