Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms

Full Text (PDF, 113KB), PP.22-28

Views: 0 Downloads: 0

Author(s)

M. Anand Kumar 1,* S.Karthikeyan 2

1. Karpagam University, India

2. Department of Information Technology, College of Applied Sciences, Sultanate of Oman

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2012.02.04

Received: 2 Jul. 2011 / Revised: 3 Oct. 2011 / Accepted: 19 Nov. 2011 / Published: 8 Mar. 2012

Index Terms

Blowfish, Cryptography, Encryption, Internet, Rejindael, Security, Symmetric algorithms

Abstract

The growth rate of the internet exceeds than any other technology which is measured by users and bandwidth. Internet has been growing at a rapid rate since its conception, on a curve geometric and sometimes exponential. Today, the Internet is moving exponentially in three different directions such as size, processing power, and software sophistication making it the fastest growing technology humankind has ever created. With the rapid growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a vital role in the field of network security. Currently many encryption algorithms are available to secure the data but these algorithms consume lot of computing resources such as battery and CPU time. This paper mainly focuses on two commonly used symmetric encryption algorithms such as Blowfish and Rejindael. These algorithms are compared and performance is evaluated. Experimental results are given to demonstrate the performance of these algorithms.

Cite This Paper

M. Anand Kumar, S.Karthikeyan, "Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.2, pp.22-28, 2012. DOI:10.5815/ijcnis.2012.02.04

Reference

[1]Choudhary, A.R. Sekelsky, A. “Securing IPv6 network infrastructure: A new security model”, IEEE International conference on Technologies for Homeland Security, 2010.
[2]W.Stallings, ''Cryptography and Network Security 4th Ed,'' Prentice Hall , 2005,PP. 58-309 .
[3]Marin, G.A.,” Network security basics”, IEEE Security and Privacy, 1[3], 68, 2005.
[4]Tingyuan Nie Teng Zhang,” A study of DES and Blowfish encryption algorithm, Tencon IEEE Conference,, 2009
[5]Xinmiao Zhang Parhi, K.K. “Implementation approaches for the Advanced Encryption Standard algorithm”, IEEE Circuits and Systems, 2[4], 2002.
[6]R. Chandramouli, ''Battery power-aware encryption - ACM Transactions on Information and System Security (TISSEC),'' Volume 9 , Issue 2 ,May. 2006.
[7]S.Hirani, ''Energy Consumption of Encryption Schemes in Wireless Devices Thesis,'' university of Pittsburgh, April 9, 2003. Retrieved October 1, 2008,
[8]Nadeem, A.; Javed, M.Y, "A Performance Comparison of Data Encryption Algorithms," IEEE Information and Communication Technologies, 2005. ICICT 2005. First International Conference, 2006-02-27, PP. 84- 89.
[9]S.Z.S. Idrus,S.A.Aljunid,S.M.Asi, ''Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers,'' IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008 ,PP 20-25.
[10]Krishnamurthy G.N, Dr. V. Ramaswamy, Leela G.H and Ashalatha M.E,” Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect”, International Journal of Computer Science and Network Security, 8(3), 2008
[11]Downnard.I,”Public-key cryptography extensions into Kerberos”,IEEE Potentials, 21(5), 30 – 34, 2003.
[12]Dorothy E. R. Denning, Cryptography and Data Security. Massachusetts: Addison-Wesley, 1982.
[13]Tingyuan Nie, Chuanwang Songa, Xulong Zhi (2010), “Performance Evaluation of DES and Blowfish Algorithms”, Proceedings of 2010 IEEE International Conference on Biomedical Engineering and Computer Science (ICBECS 2010), 23-25 Apr 2010. pp 1-4
[14]Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader Mohiy Mohamed Hadhoud (2010),“Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Diferent Data Types”, International Journal of Network Security, Vol.11, No.2, Sept. 2010, pp 78–87.