# Introduction any encryption algorithms are widely available and used in information security. They can be categorized into Symmetric (private) and Asymmetric (public) keys encryption. In Symmetric keys encryption or secret key encryption, only one key is used to encrypt and decrypt data. In Asymmetric keys, two keys are used; private and public keys [1]. Public key is used for encryption and private key is used for decryption (e.g. RSA). Public key encryption is based on mathematical functions, computationally intensive. There are many examples of strong and weak keys of cryptography algorithms like DES, AES. DES uses one 64-bits key while AES uses various 128,192,256 bits keys [2]. Asymmetric key encryption or public key encryption is used to solve the problem of key distribution. In Asymmetric keys, two keys are used; private and public keys. Public key is used for encryption and private key is used for decryption (E.g. RSA and Digital Signatures). Because users tend to use two keys: public key, which is known to the public and private key which is known only to the user [2]. There is no need for distributing them prior to transmission. However, public key encryption is based on mathematical functions, computationally intensive and is not very efficient for small mobile devices [3]. # Asymmetric encryption techniques are almost 1000 Authors ? ? : e-mail: aabhi616@yahoo.in times slower than Symmetric techniques, because they require more computational processing power [4]. This study evaluates three different encryption algorithms namely; AES, DES and RSA. The performance measure of encryption schemes will be conducted in terms of encryption and decryption time such as text or document [5]. # II. # Encryption Algorithms Encryption is a well known technology for protecting sensitive data. Use of the combination of Public and Private Key encryption to hide the sensitive data of users, and cipher text retrieval [6]. a) Data Encryption Standard (DES) DES (Data Encryption Standard) algorithm purpose is to provide a standard method for protecting sensitive commercial and unclassified data. In this same key used for encryption and decryption process [7]. DES algorithm consists of the following steps i. Encryption 1. DES accepts an input of 64-bit long plaintext and 56-bitkey (8 bits of parity) and produce output of 64 bit block. 2. The plaintext block has to shift the bits around. 3. The 8 parity bits are removed from the key by subjecting the key to its Key Permutation. 4. The plaintext and key will processed by following i. The key is split into two 28 halves ii. Each half of the key is shifted (rotated) by one or two bits, depending on the round. iii. The halves are recombined and subject to a compression permutation to reduce the key from 56 bits to 48 bits. This compressed keys used to encrypt this round's plaintext block. iv. The rotated key halves from step 2 are used in next round. v. The data block is split into two 32-bit halves. vi. One half is subject to an expansion permutation to increase its size to 48 bits. vii. Output of step 6 is exclusive-OR'ed with the 48itcompressed key from step 3. viii. Output of step 7 is fed into an S-box, which substitutes key bits and reduces the 48-bit block back down to 32-bits. ix. Output of step 8 is subject to a P-box to permute the bits. ii. Usual Round : Execute the following operations which are described above. The last step consists of XO Ring the output of the previous three steps with four words from the key schedule. And the last round for encryption does not involve the "Mix columns" step. RSA is widely used Public-Key algorithm. RSA firstly described in 1977. In our proposed work, we are using RSA algorithm to encrypt the data to provide security so that only the concerned user can access it. RSA algorithm involves these steps: 1. Key Generation 2. Encryption 3. Decryption i Key Generation Before the data is encrypted, Key generation should be done. [9] Steps: Generate a public/private key pair : 1. Generate two large distinct primes p and q 2. Compute n = pq and ? = (p ? 1)(q ? 1) 3. Select an e, 1 < e < ?, relatively prime to ?. # Comparision In # Experimental Design The four text files of different sizes are used to conduct four experiments, where a comparison of three algorithms AES, DES and RSA is performed. # Performance of encryption algorithm is evaluated considering the following parameters. A. Encryption Time B. Decryption Time The encryption time is considered the time that an encryption algorithm takes to produces a cipher text from a plain text. Encryption time is used to calculate the throughput of an encryption scheme, is calculated as the total plaintext in bytes encrypted divided by the encryption time. Comparisons analyses of the results of the selected different encryption scheme are performed. [11] V. # Experimental