Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish

Main Article Content

Haneen Alabdulrazzaq
Mohammed N. Alenezi

Abstract

With the advancement of the Internet, many individuals and organizations have started to use it to store and send personal or business information. Some of this information is highly confidential and that, in turn, raises an issue of data privacy and confidentiality. Major advances in the Internet have also aided intruders in getting unauthorized access to confidential information. Information Security is the art of securing data from illegitimate access while ensuring integrity, availability, and confidentiality of data. Information Security is achieved through cryptographic encryption and decryption algorithms. Encryption hides confidential information by converting it to an unreadable form while the reverse process of retrieving data from the unreadable or encrypted form is known as decryption. Many cryptographic algorithms exist today and selecting which one to use depends on several factors and measures. This paper conducts a comparison of the encryption speed for five different cryptographic symmetric block-cipher algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. The simulation is done using Python with various text file sizes. The results show that Blowfish outperforms the rest of the algorithms that were tested.

Article Details

How to Cite
Alabdulrazzaq, H., & Alenezi, M. N. (2022). Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. International Journal of Communication Networks and Information Security (IJCNIS), 14(1). https://doi.org/10.17762/ijcnis.v14i1.5262 (Original work published April 12, 2022)
Section
Research Articles

References

References

M. Mushtaq, S. Jamel, A. Disina, Z. Pindar, N. Shakir, and M. Mat Deris, “A survey on the cryptographic encryption algorithms,” International Journal of Advanced Computer Science and Applications, vol. 8, pp. 333–344, 11 2017.

A. Shorman and M. Qatawneh, “Performance improvement of double data encryption standard algorithm using parallel computation,” International Journal of Computer Applications, vol. 179, pp. 1–6, 03 2018.

A. Kahate, Cryptography and Network Security. Tata Mcgraw-Hill Publishing Company Limited, 2003. [Online]. Available: https://books.google.com.kw/books?id=SWbn3lBe2FcC

H. Zodpe and P. Wani, “Design and implementation of algorithm for des cryptanalysis,” 12 2012, pp. 278–282.

B. J. Saha and K. Kabi, “Digital image encryption using ecc and des with chaotic key generator,” International Journal of Engineering Research & Technology (IJERT), vol. 2, 11 2013.

P. Patil, P. Narayankar, D. Narayan, and S. M. Meena, “A comprehensive evaluation of cryptographic algorithms: Des, 3des, aes, rsa and blowfish,” Procedia Computer Science, vol. 78, pp. 617–624, 2016.

M. Panhwar, S. Ali Khuhro, G. Panhwar, and K. Ali, “Saca: A study of symmetric and asymmetric cryptographic algorithms,” IJCSNS International Journal of Computer Science and Network Security, vol. 19, no. 1, 01 2019.

C. Rahmad, K. Arai, A. Prasetyo, and N. Arizki, “Noble method for data hiding using steganography discrete wavelet transformation and cryptography triple data encryption standard: Des,” International Journal of Advanced Computer Science and Applications, vol. 9, 01 2018.

R. Patel and P. Kamboj, “Security enhancement of blowfish block cipher,” 08 2016, pp. 231–238.

E.Jeevalatha and S.SenthilMurugan, “Evolution of aes, blowfish and two fish encryption algorithm,” International Journal of Scientific and Engineering Research, vol. 9, 04 2018.

P. Gehlot, S. R. Biradar, and B. P. Singh, “Implementation of modified twofish algorithm using 128 and 192-bit keys on vhdl,” International Journal of Computer Applications, vol. 70, pp. 36–42, 2013.

B. Schneier, “The twofish encryption algorithm,” https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html, Dec. 1998, [Online; accessed 11 Nov 2021].

R. Bhanot and R. Hans, “A review and comparative analysis of various encryption algorithms,” International Journal of Security and Its Applications, vol. 9, no. 4, 2015.

S. S. A, A. M. George, and P. S, “The skien hash function,” International Journal of Engineering Research and Applications, vol. 3, 12 2013.

D. Bujari and E. Aribas, “Comparative analysis of block cipher modes of operation,” 11 2017.

M. Bellare, P. Rogaway, and D. Wagner, “The eax mode of operation,” in International Workshop on Fast Software Encryption. Springer, 2004, pp. 389–407.

E. B. Kavun, H. Mihajloska, and T. Yalcin, “A survey on authenticated encryption–asic designer’s perspective,” Cryptology ePrint Archive, 2019.

M. N. A. Wahid, A. K. Ali, B. Esparham, and M. Marwan, “A comparison of cryptographic algorithms: Des, 3des, aes, rsa and blowfish for guessing attacks prevention,” 2018.

N. Tyagi and A. Ganpati, “Comparative analysis of symmetric key encryption algorithms,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 8, 2014.

P. Princy, “A comparison of symmetric key algorithms des, aes, blowfish, rc4, rc6: A survey,” International Journal of Computer Science & Engineering Technology (IJCSET), vol. 6, no. 5, 2015.

M. Mathur and A. Kesarwani, “Comparison between des, 3des, rc2, rc6, blowfish and aes,” 2013.

P. Nema and M.A.Rizvi, “Critical analysis of various symmetric key cryptographic algorithms,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 3, no. 6, June 2015.

A. Nadeem and M. Y. Javed, “A performance comparison of data encryption algorithms,” International Conference on Information and Communication Technologies, pp. 84–89, 2005.

V. Vijaya, R. Ausuria, and N. Surya, “Design and implementation of threefish cipher algorithm blocks using fpga,” vol. 6, 10 2017.

L. GitHub, “Crypto.cipher package,”

https://pycryptodome.readthedocs.io/en/latest/src/cipher/cipher.html, Jun. 2014, [On- line; accessed 12 Dec 2021].

N. Ferguson, “twofish 0.3.0,” https://pypi.org/project/twofish/, Nov. 2013, [Online; accessed 12 Dec 2021].

H. Fu¨rstenau, “Pyskein 1.0 - the skein hash algorithm for python,” https://pythonhosted.org/pyskein/index.html, Aug. 2013, [Online; accessed 12 Dec 2021].

C. wiki, “Threefish,” https://www.cryptopp.com/wiki/Threefish, Sep. 2021, [Online; accessed 14 Dec 2021].