SlideShare a Scribd company logo
Comparative Analysis of Encryption Algorithms
From Research Paper
Symmetric & Asymmetric Algorithms
Agenda
• introduction
• Symmetric & Asymmetric Algorithms
• Which is best an algorithm ?
• Comparative analysis (why best?)
• References (proof)
introduction
.
Now days, Data security is very challenging issue that touches many areas
including computers and communication. Recently, we came across many
attacks on cyber security that have played with the confidentiality of the
users.
These attacks just broke all the security algorithms and affected the
confidentiality, authentication, integrity, availability and identification of
user data.
.
.
Cont…
.
Cryptography is one such way to make sure that confidentiality,
authentication, integrity, availability and identification of user data
can be maintained as well as security and privacy of data can be
provided to the user.
Encryption is the process of converting normal data or plaintext to
something incomprehensible or cipher-text by applying
mathematical transformations or formulae. These mathematical
transformations or formulae used for encryption processes are
called algorithms.
.
.
Comparison on the basis of different parameters
.
In this presentation (paper), we have analyzed various encryption
algorithms on the basis of different parameters and compared
them to choose the best data encryption algorithm so that we
can use it in our future work.
Comparison of Various Algorithms on the basis of Different
Parameters like Key Length, Round, Block Size, Attack Found, Level
of Security, Encryption Speed etc.
.
.
Symmetric & Asymmetric Algorithms
Which is the best an algorithm
.
From the work completed in our paper and analysis we have found
that ECC and Blowfish, these two encryption algorithms are leading
with the security level that they provide and faster encryption
speed.
ECC is having some attacks on it but on Blowfish, no attack is
successful yet.
So, from this review and analysis we have shortlisted ECC and
Blowfish encryption algorithm. These two encryption algorithms
are more secure and fast to work with and in future, there is wide
scope of improvement in these both encryption algorithms.
.
.
Conti…
.
From the studies which we have performed considering security,
throughput, speed, encryption/decryption, power consumption and
other factors, it is shown that blowfish algorithm having good
performance than other symmetric algorithms.
The memory requirement of symmetric algorithms is lesser than
asymmetric encryption algorithms and symmetric key
algorithms runs faster than asymmetric key algorithms.
Further, symmetric key encryption provides more security than
asymmetric key encryption.
.
.
BLOWFISH
.
• Blowfish was developed by bruce schneier in 1993.
• It is basically a symmetric block cipher having variable length key
from 32 bits to 448 bits.
• It operates on block size 64 bits. It is a 16-round Feistel cipher and
uses large key dependent S-Boxes.
• Each S-box contains 32 bits of data.
.
.
BLOWFISH
. .
.
BLOWFISH
.
• Figure (Previous slide), Blowfish Function F.
• Above Diagram shows the Blowfish’s F- function.
• The function splits the 32 bit input into four 8-bit quarters, and uses
the quarters as input to S-boxes.
• The outputs are added (Mod) modulo 232 and XORed to produce
the final 32-bit output i.e. encrypted data.
• For Decryption at another end the same process takes place, but in
reverse order.
.
.
BLOWFISH
. .
.
BLOWFISH
.
• Figure (previous slide), Blowfish Procedure.
• Till now, no attack has been found successful against Blowfish encryption
algorithm.
• Blowfish is a variable key length algorithm and it is having 64-bit block cipher. The
• algorithm consist of two sub parts, one is key expansion part and second data
encryption
• part. Data encryption is done by completing 16 rounds fiestel network.
• Each round consist of key dependent permutation in P-Box and key/data
dependent substitution in S- Box.
• Decryption is exactly the same as encryption but reverse process is followed.
.
.
BLOWFISH
.
• Blowfish provides a good encryption rate in software.
• In many encryption simulation experiments the Blowfish encryption
algorithm is declared best because of security level that is offers
and speed of encryption, which is better than the most of the
encryption algorithm available.
.
.
Why not AES?
.
AES even though its widely used today, it uses more processing
power when compared with other algorithms.
.
.
Comparison of Various Algo. on the basis of Diff. Parameters
0
1
2
3
4
5
6
Category 1 Category 2 Category 3 Category 4
Series 1 Series 2 Series 3
Comparison of Algorithms on the Basis of Speed
0
1
2
3
4
5
6
Category 1 Category 2 Category 3 Category 4
Series 1 Series 2 Series 3
Average Time of Encryption
0
1
2
3
4
5
6
Category 1 Category 2 Category 3 Category 4
Series 1 Series 2 Series 3
References
.
• International Journal of Innovative Research in Computer and Communication Engineering, (An ISO
3297: 2007 Certified Organization), Vol. 4, Issue 9, September 2016
• Milind Mathur.and Ayush Kesarwani “Comparison Between DES , 3DES ,RC2 , RC6 , BLOWFISH And
AES”, Proceedings of National Conference on New Horizons, university of Oklahoma, , ISBN 978-93-
82338- 79-6,2013.
• Pratap Chandra Mandal, “Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES
,AES and Blowfish”, Journal of Global Research in Computer Science, Volume 3, No. 8, August 2012.
• Jawahar Thakur and Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography
Algorithms Simulation Based Performance
• Analysis”, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459,
Volume 1, Issue 2, December 2011.
• SparkIM project DLL for blowfish - http://www.codeproject.com/Tips/235342/Blow fish-
Encryption-Implementation-in-Net.
.
.
Biography
.
Khubaib Ahmad
Web Developer and Trainer at Ewiglife Cloud Technologies.
CEO at techGate Solutions.
Manager at COSMOS Manpower.
IT Head at Balkaarnews.com
Tsarhost.com
.
.
.
.
THANKS!
.
.

