SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 871
Performance Comparison of File Security System using
TEA and Blowfish Algorithms
Win Myat Thu, Tin Lai Win, Su Mu Tyar
Department of Information Technology, Technological University, Mandalay, Myanmar
How to cite this paper: Win Myat Thu |
Tin Lai Win | Su Mu Tyar "Performance
Comparison of File Security System using
TEA and Blowfish Algorithms" Published
in International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August
2019, pp.871-877,
https://doi.org/10.31142/ijtsrd26462
Copyright © 2019 by author(s) and
International Journalof Trendin Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
With the progress in data exchange by the electronic system, the need for
information security has become a necessity. Due to the growth of multimedia
application, security becomes an important issue of communication and
storage of different files. To make its reality, cryptographic algorithms are
widely used as essential tools. Cryptographic algorithms provide security
services such as confidentiality, authentication, data integrity and secrecy by
encryption. Different cryptographic algorithms are commonly used for
information security in many research areas. Although there are two
encryption techniques, asymmetric and symmetric, the simpler symmetric
encryption technique is employed for testingfilesecuritysystem.In thisstudy,
the performance evaluation of the most common two symmetric encryption
algorithms such as TEA and Blowfish algorithm is focused on the execution
time intervals. Simulation has been conducted with many types of file
encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most
common video file formats by using Java Programming Language.
KEYWORDS: Symmetric, Asymmetric, encryption, TEA, Blowfish
I. INTRODUCTION
Symmetric key algorithms are used primarily for the encryption of dataordata
streams. These algorithms are designed to be very fastandhavealargenumber
of possible keys.
The best symmetric key algorithms offer excellent secrecy,
once data is encrypted with a given key, there is no fast way
to decrypt the data without processing the same key.
Symmetric key algorithms can be divided into two
categories: block and stream. Block algorithm encrypts data
many bytes at a time, while stream algorithms encrypt byte
by byte or even bit by bit [1].
This paper evaluates two symmetric encryption algorithms
namely; TEA and Blowfish. The performance measure of
encryption schemes willbe conducted in termsof processing
time intervals on the Windows platform for the different file
size.
With the study of a file security system based on two
symmetric algorithms, achieving file secrecy, analyzingdata
encryption duration, studying TEA and Blowfishalgorithms’
Feistel structure and understandinghowtoapplyencryption
algorithm for the file security system are strongly expected.
The rest of this paper is organized as follows: SectionIIgives
a brief cryptographic strength of symmetric algorithms,
section III provides the algorithms thathavebeenchosen for
implementation; section IV provides the performance
evaluation methodology, section V discusses the simulation
results in detail and finally section VI concludes the work.
II. UNDERSTANDING CRYPTOGRAPHIC
TECHNIQUES
Cryptography is the study of techniques for ensuring the
secrecy and authentication of the information. The sender
translates the plaintext into ciphertext. This ciphertext is
then sent to the receiver. The authorized receiver gets the
ciphertext and then converts the ciphertext back into the
original form. The main aim of the cryptographyis to protect
the information from illegal access. Goals, strength,
weakness and basic terminology are expressed in the
following section.
The data can be read in its original form is called plain text.
The way of mask the plaintext in such a way as to hide its
original form is called encryption. The method of encrypting
the plaintext which results in unreadable form is called
ciphertext. The method of taking encrypted message or data
and converting back into its original form is called
decryption. An entity which provides encryption and
decryption is called cryptosystem [2].
Depending upon the key cryptography can be divided into
two categories: symmetric and asymmetric encryption.
Symmetric Encryption(privatekeyEncryption)isduringthe
encryption and decryption process the same key is used at
the sender and receiver site. Before the transmission of
information starts the key distribution has to be made [3].
Example: DES [4]-[6], 3DES [7], BLOWFISH [4], [5], AES [8]
etc. However, in asymmetric encryption (Public key
encryption, two different keys are used for encryption and
decryption process. At the same time, the two keys are
generated. In that one key is transferred to the other side
before the exchange of information begins[9].Example: RSA
[10], Elgamal, Elgamal signature Diffie Hellman key
exchange, digital signature [11].
IJTSRD26462
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 872
A. Goals of Cryptography
1. Confidentiality: Data that resides in the computer is
transmitted and that is to be accessed only by the legal
person and that data can’t be accessed by anyone else.
2. Authentication: The data that is seen by any system has
to check the identity of the sender, whether the data
appears from a legal person or illegal person.
3. Data Integrity: To verify the information, it has not been
changed by an illegal or unknown person. Only the
sender and receiver can modify the message. No others
have the rights to access the message (or) data.
4. Non-Repudiation: It does not allow repudiation by the
sender or receiver. The receiver proves the
identification of the sender in case of denial by the
sender. The sender proves the identification of the
receiver in case of denial by the receiver.
5. Access Control: It ensures that only the authorized
person can have the rights to access the transmitted
information [12].
B. Cryptographic Strength of Symmetric Algorithms
Symmetric encryption, also referred to as conventional
encryption or single key encryption was the only type of
encryption in use prior to the development of public-key
encryption. The private keys used in symmetric-key
cryptography are robustly resistant to brute force attacks.
While only the one-time pad, which combines plaintextwith
a random key, holds secure in the face of any attacker
regardless of time and computing power, symmetric-key
algorithms are generally more difficult to crack than their
public key counterparts. Additionally, secret-keyalgorithms
require less computing power to be created than equivalent
private keys in public-key cryptography [13].
