Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files

Abstract

The value of data stored on digital platforms are growing very rapidly. Also, most of the information systems are networked based having lots of resources like data, software applications and business logics which are always susceptible to attacks. To provide security to such information systems, many cryptographic algorithms are available. This paper focuses of three such widely popular cryptographic algorithms: AES, DES and Blowfish. These are well known symmetric key cryptographic algorithms useful in providing security to IT systems. The main objective of research paper is to analyze the performance of these algorithms on small and large data files. Performance comparison is based on execution time and memory used by these algorithms during the implementation. Experimental results and graphical reports make clear which algorithm is more suitable for small and large data files. Analytical results also describes which algorithm is more suitable for time and memory constraint systems.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

References

  1. 1.

    Daemen J, Rijmen V (2003) “AES Proposal: Rijndael” (PDF). National Institute of Standards and Technology. p. 1. Retrieved on February 21, 2013

  2. 2.

    AES, Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). November 26, 2001. Retrieved on October 2, 2012

  3. 3.

    Stallings W (2005) Cryptography and network security principles and practices. 4th edn. Prentice Hall of India, India

    Google Scholar 

  4. 4.

    Khimani B, Patel K (2015) A novel model for security and data access for jointly accessing the cloud service. BIJIT 7(1):841–844

    Google Scholar 

  5. 5.

    Neetu K, Seema S (2016) Secured data migration from enterprise to cloud storage analytical survey. BIJIT 8(1):965–968

    Google Scholar 

  6. 6.

    Bilal B (2015) Framework for choosing best intrusion detection system. BIJIT 7(1):821–826

    Google Scholar 

  7. 7.

    Jignesh P, Rajesh B, Vikas K (2012) Hybrid security algorithms for data transmission using AES-DES. Int J Appl Inf Syst 2(2):15–21

    Google Scholar 

  8. 8.

    https://en.wikipedia.org/wiki/Cryptography, Retrieved on January 15, 2017

  9. 9.

    https://support.microsoft.com/en-in/help/246071/descript-tion-of-symmetric-and-asymmetric-encryption, Retrieved on January 20, 2017

  10. 10.

    http://williamstallings.com/Extras/Security-Notes/lectures/classical.html, Retrieved on January 16, 2017

  11. 11.

    Nie T, Zhang T (2009) A study of DES and Blowfish encryption algorithm. In: TENCON 2009—IEEE region 10 conference, https://doi.org/10.1109/tencon.2009.5396115

  12. 12.

    http://www.faqs.org/rfcs/rfc2828.html, Retrieved on January 22, 2017

  13. 13.

    https://www.cse.wustl.edu/~jain/cse567-06/ftp/encryption_perf/. Retrieved on April 27, 2018

  14. 14.

    https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-9/goodbye-des.html, Retrieved on April 25, 2018

  15. 15.

    https://techdifferences.com/difference-between-des-and-aes.html, Retrieved on April 28, 2018

  16. 16.

    https://en.wikipedia.org/wiki/AES_implementations#Appl-ications, Retrieved on January 30, 2017

  17. 17.

    Westlund HB (2002) NIST reports measurable success of advanced encryption standard. J Res Natl Inst Stand Technol 107(3):307

    Article  Google Scholar 

  18. 18.

    https://en.wikipedia.org/wiki/Data_Encryption_Standard, Retrieved on February 10, 2017

  19. 19.

    https://www.schneier.com/academic/blowfish/products.ht-ml, Retrieved on February 15, 2017

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Kuntal Patel.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Patel, K. Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files. Int. j. inf. tecnol. 11, 813–819 (2019). https://doi.org/10.1007/s41870-018-0271-4

Download citation

Keywords

  • AES
  • DES
  • Blowfish
  • Data Security
  • Cryptography
  • Encryption
  • Decryption
  • Symmetric key and asymmetric key