AComparative Study Among Cryptographic Algorithms
AComparative Study Among Cryptographic Algorithms
net/publication/325106192
CITATIONS READS
2 2,417
2 authors:
All content following this page was uploaded by Ammar Thabit Zahary on 12 May 2018.
Abstract: The encryption in the field of information technology contains the conversion of data and files from the known
formula to other types of files. Therefore, the original form of files cannot be traced without knowing the key that is used in the
encryption process. Different types of encryption algorithms can exist with different properties. The appropriate algorithm can
be chosen according to the nature of application, each application suits with a specific algorithm. In this paper, a comparative
study was conducted for three types of algorithms AES, RSA, and Blowfish. Many performance metrics were used such as
symmetric/asymmetric key, key size in bits, encryption speed, decryption speed and file size to determine the properties of each
algorithm. Results show that RSA algorithm is very slow. Blowfish and AES treat the small files very quickly however, if the file
is large, speed of algorithms will differ. The symmetric Blowfish algorithm is faster than AES and RSA algorithms. Symmetric
algorithms provide higher security and higher speed for encryption and decryption, and asymmetric algorithms provide high
security but with more processing time.
Keywords: Encryption, Decryption, Symmetric Key, Asymmetric Key, Advanced Encryption Standard (AES), Blowfish.
encryption and decryption. Symmetric key have the memory size, consumption time and other criteria. The
advantage of encryption speed and low using of power study showed that the AES least commonly used
consumption [3]. Symmetric key algorithms are two memory, and the RSA takes the longest time
types, the stream cipher in which one bit is encrypted at consumption and high memory. Authors in [11]
time and the block cipher in which the algorithm treats introduced an evaluating study for the encryption
the block to be encrypted one at time, the block size is algorithms performance, which includes AES and
dependent on the algorithm [4]. blowfish, the results showed that in term of packet size,
2.1.1 Advanced Encryption Standard (AES) the blowfish showed better results than other algorithms.
It is a kind of symmetric key encryption. AES is not And in term of performance the AES is better than other
feistel cipher. It is uses a block cipher with 128 bits, key algorithms. Authors in [12] produced an evaluating
bits (128, 192 and 256) and uses Rounds of 10, 12 and study for the performance of encryption algorithms,
14 [4]. which includes AES and Blowfish. The results showed
2.1.2 Blowfish algorithm that the blowfish is the best performance. Authors in
It is a kind of symmetric key encryption that uses a [13], produced a study of various algorithms includes
block cipher and key bits from 32 bits to 448 bits. It uses AES, Blowfish. The study showed that in term of
on block cipher 64 bits. Blowfish uses a different key throughput performance the Blowfish is the best.
sizes with 64 bits block. Data encryption process is Authors in [9], introduced a performance study of
executed by 16 rounds fiestel network, each round encryption algorithms AES and Blowfish. The criteria
contain P-box and substitution s-box [10]. are time consumption and encryption performance. The
study was done on different types of files and images.
2.2 Asymmetric Key Algorithms The study conclusion was reach to that the Blowfish is
Asymmetric key algorithm is a type of the algorithms, in better performance than AES in all cases. Authors in [14]
which different keys are used for encryption and proposed a study on the performance of encryption
decryption process, called private and public key, the algorithms including AES, RSA in cloud computing.
public key used by a sender to encrypt the message and The study showed that the RSA the most time
the privet key used by the receiver to decrypt the consuming and less speed, AES is the higher speed and
message [4]. encryption speed depend on the file size, the lower the
file size the more speed of encryption.
2.2.1 RSA
The RSA (Rivest-Shamir-Adleman) algorithm is based
on a public key algorithm which is known and used on a 4. The Methodology of the Comparative
large scale. It uses a large key bit (should be more than Study
1024 bits). It is one of asymmetric encryption algorithms In this paper, data were analysed using Advanced
used two different keys for encryption and decryption Encryption Package 2015 and Oracle software. Oracle
[8]. software was used to calculate the count of character in
each RSA decryption message. Encryption Package
3. RELATED WORK 2015 was used to determine the performance (encryption
Authors in [6] introduced a study for the symmetric speed, decryption speed, file size) of each algorithm to
encryption algorithms performances, the study included make comparison among algorithms (Blowfish, AES)
algorithms of AES, Blowfish and assess the encryption and apply to different types of files such as mp4, pdf, txt,
algorithms in different environments. It includes the jpg files, and to detect RSA algorithms behaviours on
volumes of data, various types of data blocks, speed of different bits key sizes, size of message and size of
encryption and speed of decryption. The results showed output message.
