Beruflich Dokumente
Kultur Dokumente
RESEARCH ARTICLE
OPEN ACCESS
-----------------------------------*************************---------------------------ABSTRACT:
With the advancement of technology internet and various communication techniques that pass
through it has grown in prominence each day. However along with this advancement has also grown the
threat of hackers and malicious groups. There has been several passive and active attacks making the role of
data security pretty important. Most of the time the data passed via internet might contain confidential or
personal information which many people would want to be protected against attacks. Various data
encryption algorithms has been developed to make sure that the data transmitted via internet is secure from
any sort of hacking or attacks.Several cryptographic algorithms also have been developed for encryption and
with each one having some advantages and disadvantages. This paper presents a detailed study of symmetric
encryption/decryption algorithms and its advantages and disadvantages.
Keywords:- Symmetric key Encryption, Symmetric key Decryption, Cipher Text, Plain Text,
-----------------------------------*************************---------------------------I.
INTRODUCTION:
ISSN: 2394-2231
encryption
decryption
http://www.ijctjournal.org
Page 45
RELATED WORK:
SYMMETRIC ALGORITHMS
ISSN: 2394-2231
http://www.ijctjournal.org
Page 46
known
to
be
success.
IV.
COMPARISON OF ALGORITHMS
A comparison of the various algorithms is given below.
DES
IBM
3DES
Designers
First Published
Derived from
Key size
1977
Lucifer
56 bits
1998
DES
112 bits or 168
bits
Block size
Structure
64 bits
Balanced
network
16
Rounds
IBM
Feistel
64 bits
Feistel network
48
Attacks
Cipher type
Security
Keys
Block cipher
In secure
Single
Speed
Power Consumption
Fast
Higher than AES
Block cipher
Secure than DES
Single key divided
into three
Slow than DES
Higher than DES
Throughput
Encryption
High
Moderate
AES
JOAN DAEMEN &
VINCENT RIJMEN
1998
Square
128 bits, 192
bits, 256 bits
BLOWFISH
BRUCE SCHNEIER
1993
32-448 bit in
steps of 8 bits.
128 bits by
default
128 bits
Substitutionpermutation network
10,
12
or
14
depending on key
Brute force attack,
Biclique
attack,
Related-key attacks
64 bits
Feistel network
Block cipher
Secure
Single
Block cipher
Secure
Public
Fast
Higher than
fish
Lower than
fish
High
16
Second
order
differential attack
Blow
Fast
Very low
Blow
Very High
High
SIMULATION ENVIRONMENT
ISSN: 2394-2231
http://www.ijctjournal.org
Page 47
VI.
Encryption method
Key length
Encrypted text file path and file name
Decrypted text file path and file name
SIMULATION RESULTS
input
DES
3DES
Rijndael
AES
Blowfish
1
2
3
10
18
3
6
9
30
55
4
5
12
15
25
2
4
6
12
25
1
2
3
8
15
Table 2 Shows the time taken for encryption for each algorithm in seconds
60
60
Speed in sec
Speed in sec
50
40
30
20
10
50
40
30
20
10
0
DES
3DES
Rijndael
AES
Blowfish
DES
3DES Rijndael
Size of input in MB
2
10
50
100
ISSN: 2394-2231
AES
Blowfish
Size of input in MB
2
10
50
100
http://www.ijctjournal.org
Page 48
Speed in sec
40
30
20
10
0
3DES
Rijndael
AES
10
50
1
2
4
8
20
1
2
3
7
12
50
40
30
20
10
0
DES
Blowfish
3DES
Rijndael
AES
Blowfish
Blowfish
50
DES
AES
100
10
50
100
From the above two tables it can be seen that Blowfish have the best performance among the encryption
algorithms. AES is slightly slower in performance when compared to Blowfish but it
provides better protection against attacks. Another interesting thing is that 3DES takes exactly 3 times to
encrypt data when compared to DES because it uses DES 3 times for encryption.
VII.
CONCLUSION :
From the studies which we have performed considering security, throughput, speed,
encryption/decryption, power consumption and other factors, it is shown that blowfish algorithm having
good performance than other symmetric algorithm like DES and 3DES, AES having better performance.
The memory requirement of symmetric algorithms is lesser than asymmetric encryption algorithms and
symmetrickey algorithms runs faster than asymmetric key algorithms.Further, symmetric key encryption
provides more security thanasymmetric key encryption. AES eventhough its widely used today, it uses more
processing power when compared with other algorithms.
REFERENCES:
[1] Milind
Mathur.and
Ayush
Kesarwani
Comparison Between DES , 3DES ,RC2 , RC6
, BLOWFISH And AES, Proceedings of
National Conference on New Horizons,
university of Oklahoma, , ISBN 978-93-8233879-6,2013.
[2] Ritu
Tripathi
and
Sanjay
Agrawal
Comparative Study of Symmetric and
AsymmetricCryptography
Techniques,International Journal of Advance
Foundation and Research in Computer
ISSN: 2394-2231
http://www.ijctjournal.org
Page 49
ISSN: 2394-2231
http://www.ijctjournal.org
Page 50