C. Cryptographic Weakness of Symmetric Algorithms
The biggest obstacle in successfully deploying a symmetric-
key algorithm is the necessity for a proper exchange of
private keys. This transaction must be completed inasecure
manner. In the past, this would often have to be done
through some type of face-to-face meeting, which proves
quite impractical in many circumstances when taking
distance and time into account. If one assumes that security
is a risk to begin with due to the desire for a secret exchange
of data in the first place, the exchange of keys becomes
further complicated.
Another problem concerns the compromise of a private key
[14]. In symmetric-key cryptography, every participant has
an identical private key. As the number of participants in a
transaction increases, both the risk of compromise and the
consequences of such a compromise increase dramatically.
Each additional user adds another potential point of
weakness that an attacker could takeadvantageof.If such an
attacker succeeds in gaining control of justoneof theprivate
keys in this world, every user,whetherthere arehundreds of
users or only a few, are completely compromised [15].
D. Basic Terminology Used in Cryptography
The symmetric encryption scheme has five ingredients.
1. Plaintext: This is the original intelligiblemessageor data
that is fed to the algorithm as input.
2. Ciphertext: This is the scrambled message produced as
output. It depends on the plaintext and the key. The
ciphertext is an apparently random stream of data, as it
stands, is unintelligible.
3. Encryption Algorithm: The encryption algorithm
performs various substitutionsandpermutationsonthe
plaintext.
4. Decryption Algorithm: This is essentially the encryption
algorithm that runs in reverse. It takes the ciphertext
and the secret key and produces the original plaintext.
5. Secret Key: The secret key is also input to the encryption
algorithm. The exact substitutions and permutations
performed depend on the key used, and the algorithm
will produce a differentoutputdependingon thespecific
key being used at the time [16].
III. COMPARED ALGORITHMS
Symmetric encryption algorithms: Blowfish and TEA are
compared for the execution time of various file types
encryption and decryption.
A. Blowfish
Blowfish is a symmetric block cipher. It is used for
encrypting and protecting the data. It has a variable-length
key range from 32 bits to 448 bits, for safeguardingour data.
It was designed in 1993 by Bruce Schneier. It is a license for
encryption method and it is freely available to all users. It is
mainly used for applications, such that key does not change
often, like a communication link [17].
1. Blowfish Algorithm
It has large data blocks.
It consists of a 64-bit block size.
The range of key scalable from 32 bits to 256 bits.
It uses very simple operation which is efficient for
microprocessors.
It has a variable number of iteration.
It uses subkey which is one way hash of the key.
It has no linear structure.
Its design structure is simple to understand. Itincreases
the confidence in the algorithm. It is a fiestel iterated
block cipher [12].
2. Fiestel Network: Fiestel Network is a common
method of converting any function into a
permutation. The working procedure of fiestel
network:
It split the block into two halves
Now, the right half becomes the new left half.
If the left half is XOR’d with the result of applying ‘f’ to
the right half and the key, we have the new right half as
the final result.
Even the function f and not invertible the previous
rounds can be derived [12].
3. Block Diagram of the Blowfish Algorithm
Blowfish is a symmetric key Feistel structured algorithm
consisting of two parts: key expansion part and data-
encryption part. It is one of the most public-domain
encryption algorithms. It takes a variable-length key from
32-bits to 448-bits, permuted into18 sub-keyseach of 32-bit
length and can be implemented on 32 or 64-bit processor
[18] as shown in Fig. 1.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 873
F
F
Plaintext(64 bits)
Ciphertext(64 bits)
32 bits32 bits RE0LE0
RE1LE1
RE16LE16
LE17 RE17
Round 1
Round 16
P1
P16
P18 P17
Fig.1 Block diagram of Blowfish algorithm
A. TEA
Tiny Encryption Algorithm (TEA) block cipherwasdesigned
with speed and simplicity in mind. It is a variant of the
Feistel Cipher. TEA operates on a 64-bit block of data that is
then split up into two 32 bit unsigned integers during the
encryption process. TEA uses a 128-bit key, and a magic
constant is also utilized which is defined as 2^32/ (the
golden ratio) [19].
The original TEA was written by Roger Needham and David
Wheeler and was first presented in 1994. Tiny Encryption
Algorithm is a Feistel type cipher that uses operations from
mixed (orthogonal) algebraic groups. A dual shift causes all
bits of the data and key to be mixed repeatedly. The key
schedule algorithm is simple; the 128-bit key K is split into
four 32-bit blocks K = (K [0], K [1], K [2], K [3]). TEA seems
to be highly resistant to differential cryptanalysis and
achieves complete diffusion. Time performance on a
workstation is very impressive. The inputstotheencryption
algorithm are a plaintext block and a key K.The plaintextisP
= (Left[0], Right[0]) and the ciphertext is C = (Left[64],
Right[64]). The plaintext block is split into two halves,
Left[0] and Right[0]. Each half is used to encrypt the other
half over 64 rounds of processing and then combine to
produce the ciphertext block [20].
4. Block Diagram for TEA Algorithm
TEA uses a key size of 128 bits and a block size of 64 bits. It
is very nearly a Feistel cipher, although addition modulo
2^32 is used to combine the round function with the block
rather than addition modulo 2. This means that the
decryption function is slightly different from the encryption
function, although both are so simple that the difference is
not generally problematic. The Feistel rounds are grouped
into pairs, called cycles. Many other Feistel ciphers, in the
last round the last swap is done, just like in the other rounds.
This again makes decryption in reverse, slightly different
from encryption shown in Fig. 2, but since a separate
implementation for decryption is necessary anyway the
difference is worthwhile to simplify the description [21].
