SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Advance Engineering and Research
Development
Volume 4, Issue 5, May -2017
@IJAERD-2017, All rights Reserved 989
Scientific Journal of Impact Factor (SJIF): 4.72
e-ISSN (O): 2348-4470
p-ISSN (P): 2348-6406
A Comparative Study of Symmetric Key Algorithm DES, AES and Blowfish for
Video Encryption and Decryption
1
Pankaj Kumari, 2
Manju Bala, 3
Ankush Sharma
1
M.Tech Student , Computer science Engineering, Career Point University, Hamirpur(H.P)
2
M.Tech Student, Computer science Engineering, Career Point University, Hamirpur(H.P)
3
Assistant Professor, Computer science Engineering, Career Point University, Hamirpur(H.P)
Abstract- Cryptography is “The science of protecting data” & Network security “Keeping information private and
secure from unauthorized users”. In cryptography encryption decryption of data is done by using secret key provide data
confidentiality, data integrity and authentication[3]. The process of transforming plaintext into ciphertext is called
encipherment or encryption; the reverse process of transforming ciphertext into plaintext is called decipherment or
decryption. Both encipherment and decipherment are controlled by a cryptographic key.This paper performs
comparative analysis of three Algorithms like DES, AES and BLOWFISH for video encryption and decryption
considering certain parameters such as time and file size.
Keywords: Cryptography, Encryption, Decryption, DES, AES, BLOWFISH
I. INTRODUCTION
Cryptography techniques often used to secure the data transmission and storing between user and cloud storage services.
For secure communication over the public network data can be protected by the method of encryption[1]. Encryption
converts that data using an encryption algorithm using the key in scrambled form. Encryption is the process of
transforming the information to ensure its security. Although data encryption is widely used to ensure security, most of
the available encryption algorithms are used for text data.
Cryptography is derived from Greek word. It has 2 parts: 'crypto' means "hidden secret" and ‘graphy’ means "writing". It
is a study of techniques for secure communication in the presence of third parties to maintain information securities such
as data integrity, confidentiality, authentication, and non-repudiation[7]. The original message, before being transformed,
is called plain text. After the message is transformed, is called cipher text. An encryption algorithm transforms the
plaintext into cipher text; a decryption algorithm transforms the cipher text back into plaintext. The sender uses an
encryption algorithm, and the receiver uses a decryption algorithm. A cryptosystem is a collection of algorithms and
associated procedures for hiding and revealing information.
Figure1: Encryption Decryption process
A. Types of cryptography
 Symmetric Key or Secret Key Cryptography
 Asymmetric Key or Public Key Cryptography
Symmetric Key or Secret Key Cryptography
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 4, Issue 5, May-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406
@IJAERD-2017, All rights Reserved 990
In symmetric-key cryptography, the same key is used by both parties. Sometimes is also called as single key or secret-
key cryptography. It uses a single key. The sender uses this key and an encryption algorithm to encrypt data; the receiver
uses the same key and an decryption algorithm to decrypt the data [5].
Figure 2: Symmetric Key Cryptography
Asymmetric Key Cryptography
Public key cryptography or Asymmetric-key cryptography: Asymmetric key (public key)
encryption is used to solve the problem of key distribution[2]. In asymmetric key cryptography different keys are
used for encryption and decryption. The two keys are used; private key and public key. For encryption public key is
used and for decryption private key is used. Public key is known to public and private key is known to the user. The
sender uses the public key for encryption and the receiver uses his private key for decryption [5]. The public key is
available to the public; the private is available only to an individual.
Imagine sender wants to send a message to receiver. Sender uses the public key to encrypt the message. When the
