Академический Документы
Профессиональный Документы
Культура Документы
case of changing key size, it was seen that higher key size
TABLE 1. leads to clear change in the battery and time consumption.
CRYPTOGRAPHIC ALGORITHMS INFORMATION
The paper [8] provides evaluation of both symmetric
(AES, DES, Blowfish) as well as asymmetric (RSA)
Sche Algorith Structure Contr Key Ro Bloc
me m Type ibutor Len un k cryptographic algorithms by taking different types of files
gth ds Size like binary, text and image files. A comparison has been
DES Symmetr Balanced IBM7 56 16 64 conducted for these encryption algorithms using evaluation
ic Feistel 5 bits bits parameters such as encryption time, decryption time and
network throughput. From the presented simulation results, it was
concluded that AES has better performance than other
3DES Symmetr Feistel IBM7 168, 48 64
ic network 8 112 bits algorithms in terms of both throughput and encryption-
or 56 decryption time.
bits In this paper [9], the performance of three Symmetric
AES Symmetr Substitutio Rijind 128, 10 128 Key based algorithms-AES, Blowfish and Salsa20 has been
ic n- ael 192, or bits
permutatio 256 12
evaluated based on execution time, memory required for
n network bits or implementation and throughput across two different
14 operating systems. Based on the simulation results, it was
BLO Symmetr Feistel Bruce 32- 16 64 concluded that AES and Salsa20 are preferred over Blowfish
WFIS ic network Schne 448 bits for plain text data encryption.
H ier bits
In [10] the author compared AES and RC4 algorithm and
the performance metrics were encryption throughput, CPU
III. RELATED WORKS work load, memory utilization, and key size variation and
encryption and decryption time. Results show that the RC4
This section provides the information and results which
is fast and energy saving for encryption and decryption. RC4
are obtained from the numerous sources. Cryptographic
proved to be better than AES for larger size data.
algorithms have been compared with each other for
In [11] author compared AES and DES algorithms on
performance evaluation on basis of throughput Memory
image file, MATLAB software platform was used for
utilization, energy consumption, attacks, encryption time,
implementation of these two cipher algorithms. AES took
decryption time etc. This paper [7] provides evaluation of
less encryption and decryption time than DES. In [4] the
six of the most common encryption algorithms namely: AES
author compared cipher algorithms (AES, DES, Blowfish)
(Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A
for different cipher block modes (ECB, CBC, CFB, OFB) on
comparison has been conducted on these encryption
different file sizes varying from 3kb to 203kb. Blowfish
algorithms at different settings for each algorithm such as
algorithm yield better performance for all block cipher
different sizes of data blocks, different data types, battery
modes that were tested and OFB block mode gives better
power consumption, different key size and finally
performance than other block modes.
encryption/decryption speed. Several points has been
In [12] the author compared cipher algorithms (AES,
concluded from the experimental results. Firstly there was
DES, 3-DES and Blowfish) for varying file size and
no significant difference when the results were displayed
compared the encryption time on two different machines
either in hexadecimal base encoding or in base 64 encoding.
Pentium-4, 2.4 GHz and Pentium-II 266 MHz in EBC and
Secondly in the case of changing packet size, it was
CFB Mode. The author concluded that Blowfish is fastest
concluded that Blowfish had better performance than other
followed by DES and Triple DES and CFB takes more time
common encryption algorithms used, followed by RC6.
than ECB cipher block mode.
Thirdly authors have concluded that, 3DES still has low
From the above related works, it is realized that none of
performance compared to algorithm DES. Fourthly they
the work has been carried out on the performance of various
found out that RC2, has disadvantage over all other
symmetric algorithms on different type of files. The main
algorithms in terms of time consumption. Fifthly it was
objective of this paper is to analyze the time taken for
found that AES has better performance than RC2, DES, and
encryption and decryption by various symmetric
3DES. In the case of audio and video files they found the
cryptographic algorithms on different sizes of text files and
result as the same as in text and document. Finally, in the
image files using JAVA as the programming language.
EXECUTION TIME
(MILLISECONDS)
Encryption time- The time required to convert plaintext to
1000
cipher text is encryption time. Encryption time depends upon
key size, plaintext block size and mode. In our experiment 800
we have measured encryption time in milliseconds. 600
Encryption time impacts performance of the system. This 400
time must be less making the system fast and responsive. 200
Decryption time- The time to recover plaintext from cipher 0
text is called decryption time. The decryption time is desired 1500K 2048K 3000K
400KB
to be less similar to encryption time to make system B B B
responsive and fast. Decryption time impacts performance of AES 31.44 59.12 73.33 103.25
system. In our experiment, we have measured decryption BlowFish 44.83 138.45 160.8 246.45
time is milliseconds. DES 66.51 222.13 269.7 403.83
V. SIMULATION RESULTS TripleDES 154.05 552.94 693.93 1042.82
AXIS TITLE
Performance of encryption algorithm is evaluated
considering the following system configuration.
1. Software Speciation: Experimental evaluation on AES BlowFish DES TripleDES
Geany with Java Development Kit 8, Windows 8 Pro64 bit Fig.2. Encryption Time of different Algorithms for Image Files
Operating System.
2. Hardware Speciation: All the algorithms are tested on
Intel Core i5 3337U (1.80 GHz) fourth generation
Text ALGORITHMS
processor with 4GB of RAM with 1 TB-HDD File
AES BLOWFISH DES T_DES
Size
Avera Avera Avera Avera Avera Avera Avera Avera
-ge -ge -ge -ge -ge -ge -ge -ge
TEXT FILE E N C R Y P T I O N Encry Decry Encry Decry Encry Decry Encry Decry
ption ption ption ption ption ption ption ption
EXECUTION TIME
(MILLISECONDS)
EXECUTION TIME
1000
(MILLISECONDS)
EXECUTION TIME
1000
(MILLISECONDS)
800
800
600
600
400
400 200
200 0
1500K 2048K 3000K
0 400KB
400K 1500 2048 3000 B B B
B KB KB KB AES 27.17 62.29 73.08 106.16
AES 28.41 60.79 81.93 109.69 BlowFish 44.21 144.86 165.52 247.18
BlowFish 44.54 136.9 166.23 238.31 DES 66.31 224.69 268.85 421.75
DES 66.67 206.57 274.53 460.06 TripleDES 149.86 538.82 680.2 1012.45
TripleDES 146.64 505.81 680.23 985.32 AXIS TITLE
AXIS TITLE
AES BlowFish DES TripleDES
AES BlowFish DES TripleDES
Fig 4. Decryption Time of different Algorithms for Image Files
Fig 3. Decryption Time of different Algorithms for Text Files
VI. CONCLUSION AND FUTURE WORK
3000 103. 106. 246. 247. 403. 421. 1042. 1012. [2]. Diaa Salama Abd Elminaam, Hatem Mohamad Abdual Kader, Mohiy
kb 25 16 45 18 83 75 82 45 Mohamed Hadhoud, Evalution the Performance of Symmetric
Encryption Algorithms, International journal of network security
vol.10,No.3,pp,216-222,May 2010.