Decryption is the same except that thetwo additionsmodulo
2^32 at the left-hand side are replaced with subtractions
modulo 2^32, and the swaps are done at the start of the
round instead of the end [21].
Plaintext
F
Ciphertext
F
F
F
Right[0]
K[1]
K[2]
K[63]
K[64]
Left[0]
Right[64] Left[64]
Fig.2 Blocked encryption for TEA algorithm [22]
IV. PERFORMANCE EVALUATION METHODOLOGY
Performance evaluation on which hardware and software
requirement, which IDE is used to implement which criteria
are emphasized, which types of file are tested and how the
system works are detail expressed in the following sections.
A. System Parameters
This encryption and decryption of TEA and Blowfish
algorithms were implemented with Java in IDE. The
performance was measured on Intel(R) Pentium (R) CPU
P6000 @1.87GHz 1.87GHz, 64-bit operating system with
1.00 GB of RAM running Window 10 Pro.
B. Experiment Factors
The variety of input files size from 85 Kbytesto2600 Kbytes.
Comparison of TEA and Blowfish execution time are
calculated in milliseconds. The result of encryption time is
measured when an encryption algorithm takes to make a
cipher content from plaintext and the revert manner. By
isolating the total plaintext in megabytes encrypted on the
whole encryption time for each algorithm, the amount of an
encryption scheme is calculated. Encryption processforboth
symmetric encryption algorithms is shown in Fig. 3 and in
the meanwhile the decryption processisalsoshowninFig.4.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 874
Fig.3 Encryption process
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 875
Fig.4 Decryption process
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 876
V. SIMULATION RESULTS
The overall performance of the encryption algorithm is
assessed considering the above-mentioned parameters
together with encryption time and decryption time. The
encryption time is considered because of the time that an
encryption algorithm takes to deliver a ciphertext from a
plain textual content. Comparative analyses of theoutcomes
of the chosen and distinctive encryption scheme are
performed as shown in table 1 to 14.
A. Comparative Results of TEA and Blowfish algorithm
with Different File Types
The blowfish algorithm performs better compared withTEA
regarding time consumption for both encryption and
decryption scheme. Table 1 to 14 show the encryption and
decryption stage including file sizes and their run times.
Total seven types of files are compared and although any
input file sizes are able to be tested, only three approximate
file sizes are mentioned in this paper. 85 KB to 2600 KB files
is tested. In experiment analysis, encryption time table,
decryption time table are illustrated respectively for seven
different file format.
TABLE I INPUT SIZE AND ENCRYPTION TIME FOR PDF FILE
Input Size (in Kbytes) TEA (ms) Blowfish(ms)
140 8 13
296 17 26
2600 454 644
TABLE II INPUT SIZE AND DECRYPTION TIME FOR PDF FILE
Input Size (in Kbytes) TEA (ms) Blowfish(ms)
140 7 14
296 15 31
2600 523 584
TABLE III Input Size and Encryption Time for
Document File
Input Size (in Kbytes) TEA (ms) Blowfish(ms)
154 9 11
458 26 40
1200 71 74
TABLE IV Input Size and Decryption Time for
Document File
Input Size (in Kbytes) TEA (ms) Blowfish(ms)
154 8 9
458 24 47
1200 66 72
According to the experimental results, decryption process
is exactly the same as encryption but execution time.
TABLE V Input Size and Encryption Time for Excel File
Input Size (in Kbytes) TEA (ms) Blowfish(ms)
90 6 23
60 4 6
135 10 30
TABLE VI INPUT SIZE AND DECRYPTION TIME FOR EXCEL FILE
Input Size (in Kbytes) TEA (ms) Blowfish (ms)
90 3 10
60 3 7
135 8 12
TABLE VII INPUT SIZE AND ENCRYPTION TIME FOR
POWERPOINT FILE
Input Size (in Kbytes) TEA (ms) Blowfish (ms)
350 21 28
612 35 55
1250 68 82
TABLE VIII INPUT SIZE AND DECRYPTION TIME FOR
POWERPOINT FILE
Input Size (in Kbytes) TEA (ms) Blowfish (ms)
350 20 21
612 31 63
1250 63 66
TABLE IX INPUT SIZE AND ENCRYPTION TIME FOR JPG FILE
Input Size (in Kbytes) TEA (ms) Blowfish (ms)
85 3 4
153 8 10
319 18 28
TEA is being considered to be a standard encrypting
algorithm since no specified weaker points are found so far
in comparing to the Blowfish algorithm for both encryption
and decryption processes.
TABLE X INPUT SIZE AND DECRYPTION TIME FOR JPG FILE
Input Size (in Kbytes) TEA (ms) Blowfish (ms)
85 4 5
153 7 15
319 17 33
TABLE XI INPUT SIZE AND ENCRYPTION TIME FOR MP4 FILE
Input Size (in Kbytes) TEA (ms) Blowfish (ms)
955 54 87
1922 108 111
2422 147 209
TABLE XII INPUT SIZE AND DECRYPTION TIME FOR MP4 FILE
Input Size (in Kbytes) TEA (ms) Blowfish (ms)
955 49 97
1922 97 165
2422 126 250
TABLE XIII INPUT SIZE AND ENCRYPTION TIME FOR TEXT FILE
Input Size (in Kbytes) TEA (ms) Blowfish (ms)
98 5 9
125 15 19
250 22 27
TABLE XIV INPUT SIZE AND DECRYPTION TIME FOR TEXT FILE
Input Size (in Kbytes) TEA (ms) Blowfish (ms)
98 6 10
125 28 30
250 29 31
It turned into concluded that the TEA encrypting algorithm
performs in a much efficient way for encrypting and
decrypting the confidential data.HenceTEA worksbetter for
secure file system application.