message is received by the receiver, the private key is used to decrypt the message.
Figure 3: Asymmetric Key Cryptography
B. Need of cryptography
In today’s world cryptography has become a necessity for all the organizations. Data security is an essential component
of an organization in order to keep the information safe from various competitors. It also helps to ensure the privacy of a
user from others. These days passwords are not considered as reliable for this task because it is easy to guess passwords
due to its short range. Moreover, if the range of password is small a brute force search can be applied to crack it. So, as to
protect our data various algorithms have been designed. It helps us to securely access bank accounts, electronic transfer
of funds and many more daily life applications.
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 4, Issue 5, May-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406
@IJAERD-2017, All rights Reserved 991
II. CRYPTOGRAPHY ALGORITHMS
DES (Data Encryption Standard)
Data Encryption Standard (DES) is a symmetric key block cipher. The key length is 56 bits and block size is 64 bit
length. It is vulnerable to key attack when a weak key is used. DES was found in 1972 by IBM using the data encryption
algorithm. It was adopted by the government of USA as standard encryption algorithm. It began with a 64 bit key and
then the NSA put a restriction to use of DES with a 56- bit key length, hence DES discards 8 bits of the 64 bit key and
then uses the compressed 56 bit key derived from 64 bit key to encrypt data in block size of 64-bits .To encrypt a
plaintext message, DES groups it into 64-bit blocks.DES is considering to be insecure for many applications, due to the
56-bit key size being too small. It uses the same keys for both encryption and decryption, and only operates 64 bit blocks
of data at a time[4].
AES (Advance Encryption Standard)
AES is the new encryption standard recommended by NIST (National Institute of Standards and Technology) to replace
DES. It was originally called Rijndael. It was selected in 1997 after a competition to select the best encryption
standard.AES is a block cipher with a block length of 128 bits. The variable key length of 128,192 or 256 bits; default
256. AES encryption is fast and flexible; it can be implemented on various platforms especially in small devices brute
force attack is the only effective attack known against it, in which attackers tries to test all the characters combinations to
unblock the encryption[6]. It encrypts data blocks of 128 bits in 10, 12, or 14 rounds depends on the key size. It was
found at least six times faster than triple DES.A replacement for DES was needed as its key size was too small, with
increasing computing power, it was consider vulnerable against exhaustive key search attacks. Triple DES was designed
to overcome this drawback but it was found slow.
Blowfish Algorithm
It is one of the most public domain encryption algorithms. Blowfish was designed in 1993 by Bruce Schneider as a fast
alternative to existing encryption algorithms. Blowfish is a symmetric key block cipher that uses a 64 bit block size and
variable key length from 32 bits to 448 bits. Blowfish has 16 rounds or less. Blowfish is a very secure cipher and to use
encryption free of patents and copyrights. No attack is successful against Blowfish, although it suffers from weak keys
problem. Blowfish security lies in its variable key size (32-448) providing high level of security, attempts to
cryptanalysis blowfish started soon after its publication. However less cryptanalysis attempts were made on blowfish
than other algorithms.
III RESULT AND ANALYSIS
The three video file of different size are used to conduct three experiments, where a comparison of three algorithms DES,
AES and Blowfish is performed.
A. Evaluation Parameters
Performance of encryption algorithm is evaluated considering the following parameters.
 Encryption Time
 Decryption Time
Encryption Time
Encryption is the conversion of data into another form, called ciphertext, which cannot be easily understood by anyone
except authorized parties. It may also be performed with a set of keys or passwords. The time taken to encrypt any file is
called Encryption Time. Here, Encryption Time is measured in milliseconds (ms).
