It means that only the authenticated people are able 2) Asymmetric Encryption
to interpret the message content and no one else.
It is also called as public key cryptography. It uses
Integrity: Assuring the receiver that the received two keys: public key,which is known to the public,
message has not been altered in any way from the used for encryption and private key, which is known
original. The basic form of integrity is packet check only to the user of that key, used for decryption. The
sum in IPv4 packets. public and the private keys are related to each other by
any mathematical means. In other words, data
Non-repudiation: A mechanism to prove that the encrypted by one public key can be encrypted only by
sender really sent this message. Means that neither its corresponding private key. Encryption and
the sender nor the receiver can falsely deny that decryption procedure as shown below in figure 3:
they have sent a certain message.
Service Reliability and Availability: Since secure
Encryption
systems usually get attacked by intruders, which Plaintext Ciphertext
may affect their availability and type of service to
their users. Such systems provide a way to grant
their users the quality of service they expect. Public Key
7
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, Volume 1, Issue 1, November 2011)
8
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, Volume 1, Issue 1, November 2011)
AES: (Advanced Encryption Standard), also The results shows that AES outperformed other
known as the Rijndael(pronounced as Rain Doll) algorithms in both the number of requests processes per
algorithm, is a symmetric block cipher that can encrypt second in different user loads, and in the response time
data blocks of 128 bits using symmetric keys 128, 192, in different user-load situations.
or 256. AES was introduced to replace the DES. Brute
(N. Penchalaiahet.al., 2010) discussed the principal
force attack is the only effective attack known against
advantages of AES with respect to DES, as well as its
this algorithm.
limitations. They said that AES can be quite
Blowfish: Blowfish is a symmetric block comfortably implemented in high level or low level
cipher that can be effectively used for encryption and languages.
safeguarding of data. It takes a variable-length key,
(Elminaam et. al., 2010) presented a comparison of
from 32 bits to 448 bits, making it ideal for securing
AES, DES, 3DES, RC2, Blowfish and RC6. They used
data. Blowfish was designed in 1993 by Bruce Schneier
different settings for each algorithm such as different
as a fast, free alternative to existing encryption
sizes of data blocks, different data types, battery power
algorithms. Blowfish is unpatented and license-free,
consumption, different key size and finally
and is available free for all uses. Though it suffers from
encryption/decryption speed. They concluded that in
weak keys problem, no attack is known to be successful
case of changing packet size Blowfish showed better
against it (Bruce, 1996) (Nadeem, 2005).
performance than other algorithms followed by RC6.
B. Other Contributions
AES had better performance than RC2, DES, and
(Tamimi, 2008) provided a performance comparison 3DES. In case of changing key size – it was concluded
between four most common algorithms: DES, 3DES, that higher key size leads to clear change in the battery
AES, and Blowfish. The comparison had been and time consumption.
conducted by running several different settings to
(Singhal and Raina, 2011) presented a comparative
process different sizes of data blocks to evaluate the
analysis between AES and RC4 for better utilization. In
algorithm’s encryption/decryption speed. The
this paper authors tried to find out performance
simulation setup was in C# programming language.
comparison between block ciphers (AES) and stream
The results of this paper shows that blowfish has a
cipher (RC4) algorithm. Based on the analysis and
better performance than other common encryption
result, this paper concluded that which algorithm is
algorithms. AES showed poor performance results
better to use based on different performance metrics.
compared to other algorithms since it requires more
The various metrics were: Encryption time, Decryption
processing power.
time, Throughput, CPU process time, Memory
(Nadeem, 2005) In this paper, the popular secret key Utilization.