VI. CONCLUSION
Many data from where such as military, hospital, bank and
business need security while communicating between
people and activities. Symmetric encryption algorithms can
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 877
solve the problems of information security with the security
keys. Symmetric key algorithms are faster and easier to be
implemented than the asymmetric key algorithms. This
system proves which algorithm is appropriate for each file
type. Therefore, different file types: videofile,imagefile, text
file, portable document format file, word file,powerpointfile
and excel file are encrypted with TEA and Blowfish
symmetric encryption algorithms to secure and the
execution durations are also compared with three different
file sizes. Altogether, various file secrecy and symmetric
encryption knowledge are achieved and TEAis preferred for
file security.
ACKNOWLEDGMENT
We wish to express our sincere gratitude to Dr. Tin Lai Win
and Dr. Su Mu Tyar. We also thank all of our teachers for
providing us the opportunity to embark on this study.
REFERENCES
[1] (2018) The eTutorials website. [Online]. Available:
http://etutorials.org/Linux+System/unix+internet+sec
urity/.
[2] W. Stallings, Cryptography and Network Security
Principles and Practices, 4th ed., Pearson Education,
Prentice-Hall, 2009.
[3] Himani Agrawal and Monisha Sharma,
“Implementation and analysis of various Symmetric
Cryptosystems”, Indian Journal of Science and
Technology, vol.3, no.12, 2012.
[4] P. C. Mandal, “Evaluation of the performance of the
Symmetric Key Algorithms: DES, 3DES, AES and
Blowfish,” Journal of Global Research in Computer
Science, e-ISSN 2229-371X, vol. 3, no. 8, Aug. 2012.
[5] J. Thakur, N. Kumar“DES,AESandBlowfish:Symmetric
Key Cryptography Algorithms Simulation-Based
Performance Analysis,” International Journal of
Emerging Technology and Advanced Engineering, ISSN
2250-2459, pp. 6-12, vol.1, Issue 2, Dec. 2011.
[6] M. Agrawal, P. Mishra “A Comparative Survey on
Symmetric Key Encryption Techniques,” International
Journal on Computer Science and Engineering (IJCSE),
vol.4, no. 05, pp.877-882, May. 2012.
[7] S.Pavithra, Mrs. E. Ramadevi “Study and Performance
Analysis of Cryptography Algorithms,” International
Journal of Advanced Research in Computer Engineering
& Technology, vol.1, Issue 5, pp.82-86, July. 2012.
[8] Shanta, Y. Vashishtha, “Evaluating the performance of
Symmetric Key Algorithms: AES(Advanced Encryption
Standard) and DES (Data Encryption Standard),”
International Journal of Computational Engineering &
Management (IJCEM), vol. 15, Issue 4, pp.43-49, July.
2012.
[9] Manoj Kumar Pandey, et. all, “Survey Paper:
Cryptography The art of Hiding Information”,
International JournalofAdvancedResearchin Computer
Engineering & Technology (IJARCET), ISSN: 2278 –
1323, vol.2, no.12, 2013.
[10] M, Vishwakarma, “Comparative study of Cryptography
Algorithms”, International Journal of Advanced
Research in Computer Science, ISSN: 0976-5697, vol.4,
no. 3, Special Issue, March. 2013.
[11] Kellogg S. Booth, “Authentication of signatures using
public-key encryption,” Communicationsof theACM,pp.
772-774, Nov. 1981.
[12] S.Suguna1, Dr.V.Dhanakoti2, R. Manjupriya3, “A Study
on Symmetric and Asymmetric Key Encryption
Algorithms.” International Research Journal of
Engineering and Technology (IRJET), e-ISSN: 2395 -
0056, vol.3 Issue.4, pp. 28, Apr.2016.
[13] S. Halevi and H. Krawczyk, “Public-key cryptography
and password protocols,” ACM Transactions on
Information and System Security, pp. 230-268, Aug.
1999.
[14] W. Küchlin, “Public key encryption,” ACM SIGSAM
Bulletin, pp. 6973, Aug. 1987.
[15] M. Blumenthal,“Encryption:Strengths andWeaknesses
of Public-key Cryptography” Univ. of Villanova,
Department of Computing Sciences, Computing
Research Topics, PA 19085, CSC 3990.
[16] K. Krishnan. “Computer Networks and Computer
Security,” LectureNotesinCryptography,2004,Lecture
22-24.
[17] N. Tingyuan, T. Zhang, “A Study of DES and Blowfish
Encryption Algorithm”, IEEE, 2009.
[18] Saikumar Manku1 and K. Vasanth2, “Blowfish
Encryption Algorithm for Information Security,”
Journal of Engineering and Applied Sciences (ARPN),
ISSN 1819-6608, vol.10, no. 10, June. 2015.
[19] Wheeler, David, R. Needham. “TEA a tiny encryption
algorithm” Fast Software Encryption. Springer
Berlin/Heidelberg, 1995.
[20] Vikram R. Andem, “A Cryptanalysis of the Tiny
Encryption Algorithm”, M.Sc. thesis, University of
Alabama, Alabama, 2003.
[21] J. Holden, “Demitasse: A Small Version of the Tiny
Encryption Algorithm and its Use in a Classroom
Setting”, Department of Mathematics, Rose-Hulman
Institute of Technology, Terre Haute, In 47803, USA.