Evaluation of encryption time: The encryption simulation was performed on DES, AES and Blowfish algorithms had
been carried on NetBeans IDE 7.1.2.The encryption simulation is probably the most fundamental type of cryptographic
analysis that can be performed on the algorithms under study. This simulation is simple and standardized. In this work,
the encryption simulation values are obtained for various algorithms, are shown in Figure given below:
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 4, Issue 5, May-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406
@IJAERD-2017, All rights Reserved 992
Figure 4: Shows the comparison of encryption timing in DES, AES, Blowfish algorithm and the encryption time of the
Blowfish algorithm is lesser than AES and DES algorithm.
Decryption Time
Decryption is the process of transforming data that have been rendered unreadable through encryption back to its
unencrypted form. During decryption, the system extracts and converts the cipher data and transforms it to texts and
images that are easily understandable not only by the reader but also by the system. It may also be performed with a set
of keys or passwords. The time taken to decrypt any file is called Decryption Time. Here, Encryption Time is measured
in milliseconds (ms).
Evaluation of decryption time: - The decryption simulation was performed on DES, AES and Blowfish algorithms had
been carried on NetBeans IDE 7.1.2.The decryption simulation is probably the most fundamental type of cryptographic
analysis that can be performed on the algorithms under study. This simulation is simple and standardized. In this work,
the decryption simulation values are obtained for various algorithms, are shown in Figure given below:
Figure 5: Shows the comparison of decryption timing in DES, AES, Blowfish algorithm and the decryption time of the
Blowfish algorithm is lesser than DES algorithm.
IV. Conclusion
In cryptography, encryption and decryption algorithms plays important role in network security. In our research work, we
analyzed the comparison of existing encryption techniques like DES, AES and Blowfish algorithms. Based on the video
files used and the experimental result it was concluded that Blowfish algorithm consumes least encryption time and DES
40
90
120
70
80
100
50
60
90
0
20
40
60
80
100
120
140
110 500 1000
Timing(ms)
video Size (KB)
Encryption Timing Comparison
DES Algorithm
AES Algorithm
Blowfish Algorithm
30
60
100
30
50
70
30
40
70
0
20
40
60
80
100
120
110 500 1000
Timing(ms)
video Size (KB)
Decryption Timing Comparison
DES Algorithm
AES Algorithm
Blowfish Algorithm
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 4, Issue 5, May-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406
@IJAERD-2017, All rights Reserved 993
consume maximum encryption time. We also observed that Decryption of Blowfish and AES algorithms is better than
DES algorithm. From our research work, it concluded that Blowfish algorithm is better than AES and DES algorithms.
REFERENCES
[1] Kalyani P. Karule, and Neha V. Nagrale, “Comparative Analysis of Encryption Algorithms”, International
Journal of Scientific Engineering and Applied Science (IJSEAS) – Volume-2, Issue-2, February 2016.
[2] Yogesh Kumar, Rajiv Munjal, and Harsh Sharma, “Comparison of Symmetric and Asymmetric Cryptography
with Existing Vulnerabilities and Countermeasures,” International Journal of Computer Science and
Management Studies, Vol. 11, Issue 03, Oct 2011.
[3] Nivedita Bisht, and Sapna Singh, “A Comparative Study of Some Symmetric and Asymmetric Key Cryptography
Algorithms”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 4,
Issue 3, March 2015, ISSN(Online) : 2319 – 8753
[4] M. Meena, and A. Komathi , “ A Study and Comparative Analysis of Cryptographic Algorithms for Various
File Format”, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
[5] Behrouz A. Forouzan, “Data Communication and Networking”, McGraw-Hill Forouzan Networking Series,
2007.
[6] Simar Preet Singh, and Raman Maini, “COMPARISON OF DATA ENCRYPTION ALGORITHMS”,
international Journal of Computer Science and Communication ,Vol. 2, No. 1, January-June 2011, pp. 125-127
[7] Anjula Gupta, and Navpreet Kaur Walia, “Cryptography Algorithms”, Sri Guru Granth Sahib World
University, Fatehgarh Sahib, India.