that the blowfish require less time than other algorithms Figures 1, 2 show the diagrams of symmetric and
and the time consumption is effected by change in the asymmetric algorithms used in this paper.
key size. Authors in [7] presented an analysis
comparative study between encryption algorithms
includes AES and RSA. The study uses the criteria of
International Arab Conference on Information Technology (ACIT'2016)
to calculate a count of characters in each RSA Table 4: Summary of the results of RSA decryption
decryption message. algorithms
As RSA algorithm is very slow, so small messages sizes Key Length of encrypted Length of decrypted
(rang from 1 to 20 characters) were used to examine the bit message (character) message (character)
performance of RSA algorithm with different keys sizes
512 516 1
(512, 768, 1024, and 2048). 512 532 10
Generate public and privet key: 512 532 20
At the first generate the public and private key by uses 768 557 1
the Encryption Package software. 768 581 10
RSA algorithm encryption: 768 581 20
1024 601 1
After the public and private keys were created, the RSA 1024 622 10
encryption algorithm was performed. The results were 1024 622 20
obtained by copy the message that generated by RSA 2048 772 1
encryption. Oracle database was used to know the 2048 792 10
number of characters in each message. 2048 797 20
Oracle database steps:
1. Create a Table.
2. Insert the message that created from RSA encryption
algorithm into a Table.
3. Perform a select query to determine the number of
characters in each encrypted message. The summary of
the results of RSA encryption algorithm will be
presented here. The results of Table 3 were obtained by
different key bits and different lengths of input. Oracle
database was used to calculate the count of characters in
each RSA encryption message. Figure 7: Summary of the results of RSA
decryption algorithms
Table 3: Summary of the results of RSA encryption
algorithm From the results of Tables 4, 5 and Figure 7:
Key Length of source Length of encrypted The increase in the key length will increase the length
bit message (character) message (character)
of encrypt message and security.
512 1 516
512 10 532
512 20 532 5.4 Comparison of Encryption Techniques
768 1 557 A comparison between algorithms was done by analysis
768 10 581 the results of the comparison algorithms. As RSA
768 20 581 algorithm is very slow, so small messages sizes (rang
1024 1 601 from 1 to 20 characters) were used. The Blowfish and
1024 10 622 AES algorithms were tested with a different data types
1024 20 622
2048 1 772
such as (text, pdf, mp4, jpg, flv) and sizes (rang from
2048 10 792 101 byte to 42.8 Megabyte) to make comparison
2048 20 797 between algorithms. Table 5 shows the results of
encryption algorithms (AES, Blowfish) and Table 6
The summary of the results of RSA decryption shows the results of decryption algorithms (AES,
algorithm will be presented here. As shown in Table 4, Blowfish).
the results of key bit, length of input encryption message
and length of output decryption message were obtained.
International Arab Conference on Information Technology (ACIT'2016)
Table 5: Comparison between AES and Blowfish 2.flv.aep 5390 5390 5390
1.flv.aep 6780 6780 6780
encryption algorithms
3.flv.aep 7650 3830 7650
AES and Blowfish encryption algorithms
1.mp4.aep 9100 4550 4550
AES Blowfish
File name 2.pdf.aep 42800 4750 4750
File Size encryption encryption
with
(kb) speed speed
extension
(kb/s) (kb/s)
1.txt 0.101 0.101 0.101
4.jpg 4.4 4.4 4.4
1.jpg 8.13 8.13 8.13
3.jpg 23.5 23.5 23.5
2.jpg 68.3 68.3 68.3
1.pdf 533 533 533
3.pdf 892 892 892
2.mp4 3250 3250 3250
2.flv 5390 5390 5390
1.flv 6780 6780 6780
3.flv 7650 7650 7650
1.mp4 9100 4550 4550
2.pdf 42800 4750 5350
clear that Blowfish and AES encryption and decryption IJCSNS International Journal of Computer Science and
algorithms treated the small files very quickly, but if the Network Security, VOL.8 No.12, pp. 280-286, 2008.