[22] (1998) The Wikipedia website. [Online]. Available:
https://upload.wikimedia.org/wikipedia/commons/a/
a1/TEA_InfoBox_Diagram/.

More Related Content

What's hot

Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
IJERA Editor
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
IJRAT
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
krprashant94
 
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
saniacorreya
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
 
Report dna
Report dnaReport dna
Report dna
DrAliKMattar
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
TELKOMNIKA JOURNAL
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
newbie2019
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
Anil Neupane
 

What's hot (18)

Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Report dna
Report dnaReport dna
Report dna
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 

Similar to Performance Comparison of File Security System using TEA and Blowfish Algorithms

L017136269
L017136269L017136269
L017136269
IOSR Journals
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
Lilies DLiestyowati
 
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdfWINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
sadinenitejaswi23cse
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
Iaetsd Iaetsd
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptx
RiddhiGupta84
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
ijtsrd
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
IJCNCJournal
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
IJRAT
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
Joe Osborn
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
IJNSA Journal
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
karthikaparthasarath
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
ijsrd.com
 

Similar to Performance Comparison of File Security System using TEA and Blowfish Algorithms (20)

L017136269
L017136269L017136269
L017136269
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdfWINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptx
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
 
cryptography
cryptographycryptography
cryptography
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Performance Comparison of File Security System using TEA and Blowfish Algorithms

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 871 Performance Comparison of File Security System using TEA and Blowfish Algorithms Win Myat Thu, Tin Lai Win, Su Mu Tyar Department of Information Technology, Technological University, Mandalay, Myanmar How to cite this paper: Win Myat Thu | Tin Lai Win | Su Mu Tyar "Performance Comparison of File Security System using TEA and Blowfish Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019, pp.871-877, https://doi.org/10.31142/ijtsrd26462 Copyright © 2019 by author(s) and International Journalof Trendin Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms are commonly used for information security in many research areas. Although there are two encryption techniques, asymmetric and symmetric, the simpler symmetric encryption technique is employed for testingfilesecuritysystem.In thisstudy, the performance evaluation of the most common two symmetric encryption algorithms such as TEA and Blowfish algorithm is focused on the execution time intervals. Simulation has been conducted with many types of file encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most common video file formats by using Java Programming Language. KEYWORDS: Symmetric, Asymmetric, encryption, TEA, Blowfish I. INTRODUCTION Symmetric key algorithms are used primarily for the encryption of dataordata streams. These algorithms are designed to be very fastandhavealargenumber of possible keys. The best symmetric key algorithms offer excellent secrecy, once data is encrypted with a given key, there is no fast way to decrypt the data without processing the same key. Symmetric key algorithms can be divided into two categories: block and stream. Block algorithm encrypts data many bytes at a time, while stream algorithms encrypt byte by byte or even bit by bit [1]. This paper evaluates two symmetric encryption algorithms namely; TEA and Blowfish. The performance measure of encryption schemes willbe conducted in termsof processing time intervals on the Windows platform for the different file size. With the study of a file security system based on two symmetric algorithms, achieving file secrecy, analyzingdata encryption duration, studying TEA and Blowfishalgorithms’ Feistel structure and understandinghowtoapplyencryption algorithm for the file security system are strongly expected. The rest of this paper is organized as follows: SectionIIgives a brief cryptographic strength of symmetric algorithms, section III provides the algorithms thathavebeenchosen for implementation; section IV provides the performance evaluation methodology, section V discusses the simulation results in detail and finally section VI concludes the work. II. UNDERSTANDING CRYPTOGRAPHIC TECHNIQUES Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. The sender translates the plaintext into ciphertext. This ciphertext is then sent to the receiver. The authorized receiver gets the ciphertext and then converts the ciphertext back into the original form. The main aim of the cryptographyis to protect the information from illegal access. Goals, strength, weakness and basic terminology are expressed in the following section. The data can be read in its original form is called plain text. The way of mask the plaintext in such a way as to hide its original form is called encryption. The method of encrypting the plaintext which results in unreadable form is called ciphertext. The method of taking encrypted message or data and converting back into its original form is called decryption. An entity which provides encryption and decryption is called cryptosystem [2]. Depending upon the key cryptography can be divided into two categories: symmetric and asymmetric encryption. Symmetric Encryption(privatekeyEncryption)isduringthe encryption and decryption process the same key is used at the sender and receiver site. Before the transmission of information starts the key distribution has to be made [3]. Example: DES [4]-[6], 3DES [7], BLOWFISH [4], [5], AES [8] etc. However, in asymmetric encryption (Public key encryption, two different keys are used for encryption and decryption process. At the same time, the two keys are generated. In that one key is transferred to the other side before the exchange of information begins[9].Example: RSA [10], Elgamal, Elgamal signature Diffie Hellman key exchange, digital signature [11]. IJTSRD26462
