ISSN: 2278-0181
Vol. 3 Issue 4, April - 2014
Evaluation of DES, TDES, AES, Blowfish and
Two fish Encryption Algorithm: Based on
Space Complexity
MD Asif Mushtaque
Harsh Dhiman
M.Tech(CS&E)
School of Computing Science and Engineering
Galgotias University, Greater Noida, U.P .
M.Tech(CS&E)
School of Computing Science and Engineering
Galgotias University, Greater Noida, U.P.
Shahnawaz Hussain
Shivangi Maheshwari
M.Tech(CS&E)
School of Computing Science and Engineering
Galgotias University, Greater Noida, U.P.
M.Tech(CS&E)
School of Computing Science and Engineering
Galgotias University, Greater Noida, U.P.
(ii)
IJE
RT
Abstract--Due to fast growing of telecommunication technology and limitation for information transmission there is a need to use an efficient cryptography algorithm which takes less space after encryption for the ciphertext. Some performance matrics (such as time, speed and throughput) make the algorithm better. In this paper, we analyze and find an efficient encryption algorithm which takes less space among these encryption algorithms such as DES, TDES, AES,
Blowfish and Twofish.
Keywords— Space complexity, Encryption, Decryption,
Symmetric Key, Private Key, DES, TDES, AES, Blwofish,
Twofish.
I.
INTRODUCTION
Cryptography is a technique or method to secure our personal data from unauthorized user. In cryptography two types of operation are performed. (i) Encryption and (ii)
Decryption. To encrypt and decrypt data a secret key is used. After encryption original data is converted into another format known as cyphertext, which is not easy to understand. Plaintext- Original message that can be understood by anyone. Secret Key- A key that is used to change the format of the original message.
Ciphertext- Another format of the original message that cannot be understood by anyone.
Steps of Cryptography:(i)
Encrypt
References: AES”, IEEE Student’s Conference on Electrical, Electronics and Computer Science, IEEE, 2012. Fei Shao, Zinan Chang and Yi Zhang, “AES Encryption Algorithm Based on the High Performance Computing of GPU”, 2010 Second International Conference on Communication Software and Networks DOI 10.1109/ICCSN.2010.124, IEEE, 2010. Effect on Real Running in PLC Networks”, IEEE, 2012. A. Mousa, “Data encryption performance based on Blowfish”, 47th International Symposium, IEEE, 2005.