More Related Content

What's hot

An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONSECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONadeij1
 
The des algorithm illustrated
The des algorithm illustratedThe des algorithm illustrated
The des algorithm illustratedNIKKHILK111
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
Analysis and comparison of symmetric key
Analysis and comparison of symmetric keyAnalysis and comparison of symmetric key
Analysis and comparison of symmetric keyIJNSA Journal
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloudkrprashant94
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKIRabei Hassan
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...IRJET Journal
 

What's hot (19)

An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONSECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
 
The des algorithm illustrated
The des algorithm illustratedThe des algorithm illustrated
The des algorithm illustrated
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
Analysis and comparison of symmetric key
Analysis and comparison of symmetric keyAnalysis and comparison of symmetric key
Analysis and comparison of symmetric key
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
82 86
82 8682 86
82 86
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
 

Similar to A comparative study of symmetric key algorithm des, aes and blowfish for video encryption and decryption

A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic TechniquesStacy Taylor
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologiesijtsrd
 
Implementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption AlgorithmImplementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption Algorithm076TalathUnNabiAnik
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxjibonjibon5
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxukd789555
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database SecurityIRJET Journal
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
 

Similar to A comparative study of symmetric key algorithm des, aes and blowfish for video encryption and decryption (20)

A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
Data encryption
Data encryptionData encryption
Data encryption
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Implementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption AlgorithmImplementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption Algorithm
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 

Recently uploaded

《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...ur8mqw8e
 
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual serviceanilsa9823
 
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot AndCall Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot AndPooja Nehwal
 
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改atducpo
 
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改atducpo
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfssusere8ea60
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfJess Walker
 
The Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushThe Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushShivain97
 
Lilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptxLilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptxABMWeaklings
 
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female serviceanilsa9823
 
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...anilsa9823
 
call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..nishakur201
 
CALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual serviceanilsa9823
 
Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666nishakur201
 
Postal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utilisePostal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utiliseccsubcollector
 
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...CIOWomenMagazine
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭o8wvnojp
 
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
 
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
 
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot AndCall Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
 
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
 
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
 
The Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushThe Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by Mindbrush
 
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
 
Lilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptxLilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptx
 
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
 
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
 
call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..
 
CALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual service
 
Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666
 
Postal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utilisePostal Ballot procedure for employees to utilise
Postal Ballot procedure for employees to utilise
 
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭
 
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
 

A comparative study of symmetric key algorithm des, aes and blowfish for video encryption and decryption

