Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms
نویسندگان
چکیده
In this paper, Performance analysis of RC5, Blowfish and DES block cipher algorithms have been done on the basis of execution time and resource utilization. CPU utilization and memory utilization both are considered for determining resource utilization. These three algorithms are parameterized algorithm and encrypt two w-bits at a time. Allowable choices for w are 16 bits, 32 bits, and 64 bits. Blowfish and DES have same structure for encryption and decryption while RC5 have different. RC5 has 12 and Blowfish & DES have 16 rounds. These three algorithms have a variable block size and a variable key size in their structure. Performances of RC5 & Blowfish algorithms have been evaluated on key size of 128-bits, 192-bit and 256-bit while key size is fixed 64-bit for DES in this paper.
منابع مشابه
Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography
In the era of information technology, security is essential to transmit confidential information (like credit card details, banking transactions etc) over the unsecured network like internet. It is possibility that the information that is being transferred through network of computers or internet being read by other people. For this we need an efficient and secure way to protect our data. Crypt...
متن کاملData Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System
This paper contains a technique for secret communication using cryptography. It is a technique which is used to protect the important data. The secret message is encrypted by a block cipher based on two cryptographic algorithms, the Data Encryption Standard (DES) and the Triple Data Encryption Algorithm (TDEA) which may be used by Federal organizations to protect sensitive data. This algorithm ...
متن کاملPerformance Evaluation of RC6, Blowfish, DES, IDEA, CAST-128 Block Ciphers
Rapid growth of internet applications fueled the need for securing information and computers. Encryption algorithms play vital role to secure information. This paper provides comparison of most common encryption algorithms namely: DES, Blowfish, CAST-128, RC6, IDEA. Performance evaluation is carried out on the basis of execution time and throughput. These algorithms has different key and block ...
متن کاملComparison of Blowfish and Cast-128 Algorithms Using Encryption Quality, Key Sensitivity and Correlation Coefficient Analysis
This paper demonstrates the performance of well known block ciphers Blowfish and Cast-128, considering different aspects of security namely, Encryption quality, Key sensitivity test and Statistical analysis. Statistical analysis is conducted using images by test on the histogram of encrypted images and correlation of horizontally adjacent pixels in an encrypted image.
متن کاملOn Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm
This paper analyzes the security of the RC5 encryption algorithm against differential and linear cryptanalysis. RC5 is a new block cipher recently designed by Ron Rivest. It has a variable word size, a variable number of rounds, and a variable-length secret key. In RC5, the secret key is used to fill an expanded key table which is then used in encryption. Both our differential and linear attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012