UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 4
April-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRAU06098


Registration ID:
203043

Page Number

639-647

Share This Article


Jetir RMS

Title

Comparison of DES, AES, Blowfish and Twofish Symmetric Key Cryptography Algorithms

Abstract

Currently, security is the most effective hand of Internet and network applications. In the current generation, Internet applications and networks are growing very fast, so the importance and value of data exchanged through the Internet or other types of media are increasing. Therefore, the search for the best solution to offer the necessary protection against illegal data attacks along with the provision of these services on time is one of the most interesting topics in communities related to security. Cryptography is one of the main categories of computer security that converts information from its readable form into an illegible form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to protect data protected against attacks and its speed and efficiency to make it so important. This document provides a fair comparison between the four most common symmetric key cryptography algorithms: DES, AES, Blowfish and Twofish. Since the main concern here is the performance of the algorithms in different configurations, the presented comparison takes into account the behavior and performance of the algorithm when different data loads are used. The comparison is made based on these parameters: speed, block size and key size. A simulation program is implemented using C programming and Java programming.

Key Words

Cryptography, DES, AES, Blowfish, Twofish Encryption, Decryption.

Cite This Article

"Comparison of DES, AES, Blowfish and Twofish Symmetric Key Cryptography Algorithms ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 4, page no.639-647, April-2019, Available :http://www.jetir.org/papers/JETIRAU06098.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Comparison of DES, AES, Blowfish and Twofish Symmetric Key Cryptography Algorithms ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 4, page no. pp639-647, April-2019, Available at : http://www.jetir.org/papers/JETIRAU06098.pdf

Publication Details

Published Paper ID: JETIRAU06098
Registration ID: 203043
Published In: Volume 6 | Issue 4 | Year April-2019
DOI (Digital Object Identifier):
Page No: 639-647
Country: -, -, - .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003101

Print This Page

Current Call For Paper

Jetir RMS