This document compares and analyzes various encryption algorithms based on different parameters such as key length, block size, security level, and encryption speed. It finds that Elliptic Curve Cryptography (ECC) and Blowfish algorithms provide the highest levels of security while also having fast encryption speeds. Of the two, Blowfish is considered the best choice as no successful attacks have been made against it so far. Blowfish is also analyzed in more depth, with its structure, security features, and advantages over other algorithms like AES described. References are provided to support the analysis and conclusions.
1. Comparative Analysis of Encryption Algorithms
From Research Paper
Symmetric & Asymmetric Algorithms
2. Agenda
• introduction
• Symmetric & Asymmetric Algorithms
• Which is best an algorithm ?
• Comparative analysis (why best?)
• References (proof)
3. introduction
.
Now days, Data security is very challenging issue that touches many areas
including computers and communication. Recently, we came across many
attacks on cyber security that have played with the confidentiality of the
users.
These attacks just broke all the security algorithms and affected the
confidentiality, authentication, integrity, availability and identification of
user data.
.
.
4. Cont…
.
Cryptography is one such way to make sure that confidentiality,
authentication, integrity, availability and identification of user data
can be maintained as well as security and privacy of data can be
provided to the user.
Encryption is the process of converting normal data or plaintext to
something incomprehensible or cipher-text by applying
mathematical transformations or formulae. These mathematical
transformations or formulae used for encryption processes are
called algorithms.
.
.
5. Comparison on the basis of different parameters
.
In this presentation (paper), we have analyzed various encryption
algorithms on the basis of different parameters and compared
them to choose the best data encryption algorithm so that we
can use it in our future work.
Comparison of Various Algorithms on the basis of Different
Parameters like Key Length, Round, Block Size, Attack Found, Level
of Security, Encryption Speed etc.
.
.
7. Which is the best an algorithm
.
From the work completed in our paper and analysis we have found
that ECC and Blowfish, these two encryption algorithms are leading
with the security level that they provide and faster encryption
speed.
ECC is having some attacks on it but on Blowfish, no attack is
successful yet.
So, from this review and analysis we have shortlisted ECC and
Blowfish encryption algorithm. These two encryption algorithms
are more secure and fast to work with and in future, there is wide
scope of improvement in these both encryption algorithms.
.
.
8. Conti…
.
From the studies which we have performed considering security,
throughput, speed, encryption/decryption, power consumption and
other factors, it is shown that blowfish algorithm having good
performance than other symmetric algorithms.
The memory requirement of symmetric algorithms is lesser than
asymmetric encryption algorithms and symmetric key
algorithms runs faster than asymmetric key algorithms.
Further, symmetric key encryption provides more security than
asymmetric key encryption.
.
.
9. BLOWFISH
.
• Blowfish was developed by bruce schneier in 1993.
• It is basically a symmetric block cipher having variable length key
from 32 bits to 448 bits.
• It operates on block size 64 bits. It is a 16-round Feistel cipher and
uses large key dependent S-Boxes.
• Each S-box contains 32 bits of data.
.
.
11. BLOWFISH
.
• Figure (Previous slide), Blowfish Function F.
• Above Diagram shows the Blowfish’s F- function.
• The function splits the 32 bit input into four 8-bit quarters, and uses
the quarters as input to S-boxes.
• The outputs are added (Mod) modulo 232 and XORed to produce
the final 32-bit output i.e. encrypted data.
• For Decryption at another end the same process takes place, but in
reverse order.
.
.
13. BLOWFISH
.
• Figure (previous slide), Blowfish Procedure.
• Till now, no attack has been found successful against Blowfish encryption
algorithm.
• Blowfish is a variable key length algorithm and it is having 64-bit block cipher. The
• algorithm consist of two sub parts, one is key expansion part and second data
encryption
• part. Data encryption is done by completing 16 rounds fiestel network.
• Each round consist of key dependent permutation in P-Box and key/data
dependent substitution in S- Box.
• Decryption is exactly the same as encryption but reverse process is followed.
.
.
14. BLOWFISH
.
• Blowfish provides a good encryption rate in software.
• In many encryption simulation experiments the Blowfish encryption
algorithm is declared best because of security level that is offers
and speed of encryption, which is better than the most of the
encryption algorithm available.
.
.
15. Why not AES?
.
AES even though its widely used today, it uses more processing
power when compared with other algorithms.
.
.
16. Comparison of Various Algo. on the basis of Diff. Parameters
0
1
2
3
4
5
6
Category 1 Category 2 Category 3 Category 4
Series 1 Series 2 Series 3
17. Comparison of Algorithms on the Basis of Speed
0
1
2
3
4
5
6
Category 1 Category 2 Category 3 Category 4
Series 1 Series 2 Series 3
18. Average Time of Encryption
0
1
2
3
4
5
6
Category 1 Category 2 Category 3 Category 4
Series 1 Series 2 Series 3
19. References
.
• International Journal of Innovative Research in Computer and Communication Engineering, (An ISO
3297: 2007 Certified Organization), Vol. 4, Issue 9, September 2016
• Milind Mathur.and Ayush Kesarwani “Comparison Between DES , 3DES ,RC2 , RC6 , BLOWFISH And
AES”, Proceedings of National Conference on New Horizons, university of Oklahoma, , ISBN 978-93-
82338- 79-6,2013.
• Pratap Chandra Mandal, “Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES
,AES and Blowfish”, Journal of Global Research in Computer Science, Volume 3, No. 8, August 2012.
• Jawahar Thakur and Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography
Algorithms Simulation Based Performance
• Analysis”, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459,
Volume 1, Issue 2, December 2011.
• SparkIM project DLL for blowfish - http://www.codeproject.com/Tips/235342/Blow fish-
Encryption-Implementation-in-Net.
.
.
20. Biography
.
Khubaib Ahmad
Web Developer and Trainer at Ewiglife Cloud Technologies.
CEO at techGate Solutions.
Manager at COSMOS Manpower.
IT Head at Balkaarnews.com
Tsarhost.com
.
.