  • 1. International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May -2017 @IJAERD-2017, All rights Reserved 989 Scientific Journal of Impact Factor (SJIF): 4.72 e-ISSN (O): 2348-4470 p-ISSN (P): 2348-6406 A Comparative Study of Symmetric Key Algorithm DES, AES and Blowfish for Video Encryption and Decryption 1 Pankaj Kumari, 2 Manju Bala, 3 Ankush Sharma 1 M.Tech Student , Computer science Engineering, Career Point University, Hamirpur(H.P) 2 M.Tech Student, Computer science Engineering, Career Point University, Hamirpur(H.P) 3 Assistant Professor, Computer science Engineering, Career Point University, Hamirpur(H.P) Abstract- Cryptography is “The science of protecting data” & Network security “Keeping information private and secure from unauthorized users”. In cryptography encryption decryption of data is done by using secret key provide data confidentiality, data integrity and authentication[3]. The process of transforming plaintext into ciphertext is called encipherment or encryption; the reverse process of transforming ciphertext into plaintext is called decipherment or decryption. Both encipherment and decipherment are controlled by a cryptographic key.This paper performs comparative analysis of three Algorithms like DES, AES and BLOWFISH for video encryption and decryption considering certain parameters such as time and file size. Keywords: Cryptography, Encryption, Decryption, DES, AES, BLOWFISH I. INTRODUCTION Cryptography techniques often used to secure the data transmission and storing between user and cloud storage services. For secure communication over the public network data can be protected by the method of encryption[1]. Encryption converts that data using an encryption algorithm using the key in scrambled form. Encryption is the process of transforming the information to ensure its security. Although data encryption is widely used to ensure security, most of the available encryption algorithms are used for text data. Cryptography is derived from Greek word. It has 2 parts: 'crypto' means "hidden secret" and ‘graphy’ means "writing". It is a study of techniques for secure communication in the presence of third parties to maintain information securities such as data integrity, confidentiality, authentication, and non-repudiation[7]. The original message, before being transformed, is called plain text. After the message is transformed, is called cipher text. An encryption algorithm transforms the plaintext into cipher text; a decryption algorithm transforms the cipher text back into plaintext. The sender uses an encryption algorithm, and the receiver uses a decryption algorithm. A cryptosystem is a collection of algorithms and associated procedures for hiding and revealing information. Figure1: Encryption Decryption process A. Types of cryptography  Symmetric Key or Secret Key Cryptography  Asymmetric Key or Public Key Cryptography Symmetric Key or Secret Key Cryptography
  • 2. International Journal of Advance Engineering and Research Development (IJAERD) Volume 4, Issue 5, May-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 @IJAERD-2017, All rights Reserved 990 In symmetric-key cryptography, the same key is used by both parties. Sometimes is also called as single key or secret- key cryptography. It uses a single key. The sender uses this key and an encryption algorithm to encrypt data; the receiver uses the same key and an decryption algorithm to decrypt the data [5]. Figure 2: Symmetric Key Cryptography Asymmetric Key Cryptography Public key cryptography or Asymmetric-key cryptography: Asymmetric key (public key) encryption is used to solve the problem of key distribution[2]. In asymmetric key cryptography different keys are used for encryption and decryption. The two keys are used; private key and public key. For encryption public key is used and for decryption private key is used. Public key is known to public and private key is known to the user. The sender uses the public key for encryption and the receiver uses his private key for decryption [5]. The public key is available to the public; the private is available only to an individual. Imagine sender wants to send a message to receiver. Sender uses the public key to encrypt the message. When the message is received by the receiver, the private key is used to decrypt the message. Figure 3: Asymmetric Key Cryptography B. Need of cryptography In today’s world cryptography has become a necessity for all the organizations. Data security is an essential component of an organization in order to keep the information safe from various competitors. It also helps to ensure the privacy of a user from others. These days passwords are not considered as reliable for this task because it is easy to guess passwords due to its short range. Moreover, if the range of password is small a brute force search can be applied to crack it. So, as to protect our data various algorithms have been designed. It helps us to securely access bank accounts, electronic transfer of funds and many more daily life applications.