More Related Content

PPTX
Destination Sequenced Distance Vector Routing (DSDV)
PPTX
Consensus Algorithms.pptx
PDF
wolfSSL and TLS 1.3
PPT
Lecture 08
PPT
I pv6 routing_protocol_for_low_power_and_lossy_
PDF
SSL/TLS Handshake
PPT
Lecture 15
PPTX
Blockchain Interview Questions And Answers | Blockchain Technology Interview ...
Destination Sequenced Distance Vector Routing (DSDV)
Consensus Algorithms.pptx
wolfSSL and TLS 1.3
Lecture 08
I pv6 routing_protocol_for_low_power_and_lossy_
SSL/TLS Handshake
Lecture 15
Blockchain Interview Questions And Answers | Blockchain Technology Interview ...

What's hot (20)

PPT
Cryptography - A Brief History
PPT
Chap24
PPTX
Error Detection N Correction
PPT
Cryptography
PPT
Criptografia.ppt
PPTX
Symmetric and Asymmetric Encryption
PPTX
SSL And TLS
PPT
Wireless routing protocols
PPT
Cisco Cybersecurity Essential cap 4
PPT
RC4&RC5
PPT
Email Security : PGP & SMIME
PPTX
Cryptography
PDF
IPSec (Internet Protocol Security) - PART 1
PDF
Blockchain Technology Presentation (Delwar alam Security researcher at BugsBD)
PPT
Lecture 09
PPT
Symmetric and Asymmetric Encryption.ppt
PPTX
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Blockchain and Sustainability
PDF
SPINS: Security Protocols for Sensor Networks
Cryptography - A Brief History
Chap24
Error Detection N Correction
Cryptography
Criptografia.ppt
Symmetric and Asymmetric Encryption
SSL And TLS
Wireless routing protocols
Cisco Cybersecurity Essential cap 4
RC4&RC5
Email Security : PGP & SMIME
Cryptography
IPSec (Internet Protocol Security) - PART 1
Blockchain Technology Presentation (Delwar alam Security researcher at BugsBD)
Lecture 09
Symmetric and Asymmetric Encryption.ppt
CRYPTOGRAPHY AND NETWORK SECURITY
Blockchain and Sustainability
SPINS: Security Protocols for Sensor Networks
Ad

Similar to Comparative Analysis of Encryption Algorithm (20)

PDF
Design and Implementation of New Encryption algorithm to Enhance Performance...
PPTX
Comparative analysis of algorithms
PDF
L017136269
PDF
Comparison of Various Encryption Algorithms and Techniques for improving secu...
PPT
File transfer with multiple security mechanism
PDF
Comparative Study of Cryptography Algorithms and Its’ Applications
PPTX
Information and network security 28 blowfish
PDF
A performance evaluation of common
PDF
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
PDF
Randomness evaluation framework of cryptographic algorithms
PDF
Encrypted Negative Password using for Authentication
PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
PDF
Different date block size using to evaluate the performance between different...
PDF
Iaetsd enhanced cryptography algorithm for providing
PDF
Enhancing the Techniques to Secure Grid Computing
PDF
Introducing an Encryption Algorithm based on IDEA
PDF
researchpaperfinal1
PDF
Implement a novel symmetric block
PDF
A Review on Various Most Common Symmetric Encryptions Algorithms
PPTX
Secured algorithm for gsm encryption & decryption
Design and Implementation of New Encryption algorithm to Enhance Performance...
Comparative analysis of algorithms
L017136269
Comparison of Various Encryption Algorithms and Techniques for improving secu...
File transfer with multiple security mechanism
Comparative Study of Cryptography Algorithms and Its’ Applications
Information and network security 28 blowfish
A performance evaluation of common
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
Randomness evaluation framework of cryptographic algorithms
Encrypted Negative Password using for Authentication
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Different date block size using to evaluate the performance between different...
Iaetsd enhanced cryptography algorithm for providing
Enhancing the Techniques to Secure Grid Computing
Introducing an Encryption Algorithm based on IDEA
researchpaperfinal1
Implement a novel symmetric block
A Review on Various Most Common Symmetric Encryptions Algorithms
Secured algorithm for gsm encryption & decryption
Ad

Recently uploaded (20)

PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
Computing-Curriculum for Schools in Ghana
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Lesson notes of climatology university.
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
master seminar digital applications in india
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Pharma ospi slides which help in ospi learning
Computing-Curriculum for Schools in Ghana
Supply Chain Operations Speaking Notes -ICLT Program
Lesson notes of climatology university.
102 student loan defaulters named and shamed – Is someone you know on the list?
Final Presentation General Medicine 03-08-2024.pptx
Microbial disease of the cardiovascular and lymphatic systems
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Final Presentation General Medicine 03-08-2024.pptx
01-Introduction-to-Information-Management.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
master seminar digital applications in india
VCE English Exam - Section C Student Revision Booklet
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Abdominal Access Techniques with Prof. Dr. R K Mishra
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx

Comparative Analysis of Encryption Algorithm

  • 1. Comparative Analysis of Encryption Algorithms From Research Paper Symmetric & Asymmetric Algorithms
  • 2. Agenda • introduction • Symmetric & Asymmetric Algorithms • Which is best an algorithm ? • Comparative analysis (why best?) • References (proof)
  • 3. introduction . Now days, Data security is very challenging issue that touches many areas including computers and communication. Recently, we came across many attacks on cyber security that have played with the confidentiality of the users. These attacks just broke all the security algorithms and affected the confidentiality, authentication, integrity, availability and identification of user data. . .
  • 4. Cont… . Cryptography is one such way to make sure that confidentiality, authentication, integrity, availability and identification of user data can be maintained as well as security and privacy of data can be provided to the user. Encryption is the process of converting normal data or plaintext to something incomprehensible or cipher-text by applying mathematical transformations or formulae. These mathematical transformations or formulae used for encryption processes are called algorithms. . .
  • 5. Comparison on the basis of different parameters . In this presentation (paper), we have analyzed various encryption algorithms on the basis of different parameters and compared them to choose the best data encryption algorithm so that we can use it in our future work. Comparison of Various Algorithms on the basis of Different Parameters like Key Length, Round, Block Size, Attack Found, Level of Security, Encryption Speed etc. . .
  • 7. Which is the best an algorithm . From the work completed in our paper and analysis we have found that ECC and Blowfish, these two encryption algorithms are leading with the security level that they provide and faster encryption speed. ECC is having some attacks on it but on Blowfish, no attack is successful yet. So, from this review and analysis we have shortlisted ECC and Blowfish encryption algorithm. These two encryption algorithms are more secure and fast to work with and in future, there is wide scope of improvement in these both encryption algorithms. . .
  • 8. Conti… . From the studies which we have performed considering security, throughput, speed, encryption/decryption, power consumption and other factors, it is shown that blowfish algorithm having good performance than other symmetric algorithms. The memory requirement of symmetric algorithms is lesser than asymmetric encryption algorithms and symmetric key algorithms runs faster than asymmetric key algorithms. Further, symmetric key encryption provides more security than asymmetric key encryption. . .
  • 9. BLOWFISH . • Blowfish was developed by bruce schneier in 1993. • It is basically a symmetric block cipher having variable length key from 32 bits to 448 bits. • It operates on block size 64 bits. It is a 16-round Feistel cipher and uses large key dependent S-Boxes. • Each S-box contains 32 bits of data. . .
  • 11. BLOWFISH . • Figure (Previous slide), Blowfish Function F. • Above Diagram shows the Blowfish’s F- function. • The function splits the 32 bit input into four 8-bit quarters, and uses the quarters as input to S-boxes. • The outputs are added (Mod) modulo 232 and XORed to produce the final 32-bit output i.e. encrypted data. • For Decryption at another end the same process takes place, but in reverse order. . .
  • 13. BLOWFISH . • Figure (previous slide), Blowfish Procedure. • Till now, no attack has been found successful against Blowfish encryption algorithm. • Blowfish is a variable key length algorithm and it is having 64-bit block cipher. The • algorithm consist of two sub parts, one is key expansion part and second data encryption • part. Data encryption is done by completing 16 rounds fiestel network. • Each round consist of key dependent permutation in P-Box and key/data dependent substitution in S- Box. • Decryption is exactly the same as encryption but reverse process is followed. . .
  • 14. BLOWFISH . • Blowfish provides a good encryption rate in software. • In many encryption simulation experiments the Blowfish encryption algorithm is declared best because of security level that is offers and speed of encryption, which is better than the most of the encryption algorithm available. . .
  • 15. Why not AES? . AES even though its widely used today, it uses more processing power when compared with other algorithms. . .
  • 16. Comparison of Various Algo. on the basis of Diff. Parameters 0 1 2 3 4 5 6 Category 1 Category 2 Category 3 Category 4 Series 1 Series 2 Series 3
  • 17. Comparison of Algorithms on the Basis of Speed 0 1 2 3 4 5 6 Category 1 Category 2 Category 3 Category 4 Series 1 Series 2 Series 3
  • 18. Average Time of Encryption 0 1 2 3 4 5 6 Category 1 Category 2 Category 3 Category 4 Series 1 Series 2 Series 3
  • 19. References . • International Journal of Innovative Research in Computer and Communication Engineering, (An ISO 3297: 2007 Certified Organization), Vol. 4, Issue 9, September 2016 • Milind Mathur.and Ayush Kesarwani “Comparison Between DES , 3DES ,RC2 , RC6 , BLOWFISH And AES”, Proceedings of National Conference on New Horizons, university of Oklahoma, , ISBN 978-93- 82338- 79-6,2013. • Pratap Chandra Mandal, “Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES ,AES and Blowfish”, Journal of Global Research in Computer Science, Volume 3, No. 8, August 2012. • Jawahar Thakur and Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance • Analysis”, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 1, Issue 2, December 2011. • SparkIM project DLL for blowfish - http://www.codeproject.com/Tips/235342/Blow fish- Encryption-Implementation-in-Net. . .
  • 20. Biography . Khubaib Ahmad Web Developer and Trainer at Ewiglife Cloud Technologies. CEO at techGate Solutions. Manager at COSMOS Manpower. IT Head at Balkaarnews.com Tsarhost.com . .