Information Security and Computer Fraud
ISSN (Print): 2376-9602 ISSN (Online): 2376-9629 Website: http://www.sciepub.com/journal/iscf Editor-in-chief: Sergii Kavun
Open Access
Journal Browser
Go
Information Security and Computer Fraud. 2015, 3(1), 1-7
DOI: 10.12691/iscf-3-1-1
Open AccessArticle

Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey

Chadi RIMAN1, and Pierre E. ABI-CHAR1,

1Computer Engineering Department, American University of the Middle East, Egaila, Kuwait

Pub. Date: June 16, 2015

Cite this paper:
Chadi RIMAN and Pierre E. ABI-CHAR. Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey. Information Security and Computer Fraud. 2015; 3(1):1-7. doi: 10.12691/iscf-3-1-1

Abstract

Nowadays, network security is increasing rapidly and becoming an important and challenging issue. Information and internet security threats and attacks are becoming difficult to be detected. Therefore, encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. In this paper we implemented four encrypt techniques AES, DES, 3DES and E-DES algorithms and compared their performance. A comparative analysis on the above symmetric encryption algorithms has been made. These algorithms consume a significant amount of computing resources such as CPU time, memory and battery power. Experiments results are given to analyses the effectiveness of each algorithm. The comparison is made on the basis of these parameters: speed, block size, and key size etc. Educational-DES has better performance than other DES, 3DES, and AES algorithms.

Keywords:
cryptography DES 3DES E-DES AES data encryption decryption

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud, “Performance Evaluation of Symmetric Encryption Algorithms”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, pp. 280-286, December 2008.
 
[2]  W. Stallings, Cryptography and Network Security, 4th Edition, Pearson Prentice Hall, 2006.
 
[3]  Singh S Preet, Mani Raman, “Comparison of Data Encryption Algorithms”, International Journal of Computer science and Communications, Vol. 2, No.1, January-June 2011, pp. 125-127.
 
[4]  Cornwell Jason W, “Blowfish Survey”, Department of Computer science, Columbus State university, Columbus, GA, 2010.
 
[5]  Tamimi A. Al., “Performance Analysis of Data Encryption Algorithms”, Oct 2008.
 
[6]  Nadeem Aamer, “Performance Comparison of Data Encryption Algorithms”, Oct 2008.
 
[7]  Dhawan Priya, “Performance Comparison: Security Design Choices”, Microsoft Developer Network October 2002.
 
[8]  Singh Gurjeevan, Kumar Ashwani, Sandha K.S. “A Study of New Trends in Blowfish Algorithm” International Journal of Engineering Research and Applications (IJERA), Vol. 1, Issue 2, pp.321-326.
 
[9]  Agrawal Monika, Mishra Pradeep, “A Comparative Survey on Symmetric Key Encryption Techniques”, International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, pp. 877-882.
 
[10]  Seth Shashi Mehrotra, Mishra Rajan, “Comparative analysis of Encryption algorithm for data communication”, International Journal of Computer Science and Technology, vol. 2, Issue 2, June 2011, pp. 292-294.
 
[11]  Mandal Pratap Chandra, “Superiority of Blowfish Algorithm” IJARCSSE, volume 2, Issue 9, September 2012, pp. 196-201.
 
[12]  Apoorva, Kumar Yogesh, “Comparative Study of Different Symmetric Key Cryptography”, IJAIEM, vol. 2, Issue 7, July 2013, pp. 204-206.
 
[13]  Abdul D.S, Kader H.M Abdul, Hadhoud, M.M., “Performance Evaluation of Symmetric Encryption Algorithms”, Communications of the IBIMA, Volume 8, 2009, pp. 58-64
 
[14]  Thakur Jawahar, Kumar Nagesh. “DES, AES and Blowfish Symmetric Key Cryptography algorithm Simulation Based Performance Analysis”, IJETAE, vol. 1, Issue 2, DEC. 2011, pp. 6-12.
 
[15]  Marwaha Mohit, Bedi Rajeev, Singh Amritpal, Singh Tejinder, “Comparative Analysis of Cryptographic Algorithms”, International Journal of Advanced Engineering Technology/IV/III/July-Sep, 2013/16-18.
 
[16]  Alam Md Imran, Khan Mohammad Rafeek. “Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, October 2013, pp.713-720.
 
[17]  Saini Bahar, “Survey On Performance Analysis of Various Cryptographic Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 4, April 2014, pp. 1-4.
 
[18]  Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani, “New Comparative Study Between DES, 3DES and AES within Nine Factors”, Journal Of Computing, Volume 2, ISSUE 3, pp. 152-157, March 2010.
 
[19]  Priyanka Arora, Arun Singh and Himanshu Tiyagi, “Evaluation and Comparison of Security Issues on Cloud Computing Environment”, World of Computer Science and Information Technology Journal (WCSIT), Vol. 2, No. 5, pp. 179-183, 2012.
 
[20]  W. Tuchman, A Brief History of the Data Encryption Standard, Internet besieged: countering cyberspace scofflaws. ACM Press/Addison-Wesley Publishing Co. New York, NY, USA, 1998, pp. 275-280.
 
[21]  http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_4-2/goodbye_des.html.
 
[22]  http://www.differencebetween.net/technology/difference-between-des-and-aes/.
 
[23]  C. Riman and H. Hallal. “DES Based Educational Data Encryption System”, International Conference on Security and Management SAM 2013 (WORLDCOMP’13), Las Vegas, USA, July 2013.