Abstract
The value of data stored on digital platforms are growing very rapidly. Also, most of the information systems are networked based having lots of resources like data, software applications and business logics which are always susceptible to attacks. To provide security to such information systems, many cryptographic algorithms are available. This paper focuses of three such widely popular cryptographic algorithms: AES, DES and Blowfish. These are well known symmetric key cryptographic algorithms useful in providing security to IT systems. The main objective of research paper is to analyze the performance of these algorithms on small and large data files. Performance comparison is based on execution time and memory used by these algorithms during the implementation. Experimental results and graphical reports make clear which algorithm is more suitable for small and large data files. Analytical results also describes which algorithm is more suitable for time and memory constraint systems.
Similar content being viewed by others
References
Daemen J, Rijmen V (2003) “AES Proposal: Rijndael” (PDF). National Institute of Standards and Technology. p. 1. Retrieved on February 21, 2013
AES, Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). November 26, 2001. Retrieved on October 2, 2012
Stallings W (2005) Cryptography and network security principles and practices. 4th edn. Prentice Hall of India, India
Khimani B, Patel K (2015) A novel model for security and data access for jointly accessing the cloud service. BIJIT 7(1):841–844
Neetu K, Seema S (2016) Secured data migration from enterprise to cloud storage analytical survey. BIJIT 8(1):965–968
Bilal B (2015) Framework for choosing best intrusion detection system. BIJIT 7(1):821–826
Jignesh P, Rajesh B, Vikas K (2012) Hybrid security algorithms for data transmission using AES-DES. Int J Appl Inf Syst 2(2):15–21
https://en.wikipedia.org/wiki/Cryptography, Retrieved on January 15, 2017
https://support.microsoft.com/en-in/help/246071/descript-tion-of-symmetric-and-asymmetric-encryption, Retrieved on January 20, 2017
http://williamstallings.com/Extras/Security-Notes/lectures/classical.html, Retrieved on January 16, 2017
Nie T, Zhang T (2009) A study of DES and Blowfish encryption algorithm. In: TENCON 2009—IEEE region 10 conference, https://doi.org/10.1109/tencon.2009.5396115
http://www.faqs.org/rfcs/rfc2828.html, Retrieved on January 22, 2017
https://www.cse.wustl.edu/~jain/cse567-06/ftp/encryption_perf/. Retrieved on April 27, 2018
https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-9/goodbye-des.html, Retrieved on April 25, 2018
https://techdifferences.com/difference-between-des-and-aes.html, Retrieved on April 28, 2018
https://en.wikipedia.org/wiki/AES_implementations#Appl-ications, Retrieved on January 30, 2017
Westlund HB (2002) NIST reports measurable success of advanced encryption standard. J Res Natl Inst Stand Technol 107(3):307
https://en.wikipedia.org/wiki/Data_Encryption_Standard, Retrieved on February 10, 2017
https://www.schneier.com/academic/blowfish/products.ht-ml, Retrieved on February 15, 2017
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Patel, K. Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files. Int. j. inf. tecnol. 11, 813–819 (2019). https://doi.org/10.1007/s41870-018-0271-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-018-0271-4