Advertisement

Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files

  • Kuntal Patel
Original Research
  • 5 Downloads

Abstract

The value of data stored on digital platforms are growing very rapidly. Also, most of the information systems are networked based having lots of resources like data, software applications and business logics which are always susceptible to attacks. To provide security to such information systems, many cryptographic algorithms are available. This paper focuses of three such widely popular cryptographic algorithms: AES, DES and Blowfish. These are well known symmetric key cryptographic algorithms useful in providing security to IT systems. The main objective of research paper is to analyze the performance of these algorithms on small and large data files. Performance comparison is based on execution time and memory used by these algorithms during the implementation. Experimental results and graphical reports make clear which algorithm is more suitable for small and large data files. Analytical results also describes which algorithm is more suitable for time and memory constraint systems.

Keywords

AES DES Blowfish Data Security Cryptography Encryption Decryption Symmetric key and asymmetric key 

References

  1. 1.
    Daemen J, Rijmen V (2003) “AES Proposal: Rijndael” (PDF). National Institute of Standards and Technology. p. 1. Retrieved on February 21, 2013Google Scholar
  2. 2.
    AES, Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). November 26, 2001. Retrieved on October 2, 2012Google Scholar
  3. 3.
    Stallings W (2005) Cryptography and network security principles and practices. 4th edn. Prentice Hall of India, IndiaGoogle Scholar
  4. 4.
    Khimani B, Patel K (2015) A novel model for security and data access for jointly accessing the cloud service. BIJIT 7(1):841–844Google Scholar
  5. 5.
    Neetu K, Seema S (2016) Secured data migration from enterprise to cloud storage analytical survey. BIJIT 8(1):965–968Google Scholar
  6. 6.
    Bilal B (2015) Framework for choosing best intrusion detection system. BIJIT 7(1):821–826Google Scholar
  7. 7.
    Jignesh P, Rajesh B, Vikas K (2012) Hybrid security algorithms for data transmission using AES-DES. Int J Appl Inf Syst 2(2):15–21Google Scholar
  8. 8.
    https://en.wikipedia.org/wiki/Cryptography, Retrieved on January 15, 2017
  9. 9.
  10. 10.
  11. 11.
    Nie T, Zhang T (2009) A study of DES and Blowfish encryption algorithm. In: TENCON 2009—IEEE region 10 conference,  https://doi.org/10.1109/tencon.2009.5396115
  12. 12.
    http://www.faqs.org/rfcs/rfc2828.html, Retrieved on January 22, 2017
  13. 13.
  14. 14.
  15. 15.
  16. 16.
  17. 17.
    Westlund HB (2002) NIST reports measurable success of advanced encryption standard. J Res Natl Inst Stand Technol 107(3):307CrossRefGoogle Scholar
  18. 18.
  19. 19.

Copyright information

© Bharati Vidyapeeth's Institute of Computer Applications and Management 2019

Authors and Affiliations

  1. 1.School of Computer StudiesAhmedabad UniversityAhmedabadIndia

Personalised recommendations