Superiority of Blowfish Algorithm

Superiority of Blowfish Algorithm Pratap Chnadra Mandal Asst. Prof, Dept of Computer Application B.P.Poddar Institute of Management & technology, West Bengal, India Abstract: Information Security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security systems. This paper provides a fair comparison between four most common and used symmetric key algorithms: DES, 3DES, AES and Blowfish. A comparison has been made on the basis of these parameters: rounds block size, key size, and encryption / decryption time, CPU process time in the form of throughput and power consumption. These results show that blowfish is better than other algorithm.

[1]  P. V. Oorschot Overview of Cryptography , .

[2]  Mohey M. Hadhoud,et al.  Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..

[3]  Jyoti Vashishtha Evaluating the performance of Symmetric Key Algorithms: AES (Advanced Encryption Standard) and DES (Data Encryption Standard) , 2012 .

[4]  R. Umarani,et al.  A Survey on Various Most Common Encryption Techniques , 2012 .

[5]  Kallam Ravindra Babu,et al.  A Survey on Cryptography and Steganography Methods for Information Security , 2010 .

[6]  Arvind Kalia,et al.  PERFORMANCE ANALYSIS OF SYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS: DES, AES and BLOWFISH , 2011 .

[7]  Sandeep Sharma,et al.  Performance Analysis of Cryptography Algorithms , 2012 .

[8]  M.Y. Javed,et al.  A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.

[9]  Nagesh Kumar,et al.  DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .

[10]  Ali Ahmad Milad,et al.  Comparative Study of Performance in Cryptography Algorithms (Blowfish and Skipjack) , 2012 .

[11]  Malik Imran,et al.  Performance Evaluation of Symmetric Cryptography Algorithms : A Survey 1 , 2013 .

[12]  E. Ramadevi,et al.  STUDY AND PERFORMANCE ANALYSIS OF CRYPTOGRAPHY ALGORITHMS , 2012 .

[13]  Rajan Mishra,et al.  Comparative Analysis Of Encryption Algorithms For Data Communication , 2011 .

[14]  Monisha Sharma,et al.  Implementation and analysis of various symmetric cryptosystems , 2010 .

[15]  P. Krishnamurthy,et al.  Encryption and Power Consumption in Wireless LANs , 2001 .