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 872 A. Goals of Cryptography 1. Confidentiality: Data that resides in the computer is transmitted and that is to be accessed only by the legal person and that data can’t be accessed by anyone else. 2. Authentication: The data that is seen by any system has to check the identity of the sender, whether the data appears from a legal person or illegal person. 3. Data Integrity: To verify the information, it has not been changed by an illegal or unknown person. Only the sender and receiver can modify the message. No others have the rights to access the message (or) data. 4. Non-Repudiation: It does not allow repudiation by the sender or receiver. The receiver proves the identification of the sender in case of denial by the sender. The sender proves the identification of the receiver in case of denial by the receiver. 5. Access Control: It ensures that only the authorized person can have the rights to access the transmitted information [12]. B. Cryptographic Strength of Symmetric Algorithms Symmetric encryption, also referred to as conventional encryption or single key encryption was the only type of encryption in use prior to the development of public-key encryption. The private keys used in symmetric-key cryptography are robustly resistant to brute force attacks. While only the one-time pad, which combines plaintextwith a random key, holds secure in the face of any attacker regardless of time and computing power, symmetric-key algorithms are generally more difficult to crack than their public key counterparts. Additionally, secret-keyalgorithms require less computing power to be created than equivalent private keys in public-key cryptography [13]. C. Cryptographic Weakness of Symmetric Algorithms The biggest obstacle in successfully deploying a symmetric- key algorithm is the necessity for a proper exchange of private keys. This transaction must be completed inasecure manner. In the past, this would often have to be done through some type of face-to-face meeting, which proves quite impractical in many circumstances when taking distance and time into account. If one assumes that security is a risk to begin with due to the desire for a secret exchange of data in the first place, the exchange of keys becomes further complicated. Another problem concerns the compromise of a private key [14]. In symmetric-key cryptography, every participant has an identical private key. As the number of participants in a transaction increases, both the risk of compromise and the consequences of such a compromise increase dramatically. Each additional user adds another potential point of weakness that an attacker could takeadvantageof.If such an attacker succeeds in gaining control of justoneof theprivate keys in this world, every user,whetherthere arehundreds of users or only a few, are completely compromised [15]. D. Basic Terminology Used in Cryptography The symmetric encryption scheme has five ingredients. 1. Plaintext: This is the original intelligiblemessageor data that is fed to the algorithm as input. 2. Ciphertext: This is the scrambled message produced as output. It depends on the plaintext and the key. The ciphertext is an apparently random stream of data, as it stands, is unintelligible. 3. Encryption Algorithm: The encryption algorithm performs various substitutionsandpermutationsonthe plaintext. 4. Decryption Algorithm: This is essentially the encryption algorithm that runs in reverse. It takes the ciphertext and the secret key and produces the original plaintext. 5. Secret Key: The secret key is also input to the encryption algorithm. The exact substitutions and permutations performed depend on the key used, and the algorithm will produce a differentoutputdependingon thespecific key being used at the time [16]. III. COMPARED ALGORITHMS Symmetric encryption algorithms: Blowfish and TEA are compared for the execution time of various file types encryption and decryption. A. Blowfish Blowfish is a symmetric block cipher. It is used for encrypting and protecting the data. It has a variable-length key range from 32 bits to 448 bits, for safeguardingour data. It was designed in 1993 by Bruce Schneier. It is a license for encryption method and it is freely available to all users. It is mainly used for applications, such that key does not change often, like a communication link [17]. 1. Blowfish Algorithm It has large data blocks. It consists of a 64-bit block size. The range of key scalable from 32 bits to 256 bits. It uses very simple operation which is efficient for microprocessors. It has a variable number of iteration. It uses subkey which is one way hash of the key. It has no linear structure. Its design structure is simple to understand. Itincreases the confidence in the algorithm. It is a fiestel iterated block cipher [12]. 2. Fiestel Network: Fiestel Network is a common method of converting any function into a permutation. The working procedure of fiestel network: It split the block into two halves Now, the right half becomes the new left half. If the left half is XOR’d with the result of applying ‘f’ to the right half and the key, we have the new right half as the final result. Even the function f and not invertible the previous rounds can be derived [12]. 3. Block Diagram of the Blowfish Algorithm Blowfish is a symmetric key Feistel structured algorithm consisting of two parts: key expansion part and data- encryption part. It is one of the most public-domain encryption algorithms. It takes a variable-length key from 32-bits to 448-bits, permuted into18 sub-keyseach of 32-bit length and can be implemented on 32 or 64-bit processor [18] as shown in Fig. 1.