Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms

The growth rate of the internet exceeds than any other technology which is measured by users and bandwidth. Internet has been growing at a rapid rate since its conception, on a curve geometric and sometimes exponential. Today, the Internet is moving exponentially in three different directions such as size, processing power, and software sophistication making it the fastest growing technology humankind has ever created. With the rapid growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a vital role in the field of network security. Currently many encryption algorithms are available to secure the data but these algorithms consume lot of computing resources such as battery and CPU time. This paper mainly focuses on two commonly used symmetric encryption algorithms such as Blowfish and Rejindael. These algorithms are compared and performance is evaluated. Experimental results are given to demonstrate the performance of these algorithms.

[1]  Sohail A Hirani Energy Consumption of Encryption Schemes in Wireless Devices , 2003 .

[2]  Tingyuan Nie,et al.  Performance Evaluation of DES and Blowfish Algorithms , 2010, 2010 International Conference on Biomedical Engineering and Computer Science.

[3]  M.Y. Javed,et al.  A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.

[4]  Abdur Rahim Choudhary,et al.  Securing IPv6 network infrastructure: A new security model , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).

[5]  V. Ramaswamy Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect , 2008 .

[6]  Teng Zhang,et al.  A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.

[7]  Keshab K. Parhi,et al.  Implementation approaches for the Advanced Encryption Standard algorithm , 2002 .

[8]  R. N. Uma,et al.  Battery power-aware encryption , 2006, TSEC.

[9]  Gerald A. Marin Network Security Basics , 2005, IEEE Secur. Priv..

[10]  William Stallings,et al.  Cryptography and network security , 1998 .

[11]  R. Badlishah Ahmad,et al.  Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers , 2008 .

[12]  Mohey M. Hadhoud,et al.  Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types , 2010, Int. J. Netw. Secur..

[13]  I. Downnard Public-key cryptography extensions into Kerberos , 2003 .

[14]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .