125-127
ABSTRACT
This paper tries to present a fair comparison between the most common and used algorithms in the data encryption
field. The two main characteristics that identify and differentiate one encryption algorithm from another are its
ability to secure the protected data against attacks and its speed and efficiency in doing so. This paper provides a
performance comparison between four of the most common encryption algorithms: DES, 3DES, Blowfish and AES.
The comparison has been conducted by running several encryption settings to process different sizes of data blocks
to evaluate the algorithm’s encryption/decryption speed. Since our main concern here is the performance of these
algorithms under different settings, the presented comparison takes into consideration the behavior and performance
of the algorithm when different data loads are used. Simulation has been conducted using C# language.
Keywords: Encryption Algorithms, Cryptography, AES, DES, Blowfish, TripleDES.
4. SIMULATION RESULTS
Simulation results for this compassion point are Simulation results for this compassion point are
shown Fig. 3 and Table 1 at encryption stage. The results shown Fig. 4 and Table 2 decryption stage. We can find in
show the superiority of Blowfish algorithm over other decryption that Blowfish is the better than other algorithms
algorithms in terms of the processing time. It can also be in throughput and power consumption. Finally, Triple
noticed here; that 3DES has low performance in terms of DES (3DES) still requires more time than DES.
power consumption and throughput when compared with
DES. It requires always more time than DES because of its
triple phase encryption characteristics.
This section will show the results obtained from The difference between two modes is hard to see by
running the simulation program using different data loads. the naked eye, the results showed that the average
The results show the impact of changing data load on each difference between ECB and CBC is 0.059896 second,
algorithm and the impact of Cipher Mode (Encryption which is relatively small.
Mode) used.
REFERENCES
Fig. 5: Performance Results with ECB Mode [1] Aamer Nadeem, “A Performance Comparison of Data
The results show the superiority of Blowfish Encryption Algo”. IEEE 2005.
algorithm over other algorithms in terms of processing [2] “Wireless Security Handbook”, Auerbach
time. It shows also that AES consumes more resources Publications 2005.
when data block size is relatively big. Another point can [3] Bruce Schneier, “Applied Cryptography”, John Wiley
be noticed here that 3DES requires always more time than and Sons, Inc 1996.
DES because of its triple phase encryption characteristic.
[4] Ferguson, N., Schneier, B., and Kohno T., (2010).
Blowfish, which has a long key (448 bit), outperformed
“Cryptography Engineering: Design Principles and
other encryption algorithms. DES and 3DES are known to
Practical Applications”. New York : John Wiley
have worm holes in their security mechanism, Blowfish
and Sons.
and AES do not have any so far.
[5] Electronic Frontier Foundation. (1998). Cracking DES:
4.2 Performance Results with CBC Secrets of Encryption Research, Wiretap Politics and
Chip Design. Sebastopol, CA: O’Reilly and Associates.
As expected, CBC requires more processing time than ECB
because of its key-chaining nature. The results show in [6] F.I.P. Standard, Advanced Encryption Standard (AES),
Fig. 6 indicates also that the extra time added is not National Institute of Standards and Technology
significant for many applications, knowing that CBC is (NIST), 2001.
much better than ECB in terms of protection. [7] Bruce Schneier. “The Blowfish Encryption Algorithm
Retrieved”, October 25, 2008.
[8] A.A. Tamimi, “'Performance Analysis of Data
Encryption Algorithms”. Retrieved October 1, 2008.
[9] W. Stallings, “Cryptography and Network Security”,
Prentice Hall, 4th Ed., 2005.