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 873 F F Plaintext(64 bits) Ciphertext(64 bits) 32 bits32 bits RE0LE0 RE1LE1 RE16LE16 LE17 RE17 Round 1 Round 16 P1 P16 P18 P17 Fig.1 Block diagram of Blowfish algorithm A. TEA Tiny Encryption Algorithm (TEA) block cipherwasdesigned with speed and simplicity in mind. It is a variant of the Feistel Cipher. TEA operates on a 64-bit block of data that is then split up into two 32 bit unsigned integers during the encryption process. TEA uses a 128-bit key, and a magic constant is also utilized which is defined as 2^32/ (the golden ratio) [19]. The original TEA was written by Roger Needham and David Wheeler and was first presented in 1994. Tiny Encryption Algorithm is a Feistel type cipher that uses operations from mixed (orthogonal) algebraic groups. A dual shift causes all bits of the data and key to be mixed repeatedly. The key schedule algorithm is simple; the 128-bit key K is split into four 32-bit blocks K = (K [0], K [1], K [2], K [3]). TEA seems to be highly resistant to differential cryptanalysis and achieves complete diffusion. Time performance on a workstation is very impressive. The inputstotheencryption algorithm are a plaintext block and a key K.The plaintextisP = (Left[0], Right[0]) and the ciphertext is C = (Left[64], Right[64]). The plaintext block is split into two halves, Left[0] and Right[0]. Each half is used to encrypt the other half over 64 rounds of processing and then combine to produce the ciphertext block [20]. 4. Block Diagram for TEA Algorithm TEA uses a key size of 128 bits and a block size of 64 bits. It is very nearly a Feistel cipher, although addition modulo 2^32 is used to combine the round function with the block rather than addition modulo 2. This means that the decryption function is slightly different from the encryption function, although both are so simple that the difference is not generally problematic. The Feistel rounds are grouped into pairs, called cycles. Many other Feistel ciphers, in the last round the last swap is done, just like in the other rounds. This again makes decryption in reverse, slightly different from encryption shown in Fig. 2, but since a separate implementation for decryption is necessary anyway the difference is worthwhile to simplify the description [21]. Decryption is the same except that thetwo additionsmodulo 2^32 at the left-hand side are replaced with subtractions modulo 2^32, and the swaps are done at the start of the round instead of the end [21]. Plaintext F Ciphertext F F F Right[0] K[1] K[2] K[63] K[64] Left[0] Right[64] Left[64] Fig.2 Blocked encryption for TEA algorithm [22] IV. PERFORMANCE EVALUATION METHODOLOGY Performance evaluation on which hardware and software requirement, which IDE is used to implement which criteria are emphasized, which types of file are tested and how the system works are detail expressed in the following sections. A. System Parameters This encryption and decryption of TEA and Blowfish algorithms were implemented with Java in IDE. The performance was measured on Intel(R) Pentium (R) CPU P6000 @1.87GHz 1.87GHz, 64-bit operating system with 1.00 GB of RAM running Window 10 Pro. B. Experiment Factors The variety of input files size from 85 Kbytesto2600 Kbytes. Comparison of TEA and Blowfish execution time are calculated in milliseconds. The result of encryption time is measured when an encryption algorithm takes to make a cipher content from plaintext and the revert manner. By isolating the total plaintext in megabytes encrypted on the whole encryption time for each algorithm, the amount of an encryption scheme is calculated. Encryption processforboth symmetric encryption algorithms is shown in Fig. 3 and in the meanwhile the decryption processisalsoshowninFig.4.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 874 Fig.3 Encryption process
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 875 Fig.4 Decryption process
  • 6. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 876 V. SIMULATION RESULTS The overall performance of the encryption algorithm is assessed considering the above-mentioned parameters together with encryption time and decryption time. The encryption time is considered because of the time that an encryption algorithm takes to deliver a ciphertext from a plain textual content. Comparative analyses of theoutcomes of the chosen and distinctive encryption scheme are performed as shown in table 1 to 14. A. Comparative Results of TEA and Blowfish algorithm with Different File Types The blowfish algorithm performs better compared withTEA regarding time consumption for both encryption and decryption scheme. Table 1 to 14 show the encryption and decryption stage including file sizes and their run times. Total seven types of files are compared and although any input file sizes are able to be tested, only three approximate file sizes are mentioned in this paper. 85 KB to 2600 KB files is tested. In experiment analysis, encryption time table, decryption time table are illustrated respectively for seven different file format. TABLE I INPUT SIZE AND ENCRYPTION TIME FOR PDF FILE Input Size (in Kbytes) TEA (ms) Blowfish(ms) 140 8 13 296 17 26 2600 454 644 TABLE II INPUT SIZE AND DECRYPTION TIME FOR PDF FILE Input Size (in Kbytes) TEA (ms) Blowfish(ms) 140 7 14 296 15 31 2600 523 584 TABLE III Input Size and Encryption Time for Document File Input Size (in Kbytes) TEA (ms) Blowfish(ms) 154 9 11 458 26 40 1200 71 74 TABLE IV Input Size and Decryption Time for Document File Input Size (in Kbytes) TEA (ms) Blowfish(ms) 154 8 9 458 24 47 1200 66 72 According to the experimental results, decryption process is exactly the same as encryption but execution time. TABLE V Input Size and Encryption Time for Excel File Input Size (in Kbytes) TEA (ms) Blowfish(ms) 90 6 23 60 4 6 135 10 30 TABLE VI INPUT SIZE AND DECRYPTION TIME FOR EXCEL FILE Input Size (in Kbytes) TEA (ms) Blowfish (ms) 90 3 10 60 3 7 135 8 12 TABLE VII INPUT SIZE AND ENCRYPTION TIME FOR POWERPOINT FILE Input Size (in Kbytes) TEA (ms) Blowfish (ms) 350 21 