file is large, the speed will differ. Encryption algorithm [7] Shashi Mehrotra Seth, Rajan ishra, “Comparative
is faster than decryption algorithm. In RSA, results show Analysis of Encryption Algorithms for Data
Communication”, International Journal of Computer
that increasing the key length will increase the length of
Science and Technology, Vol. 2, Issue 2, pp. 292-294,
encrypt message and consequently the security will 2011.
increase. As a comparison, Blowfish encryption and [8] Anjula Gupta and Navpreet Kaur Walia, “Cryptography
decryption is faster than AES and RSA because it takes Algorithms: A Review”, Department of Computer
the lowest processing time, and AES algorithm is faster Science, Sri Guru Granth Sahib World University, India,
than RSA algorithm in terms of encryption and IJEDR | Volume 2, Issue 2 | ISSN: 2321-9939, 2014.
decryption speed. In addition, symmetric algorithms [9] Tingyuan Nie Teng Zhang, “A study of DES and
provide high security with high speed of encryption and Blowfish encryption algorithm”, Tencon IEEE
decryption, and asymmetric algorithm can provide high Conference, 2009.
security but with more processing time. The future work [10] J. V. Shanta, “Evaluating the performance of Symmetric
Key Algorithms: AES (Advanced Encryption Standard)
should be concerned with more studies of algorithms to
and DES (Data Encryption Standard)”, IJCEM
improve the algorithms properties, encourage of International Journal of Computational Engineering &
choosing the best algorithm especially for critical Managemen, vol. 15, no. 4, pp.43-49, 2012.
application, and perform another study that enhanced on [11] Diaa Salama Abd Elminaam, Hatem Mohamed Abdual
methods that increase the security level of the Kader and Mohiy Mohamed Hadhoud, “Evaluating the
application. Performance of Symmetric Encryption Algorithms”,
International Journal of Network Security, Vol.10, No.3,
REFERENCES PP.213, 2010.
[12] Gurjeevan Singh, Ashwani Kumar Singla and K.S.
[1] Gurpreet Singh and Supriya, “A Study of Encryption
Sandha, “Through Put Analysis of Various Encryption
Algorithms (RSA, DES, 3DES and AES) for Information
Algorithms”, IJCST Vol. 2, Issue 3, 2011.
Security”, International Journal of Computer
[13] National Conference on Computer Communication &
Applications (0975 – 8887) Volume 67– No.19, 2013.
Informatics, “Performance Analysis of AES and Blowfish
[2] AL.Jeeva, Dr.V.Palanisamy and K.Kanagaram,
Algorithms”, School of computer science, RVS college
“Comparative Analysis of Performance Efficiency and
of arts and science, 2012.
Security Measures of Some Encryption Algorithms”,
[14] Priyanka Arora, Arun Singh and Himanshu Tiyagi,
International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622, Vol. 2, Issue 3, “Evaluation and Comparison of Security Issues on
Cloud Computing Environment", World of Computer
2012.
Science and Information Technology Journal (WCSIT),
[3] Pinal Salot, “A Survey Of Various Scheduling Algorithm
Vol. 2, No. 5, pp. 179-183, 2012.
In Cloud Computing Environment”, International Journal
of Research in Engineering and Technology ISSN 2319-
1163, 2013.
[4] Rashmi Nigoti, Manoj Jhuria and Dr.Shailendra Singh,
“A Survey of Cryptographic Algorithms for Cloud
Computing”, International Journal of Emerging
Technologies in Computational and Applied
Sciences,Vol. 4, pp.141-146, 2013.
[5] N. Islam, M. H. Mia, M. F. I. Chowdhury and M. A.
Matin, “Effect of Security Increment to Symmetric Data
Encryption through AES Methodology”, Ninth ACIS
International Conference on Software Engineering,
Artificial Intelligence, Networking, and
Parallel/Distributed Computing, 2008.
[6] Diaa Salama Abdul.Elminaam, Hatem Mohamed Abdul
Kader and Mohie Mohamed Hadhoud, “Performance
Evaluation of Symmetric Encryption Algorithms”,