algorithms including DES, 3DES, AES (Rijndael),
III. OBJECTIVE
Blowfish, were implemented, and their performance
was compared by encrypting input files of varying The objective of the paper is to provide a
contents and sizes. The algorithms were implemented performance analysis between symmetric key
in Java programming, using their standard cryptography algorithms: DES, AES and Blowfish. The
specifications, and were tested on two different analysis has been conducted by running several
hardware platforms, to present the comparison. The two encryption settings to process different sizes of data
different machines are: P-II 266 MHz and P-IV 2.4 blocks to evaluate the algorithm's speed for encryption
GHz. and decryption. The paper also shows the analysis on
the basis of two block cipher modes: ECB, CBC, OFB,
(Dhawan, 2002) has also done experiments for
and CFB. Each algorithm is designed and executed in
comparing the performance of the different encryption
these modes.The variation is provided in data size
algorithms implemented inside .NET framework. Their
given by the user. The data is retrieved from various
results are close to the ones shown before. The
text files to calculate the time consumed by each
comparison was performed on the following
algorithm to process the retrieved data.
algorithms: DES, Triple DES (3DES), RC2 and AES
(Rijndael).
9
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, Volume 1, Issue 1, November 2011)
10
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, Volume 1, Issue 1, November 2011)
As expected CBC require more processing time than between the four modes is hard to see by the naked eye
ECB because of its key-chaining nature. The results because it is relatively small. The results show the
indicate that the extra time added is not significant for superiority of Blowfish algorithm over other algorithms
many applications, knowing that CBC is much better in terms of the processing time.
than ECB in terms of protection. The difference
between the two modes is hard to see by the naked eye
because it is relatively small. Again the results show
the superiority of Blowfish algorithm over other
algorithms in terms of the processing time.
C. Performance with OFB Mode:
The third set of experiments were conducted using
OFB mode, the results are shown in figure 6 below. As
expected OFB require less processing time than ECB &
CBC. The results indicate that the OFB is better for
applications requiring output feedback. The difference
between the three modes is hard to see by the naked eye
because it is relatively small. Again the results show
the superiority of Blowfish algorithm over other
algorithms in terms of the processing time. Figure 7: Performance Results with CFB mode
VI. CONCLUSION AND FUTURE SCOPE
The presented simulation results showed that
Blowfish has a better performance than other common
encryption algorithms used. Since Blowfish has not any
known security weak points so far, this makes it an
excellent candidate to be considered as a standard
encryption algorithm. AES showed poor performance
results compared to other algorithms since it requires
more processing power. Using CBC mode has added
extra processing time, but overall it was relatively
negligible especially for certain application that
requires more secure encryption to a relatively large
data blocks. OFB shows better performance than ECB
and CBC but require more processing time than CFB.
Overall time differences between all modes are
negligible.
In future this analysis can be implemented in better
simulators to get better results. This analysis can be
Figure 6: Performance Results with OFB mode done in another simulator by taking networking into
consideration to show which algorithm performs better
in network. The simulators which can be used are:
D. Performance with CFB: MATLAB, ns2, ns3, OPNET, NetSim etc. These
simulators will give better results for cryptographic
The fourth set of experiments were conducted using applications in network.
CFB mode, the results are shown in figure 7 below. As
expected CFB require less processing time than ECB &
CBC. The results indicate that the OFB is better than
CFB in terms of processing time. The difference
11
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, Volume 1, Issue 1, November 2011)
[2] Singh, S Preet and Maini, Raman. “Comparison of Data [21] Menezes, A., Oorschot, P. and Vanstone, S. (1996).
Encryption Algorithms”, International Journal of Computer “Handbook of Applied Cryptography”.CRC Press.
Science and Communication, vol. 2, No. 1, January-June [22] Moshopoulos, Nikosand and Chaniotakis, Eleftherios; “A
2011, pp. 125-127. Survey of Cryptography Algorithms – Trends and Products”;
[3] Elminaam, D S Abd; Kader H M Abdual and Hadhoud, M National Technical University of Athens, Electrical &
Mohamed. “Evaluating the Performance of Sysmmetric Computer Engineering Department, HeroonPolytehneiou 9,
Encryption Algorithms”, International Journal of Network 15773 Zographou, Athens, GREECE.