Results And Analysis Experimental result for Encryption algorithm AES, DES and RSA are shown in table-2, which shows the comparison of three algorithm AES, DES and RSA using same text file for four experiment. By analyzing table-2, Time taken by RSA algorithm for both encryption and decryption process is much higher compare to the time taken by AES and DES algorithm. algorithm. AES and DES algorithm show very minor difference in time taken for encryption and decryption process. VI. # Conclusion Encryption algorithm plays very important role in communication security. Our research work surveyed the performance of existing encryption techniques like AES, DES and RSA algorithms. Based on the text files used and the experimental result it was concluded that AES algorithm consumes least encryption and RSA consume longest encryption time. We also observed that Decryption of AES algorithm is better than other algorithms. From the simulation result, we evaluated that AES algorithm is much better than DES and RSA algorithm. Our future work will focus on compared and analysed existing cryptographic algorithm like AES, DES and RSA. It will include experiments on image and audio data and focus will be to improve encryption time and decryption time. 1![Figure 1 : Diagram of DES Algorithm b) Advanced Encryption Standard (AES) Advanced Encryption Standard (AES) algorithm not only for security but also for great speed. Both hardware and software implementation are faster still. New encryption standard recommended by NIST to replace DES. Encrypts data blocks of 128 bits in 10, 12 and 14 round depending on key size as shown in Figure -2. It can be implemented on various platforms specially in small devices. It is carefully tested for many security applications.](image-2.png "EFigure 1 :") 2![Figure 2 : AES Encryption and Decryption](image-3.png "Figure 2 :") 413![Figure 3 : RSA Encryption and Decryption Flowchart](image-4.png "4 .E 1 .Figure 3 :") 45![Figure 4 : Comparison of Encryption Time among AES, DES and RSA](image-5.png "Figure 4 :Figure 5 :") ![](image-6.png "") 1. Sub Bytes2. Shift Rows3. Mix Columns4. Add Round Key , using K(round)iii. Final Round: Execute the following operationswhich are described above.1. Sub Bytes2. Shift Rows3. Add Round Key, using K(10)iv. Encryption : Each round consists of the followingfour steps:i Sub Bytes : The first transformation, Sub Bytes, is used at the encryption site. To substitute a byte, we interpret the byte as two hexadecimal digits. ii Shift Rows : In the encryption, the transformation is called Shift Rows.iii 1Consumption, Security, Deposit of keys, InherentVulnerabilities, Key used, Rounds, Stimulation Speed,Trojan Horse, Hardware & Software Implementation andCiphering & Deciphering Algorithm. 22 : Comparisons of DES, AES and RSA of Encryption and Decryption TimeS.NOAlgorithm Packet Size (KB) Encryption Time (Sec) Decryption Time (Sec)AES1.611DES1533.01.1RSA7.34.9 * Analyzing the speed of combined cryptographic algorithms with secret and public key FlorimIdrizi Dalipi &Fisnik EjupRustemi ISSN: 2278-800X International Journal of Engineering Research and Development 2278-067X 8 2 45 August 2013 * Performance Analysis of Symmetric Cryptography Abdul DSMina HMKader MHadhoud 1 * Efficiency and Security of Data with Symmetric Encryption Algorithms ChehalRitika SinghKuldeep International Journal of Advanced Research in Computer Science and Software Engineering 2277 128X 2 8 1 August 2012 * Security In Wireless LANS And MANS Hardjono 2005 Artech House Publishers * Evaluating The Performance of Symmetric Encryption Algorithms DiaaElminaam AbdualSalama Abd Kader International Journal of Network Security 10 3 216 May 2010 Hatem Mohamed & Hadhoud, Mohiy Mohamed * Cloud Computing: Security Challenges & Encryption Practices DrAPadmapriya PSubhasri International Journal of Advanced Research in Computer Science and Software Engineering 2277 128X 3 3 257 March 2013 * A Novel Approach for Data Encryption Standard Algorithm DeepthiGPrashanti S & Sandhya Rani International Journal of Engineering and Advanced Technology (IJEAT) 2249 -8958 2 264 June 2013 * Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm DasDebasis MisraRajiv International Journal of Network Security & Its Applications (IJNSA) 3 6 204 November 2011 * KalpanaParsi SingarajuSudha Data Security in Cloud Computing using RSA Algorithm * International Journal of Research in Computer and Communication technology 2278- 5841 1 4 145 September 2012 IJRCCT * Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm KSunitha KSPrashanth ISSN: 2278- 8727Volume 12 IOSR Journal of Computer Engineering 2278-0661 5 64 Jul. -Aug. 2013 IOSR-JCE * Security On Bccp Through Aes Encryption Technique SinghNarjeet RajGaurav International Journal Of Engineering Science & Advanced Technology 2 Issue-4, 813 -819. pp. 817.