Open Access Open Access  Restricted Access Subscription Access

Performance Analysis of Symmetric Key Cryptography Algorithms:DES, AES and Blowfish


Affiliations
1 Department of Computer Science, Himachal Pradesh University, Shimla, India
 

Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. This paper provides a fair comparison between three most common symmetric key cryptography algorithms: DES, AES, and Blowfish. The comparison is made on the basis of these parameters: speed, block size, and key size. Simulation program is implemented using Java programming.

Keywords

Cryptography, DES, AES, Blowfish, Encryption, Decryption.
User
Notifications
Font Size

Abstract Views: 174

PDF Views: 0




  • Performance Analysis of Symmetric Key Cryptography Algorithms:DES, AES and Blowfish

Abstract Views: 174  |  PDF Views: 0

Authors

Nagesh Kumar
Department of Computer Science, Himachal Pradesh University, Shimla, India
Jawahar Thakur
Department of Computer Science, Himachal Pradesh University, Shimla, India
Arvind Kalia
Department of Computer Science, Himachal Pradesh University, Shimla, India

Abstract


Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. This paper provides a fair comparison between three most common symmetric key cryptography algorithms: DES, AES, and Blowfish. The comparison is made on the basis of these parameters: speed, block size, and key size. Simulation program is implemented using Java programming.

Keywords


Cryptography, DES, AES, Blowfish, Encryption, Decryption.