Security, Vol. 10, No. 3, pp. 216-222, May 2010. [23] Schneier, B.; Kelsey, J.; Whiting,D.; Wagner, D.; Hall C.
[4] Penchalaiah, N. and Seshadri, R. “Effective Comparison and and Ferguson N.; “Performance Comparison of the AES
Evaluation of DES and Rijndael Algorithm (AES)”, Submissions”; version 2.0; 1999.
International Journal of Computer Science and Engineering, [24] Jorstad, Norman D.;“Cryptographic Algorithm Metrics “;
Vol. 02, No. 05, 2010, 1641-1645. Institute for Defense Analyses Science and Technology
[5] Stallings, W; ”Cryptography and Network Security: Division; 1997.
Principals and Practices”, Prentice Hall, 8th Edition, 2009. [25] Verisign: http://www.verisign.com.
[6] Tamimi, A Al; “Performance Analysis of Data Encryption [26] Rivest, R. L., Shamir, A., Adelmann, L.: “A method for
Algorithms”, Oct 2008. obtaining digital signature and public –key cryptosystems”,
[7] Results of Comparing Tens of Encryption Algorithms Using Commun. ACM, 1978, VOL. 21, pp. 120-126
Different Settings – Crypto++ Benchmarks, Retrieved Oct. [27] Jorstad, Norman D.; “Cryptographic Algorithm Metrics “;
1, 2008. (http://www.eskimo.com/weidai/benchmarks.html). Institute for Defense Analyses Science and Technology
[8] Nadeem, Aamer; "A Performance Comparison of Data Division; 1997.
Encryption Algorithms", IEEE 2005. [28] Gustafson, H.; et al.; “A Computer Package for Measuring
[9] [Hardjono2005]," Security In Wireless LANS And MANS the Strength of Encryption Algorithms,”; Computers &
,". Artech House Publishers 2005. Security, Vol 13, No. 8, 1994, Elsiver Science, Ltd., pp.
687-697.
[10] Stallings, W;”Cryptography and Network Security”, Prentice
Hall, 4th Edition, 2005. [29] Towbridge, Dave; “Public-key Crypto Gives Privacy Power
To The People,”; Computer Technology Review, Vol XV,
[11] [Edney2003]," Real 802.11 Security: Wi-Fi Protected Access No. 4, April 1995, p 10.
and 802.11i ,". Addison Wesley 2003.
[30] Lenstra, A. K. and Verheul, E. R.; “Selecting cryptographic
[12] [RFC2828],"Internet Security Glossary", key sizes,”; Journal of Cryptography 14(4), 2001, 255-293.
http://www.faqs.org/rfcs/rfc2828.html.
[31] “A Brief History of Cryptography”; 2001. University of
[13] [TropSoft] "DES Overview", Dayton School of Law. 19 Oct. 2004
http://www.tropsoft.com/strongenc/des.htm. <http://cybercrimes.net/Cryptography/Articles/Hebert.html
>.
[14] Dhawan, Priya; "Performance Comparison: Security Design
Choices," Microsoft Developer Network October 2002. [32] “History of Cryptography” Wikipedia.
http://msdn2.microsoft.com/en-us/library/ms978415.aspx <http://en.wikipedia.org/wiki/History_of_cryptography>.
[15] [Bruce1996] Schneier, Bruce; "Applied Cryptography", John [33] www.cc.gatec
Wiley & Sons, Inc 1996.
[16] WEBSITE
http://download.oracle.com/javase/6/docs/technotes/guides/s
ecurity/crypto/CryptoSpec
[17] National Institute of Standards and Technology, Data
Encryption Standard, FIPS 46-2, 1993.
[18] Kaufman, Charlie; Perlman, Radia and Speciner, Mike.
“Network Security Private Communication in a Public
World”; Second Edition; Pearson Education; Prentice Hall.
12