28 612 35 55 1250 68 82 TABLE VIII INPUT SIZE AND DECRYPTION TIME FOR POWERPOINT FILE Input Size (in Kbytes) TEA (ms) Blowfish (ms) 350 20 21 612 31 63 1250 63 66 TABLE IX INPUT SIZE AND ENCRYPTION TIME FOR JPG FILE Input Size (in Kbytes) TEA (ms) Blowfish (ms) 85 3 4 153 8 10 319 18 28 TEA is being considered to be a standard encrypting algorithm since no specified weaker points are found so far in comparing to the Blowfish algorithm for both encryption and decryption processes. TABLE X INPUT SIZE AND DECRYPTION TIME FOR JPG FILE Input Size (in Kbytes) TEA (ms) Blowfish (ms) 85 4 5 153 7 15 319 17 33 TABLE XI INPUT SIZE AND ENCRYPTION TIME FOR MP4 FILE Input Size (in Kbytes) TEA (ms) Blowfish (ms) 955 54 87 1922 108 111 2422 147 209 TABLE XII INPUT SIZE AND DECRYPTION TIME FOR MP4 FILE Input Size (in Kbytes) TEA (ms) Blowfish (ms) 955 49 97 1922 97 165 2422 126 250 TABLE XIII INPUT SIZE AND ENCRYPTION TIME FOR TEXT FILE Input Size (in Kbytes) TEA (ms) Blowfish (ms) 98 5 9 125 15 19 250 22 27 TABLE XIV INPUT SIZE AND DECRYPTION TIME FOR TEXT FILE Input Size (in Kbytes) TEA (ms) Blowfish (ms) 98 6 10 125 28 30 250 29 31 It turned into concluded that the TEA encrypting algorithm performs in a much efficient way for encrypting and decrypting the confidential data.HenceTEA worksbetter for secure file system application. VI. CONCLUSION Many data from where such as military, hospital, bank and business need security while communicating between people and activities. Symmetric encryption algorithms can
  • 7. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26462 | Volume – 3 | Issue – 5 | July - August 2019 Page 877 solve the problems of information security with the security keys. Symmetric key algorithms are faster and easier to be implemented than the asymmetric key algorithms. This system proves which algorithm is appropriate for each file type. Therefore, different file types: videofile,imagefile, text file, portable document format file, word file,powerpointfile and excel file are encrypted with TEA and Blowfish symmetric encryption algorithms to secure and the execution durations are also compared with three different file sizes. Altogether, various file secrecy and symmetric encryption knowledge are achieved and TEAis preferred for file security. ACKNOWLEDGMENT We wish to express our sincere gratitude to Dr. Tin Lai Win and Dr. Su Mu Tyar. We also thank all of our teachers for providing us the opportunity to embark on this study. REFERENCES [1] (2018) The eTutorials website. [Online]. Available: http://etutorials.org/Linux+System/unix+internet+sec urity/. [2] W. Stallings, Cryptography and Network Security Principles and Practices, 4th ed., Pearson Education, Prentice-Hall, 2009. [3] Himani Agrawal and Monisha Sharma, “Implementation and analysis of various Symmetric Cryptosystems”, Indian Journal of Science and Technology, vol.3, no.12, 2012. [4] P. C. Mandal, “Evaluation of the performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish,” Journal of Global Research in Computer Science, e-ISSN 2229-371X, vol. 3, no. 8, Aug. 2012. [5] J. Thakur, N. Kumar“DES,AESandBlowfish:Symmetric Key Cryptography Algorithms Simulation-Based Performance Analysis,” International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, pp. 6-12, vol.1, Issue 2, Dec. 2011. [6] M. Agrawal, P. Mishra “A Comparative Survey on Symmetric Key Encryption Techniques,” International Journal on Computer Science and Engineering (IJCSE), vol.4, no. 05, pp.877-882, May. 2012. [7] S.Pavithra, Mrs. E. Ramadevi “Study and Performance Analysis of Cryptography Algorithms,” International Journal of Advanced Research in Computer Engineering & Technology, vol.1, Issue 5, pp.82-86, July. 2012. [8] Shanta, Y. Vashishtha, “Evaluating the performance of Symmetric Key Algorithms: AES(Advanced Encryption Standard) and DES (Data Encryption Standard),” International Journal of Computational Engineering & Management (IJCEM), vol. 15, Issue 4, pp.43-49, July. 2012. [9] Manoj Kumar Pandey, et. all, “Survey Paper: Cryptography The art of Hiding Information”, International JournalofAdvancedResearchin Computer Engineering & Technology (IJARCET), ISSN: 2278 – 1323, vol.2, no.12, 2013. [10] M, Vishwakarma, “Comparative study of Cryptography Algorithms”, International Journal of Advanced Research in Computer Science, ISSN: 0976-5697, vol.4, no. 3, Special Issue, March. 2013. [11] Kellogg S. Booth, “Authentication of signatures using public-key encryption,” Communicationsof theACM,pp. 772-774, Nov. 1981. [12] S.Suguna1, Dr.V.Dhanakoti2, R. Manjupriya3, “A Study on Symmetric and Asymmetric Key Encryption Algorithms.” International Research Journal of Engineering and Technology (IRJET), e-ISSN: 2395 - 0056, vol.3 Issue.4, pp. 28, Apr.2016. [13] S. Halevi and H. Krawczyk, “Public-key cryptography and password protocols,” ACM Transactions on Information and System Security, pp. 230-268, Aug. 1999. [14] W. Küchlin, “Public key encryption,” ACM SIGSAM Bulletin, pp. 6973, Aug. 1987. [15] M. Blumenthal,“Encryption:Strengths andWeaknesses of Public-key Cryptography” Univ. of Villanova, Department of Computing Sciences, Computing Research Topics, PA 19085, CSC 3990. [16] K. Krishnan. “Computer Networks and Computer Security,” LectureNotesinCryptography,2004,Lecture 22-24. [17] N. Tingyuan, T. Zhang, “A Study of DES and Blowfish Encryption Algorithm”, IEEE, 2009. [18] Saikumar Manku1 and K. Vasanth2, “Blowfish Encryption Algorithm for Information Security,” Journal of Engineering and Applied Sciences (ARPN), ISSN 1819-6608, vol.10, no. 10, June. 2015. [19] Wheeler, David, R. Needham. “TEA a tiny encryption algorithm” Fast Software Encryption. Springer Berlin/Heidelberg, 1995. [20] Vikram R. Andem, “A Cryptanalysis of the Tiny Encryption Algorithm”, M.Sc. thesis, University of Alabama, Alabama, 2003. [21] J. Holden, “Demitasse: A Small Version of the Tiny Encryption Algorithm and its Use in a Classroom Setting”, Department of Mathematics, Rose-Hulman Institute of Technology, Terre Haute, In 47803, USA. [22] (1998) The Wikipedia website. [Online]. Available: https://upload.wikimedia.org/wikipedia/commons/a/ a1/TEA_InfoBox_Diagram/.