5. Conclusion
Data being an important asset these days, its security
has become very crucial. Various popular
encryption and decryption techniques used have
been discussed in this paper. Those encryption
techniques are studied and analyzed well to
conclusively discuss the performance of the
encryption methods. This paper presents the
performance evaluation of selected symmetric and
asymmetric algorithms. The selected algorithms are
AES, 3DES, Blowfish and DES. From the above
discussions it can be concluded that blowfish is the
most strongest of all followed by AES while 3DES
is least secure to be used these days.
References