216
Evaluating The Performance of Symmetric Encryption Algorithms
Diaa Salama Abd Elminaam1 , Hatem Mohamed Abdual Kader2 , and Mohiy Mohamed Hadhoud2
(Corresponding author: Diaa Salama Abd Elminaam)
Higher Technological Institute 10th of Ramadan City, Egypt1 Faculty of Computers and Information Minufiya University, Egypt2 (Email: {ds desert, hatem6803, mmhadhoud}@yahoo.com (Received Feb. 16, 2009; revised and accepted May 12, 2009)
Abstract
bits keys [2, 3, 4, 5, 9, 10, 11, 13]. The most common classification of encryption techniques can be shown in Internet and networks applications are growing very fast, Figure 1. so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms conCryptography sume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption Protocols Public-key Private-key algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for RSA& Others each algorithm such as different sizes of data blocks, difBlock Stream ferent data types, battery power consumption, different key size and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness RC4& Others of each algorithm. AES BlowFish &Others RC6 Keywords: 3DES, AES, blowfish, computer security, DES, encryption techniques, RC2, RC6 Figure 1: Overview of the field of cryptography
1
Introduction
Many encryption algorithms are widely available and used in information security. They can be categorized into Symmetric (private) and Asymmetric (public) keys encryption. In Symmetric keys encryption or secret key encryption, only one key is used to encrypt and decrypt data. In
References: [1] R. Chandramouli, “Battery power-aware encryption,” ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 2, pp. 162-180, May 2006. [2] D. Coppersmith, “The data encryption standard (DES) and its strength against attacks,” IBM Journal of Research and Development, pp. 243 -250, May 1994. [3] J. Daemen, and V. Rijmen, “Rijndael: The advanced encryption standard,” Dr. Dobb’s Journal, pp. 137139, Mar. 2001. [4] N. E. Fishawy, “Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms,” International Journal of Network Security, pp. 241-251, Nov. 2007. [5] Hardjono, Security In Wireless LANS And MANS, Artech House Publishers, 2005. [6] S. Hirani, Energy Consumption of Encryption Schemes in Wireless Devices Thesis, University of Pittsburgh, Apr. 9,2003, Retrieved Oct. 1, 2008. (http://portal.acm.org/citation.cfm?id=383768) Figure 15: Time consumption for different key size for RC6 International Journal of Network Security, Vol.10, No.3, PP.216–222, May 2010 222 [7] S. Z. S. Idrus, and S. A. Aljunid, “Performance analysis of encryption algorithms text length size on web browsers,” IJCSNS International Journal of Computer Science and Network Security, vol. 8, no.1, pp. 20-25, Jan. 2008. [8] K. McKay, Trade-offs between Energy and Security in Wireless Networks Thesis, Worcester Polytechnic Institute, Apr. 2005. [9] K. Naik, “Software implementation strategies for power-conscious systems,” Mobile Networks and Applications, vol. 6, pp. 291-305, 2001. [10] P. Ruangchaijatupon, and P. Krishnamurthy, “Encryption and power consumption in wireless LANsN,” The Third IEEE Workshop on Wireless LANs, pp. 148-152, Newton, Massachusetts, Sep. 27-28, 2001. [11] B. Schneier, The Blowfish Encryption Algorithm, Retrieved Oct. 25, 2008. (http://www. schneier.com/blowfish.html) [12] A. Sinha, A. P. Chandrakasan, and JouleTrack, “A web based tool for software energy profiling,” Proceedings of the 38th Design Utomation Conference, pp. 220-225, DAC Las Vega, US, 2001. [13] W. Stallings, Cryptography and Network Security, Prentice Hall, pp. 58-309, 4th Ed, 2005. [14] A. A. Tamimi, Performance Analysis of Data Encryption Algorithms, Retrieved Oct. 1, 2008. (http://www.cs.wustl.edu/∼jain/cse567-06/ftp/ encryption perf/index.html) [15] A. Nadeem, “A performance comparison of data encryption algorithms,” IEEE Information and Communication Technologies, pp. 84-89, 2006. [16] Results of Comparing Tens of Encryption Algorithms Using Different Settings- Crypto++ Benchmark, Retrieved Oct. 1, 2008. (http://www.eskimo.com/ weidai/benchmarks.html) Diaa Salama Abd Elminaam was born on November 23, 1982 in Kafr Sakr, Sharkia, Egypt. He received the B.S from Faculty of Computers &Informatics, Zagazig University, Egypt in 2004 with grade very good with honor, and obtains master degree in information system from faculty of computers and information, menufia university, Egypt in 2009. He is working in Higher Technological Institute, 10th of Ramadan city as teaching assistance at Faculty of Computer and informatics. He majors in Cryptography and Network Security. (Mobile: +20166104747; e-mail:ds desert@yahoo.com) Dr. H. M. Abdul-kader obtained his B. S. and M. SC. (by research) both in Electrical Engineering from the Alexandria University, Faculty of Engineering, Egypt in 1990 and 1995 respectively. He obtained his Ph.D. degree in Electrical Engineering also from Alexandria University, Faculty of Engineering, and Egypt in 2001 specializing in neural networks and applications. He is currently a Lecturer in Information systems department, Faculty of Computers and Information, Menoufya University, Egypt since 2004. He has worked on a number of research topics and consulted for a number of organizations. He has contributed more than 30+ technical papers in the areas of neural networks, Database applications, Information security and Internet applications. Professor Mohiy Mohamed Hadhoud, Dean, Faculty of Computers and Information, head of Information Technology Department, Menoufia University, Shebin Elkom, Egypt. He is a member of National Computers and Informatics Sector Planning committee, University training supervisor. He graduated, from the department of Electronics and Computer Science, Southampton University, UK, 1987. Since 2001 till now he is working as a Professor of Multimedia, Signals and image processing and Head of the department of Information Technology (IT), He was nominated by the university council for the national supremacy award, years 2003, and 2004. He is the recipient of the university supremacy award for the year 2007. He, among others are the recipient of the Most cited paper award form the Digital signal processing journal, Vol. 18, No. 4, July 2008, pp. 677-678. ELSEVIER Publisher. Prof. Hadhoud has published more than 110 papers in international journals, international conferences, local journals and local conferences. His fields of Interest: Digital Signal Processing, 2-D Adaptive filtering, Digital Image Processing, Digital communications, Multimedia applications, and Information security and data hiding.