  • 3. International Journal of Advance Engineering and Research Development (IJAERD) Volume 4, Issue 5, May-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 @IJAERD-2017, All rights Reserved 991 II. CRYPTOGRAPHY ALGORITHMS DES (Data Encryption Standard) Data Encryption Standard (DES) is a symmetric key block cipher. The key length is 56 bits and block size is 64 bit length. It is vulnerable to key attack when a weak key is used. DES was found in 1972 by IBM using the data encryption algorithm. It was adopted by the government of USA as standard encryption algorithm. It began with a 64 bit key and then the NSA put a restriction to use of DES with a 56- bit key length, hence DES discards 8 bits of the 64 bit key and then uses the compressed 56 bit key derived from 64 bit key to encrypt data in block size of 64-bits .To encrypt a plaintext message, DES groups it into 64-bit blocks.DES is considering to be insecure for many applications, due to the 56-bit key size being too small. It uses the same keys for both encryption and decryption, and only operates 64 bit blocks of data at a time[4]. AES (Advance Encryption Standard) AES is the new encryption standard recommended by NIST (National Institute of Standards and Technology) to replace DES. It was originally called Rijndael. It was selected in 1997 after a competition to select the best encryption standard.AES is a block cipher with a block length of 128 bits. The variable key length of 128,192 or 256 bits; default 256. AES encryption is fast and flexible; it can be implemented on various platforms especially in small devices brute force attack is the only effective attack known against it, in which attackers tries to test all the characters combinations to unblock the encryption[6]. It encrypts data blocks of 128 bits in 10, 12, or 14 rounds depends on the key size. It was found at least six times faster than triple DES.A replacement for DES was needed as its key size was too small, with increasing computing power, it was consider vulnerable against exhaustive key search attacks. Triple DES was designed to overcome this drawback but it was found slow. Blowfish Algorithm It is one of the most public domain encryption algorithms. Blowfish was designed in 1993 by Bruce Schneider as a fast alternative to existing encryption algorithms. Blowfish is a symmetric key block cipher that uses a 64 bit block size and variable key length from 32 bits to 448 bits. Blowfish has 16 rounds or less. Blowfish is a very secure cipher and to use encryption free of patents and copyrights. No attack is successful against Blowfish, although it suffers from weak keys problem. Blowfish security lies in its variable key size (32-448) providing high level of security, attempts to cryptanalysis blowfish started soon after its publication. However less cryptanalysis attempts were made on blowfish than other algorithms. III RESULT AND ANALYSIS The three video file of different size are used to conduct three experiments, where a comparison of three algorithms DES, AES and Blowfish is performed. A. Evaluation Parameters Performance of encryption algorithm is evaluated considering the following parameters.  Encryption Time  Decryption Time Encryption Time Encryption is the conversion of data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties. It may also be performed with a set of keys or passwords. The time taken to encrypt any file is called Encryption Time. Here, Encryption Time is measured in milliseconds (ms). Evaluation of encryption time: The encryption simulation was performed on DES, AES and Blowfish algorithms had been carried on NetBeans IDE 7.1.2.The encryption simulation is probably the most fundamental type of cryptographic analysis that can be performed on the algorithms under study. This simulation is simple and standardized. In this work, the encryption simulation values are obtained for various algorithms, are shown in Figure given below:
  • 4. International Journal of Advance Engineering and Research Development (IJAERD) Volume 4, Issue 5, May-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 @IJAERD-2017, All rights Reserved 992 Figure 4: Shows the comparison of encryption timing in DES, AES, Blowfish algorithm and the encryption time of the Blowfish algorithm is lesser than AES and DES algorithm. Decryption Time Decryption is the process of transforming data that have been rendered unreadable through encryption back to its unencrypted form. During decryption, the system extracts and converts the cipher data and transforms it to texts and images that are easily understandable not only by the reader but also by the system. It may also be performed with a set of keys or passwords. The time taken to decrypt any file is called Decryption Time. Here, Encryption Time is measured in milliseconds (ms). Evaluation of decryption time: - The decryption simulation was performed on DES, AES and Blowfish algorithms had been carried on NetBeans IDE 7.1.2.The decryption simulation is probably the most fundamental type of cryptographic analysis that can be performed on the algorithms under study. This simulation is simple and standardized. In this work, the decryption simulation values are obtained for various algorithms, are shown in Figure given below: Figure 5: Shows the comparison of decryption timing in DES, AES, Blowfish algorithm and the decryption time of the Blowfish algorithm is lesser than DES algorithm. IV. Conclusion In cryptography, encryption and decryption algorithms plays important role in network security. In our research work, we analyzed the comparison of existing encryption techniques like DES, AES and Blowfish algorithms. Based on the video files used and the experimental result it was concluded that Blowfish algorithm consumes least encryption time and DES 40 90 120 70 80 100 50 60 90 0 20 40 60 80 100 120 140 110 500 1000 Timing(ms) video Size (KB) Encryption Timing Comparison DES Algorithm AES Algorithm Blowfish Algorithm 30 60 100 30 50 70 30 40 70 0 20 40 60 80 100 120 110 500 1000 Timing(ms) video Size (KB) Decryption Timing Comparison DES Algorithm AES Algorithm Blowfish Algorithm
  • 5. International Journal of Advance Engineering and Research Development (IJAERD) Volume 4, Issue 5, May-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 @IJAERD-2017, All rights Reserved 993 consume maximum encryption time. We also observed that Decryption of Blowfish and AES algorithms is better than DES algorithm. From our research work, it concluded that Blowfish algorithm is better than AES and DES algorithms. REFERENCES [1] Kalyani P. Karule, and Neha V. Nagrale, “Comparative Analysis of Encryption Algorithms”, International Journal of Scientific Engineering and Applied Science (IJSEAS) – Volume-2, Issue-2, February 2016. [2] Yogesh Kumar, Rajiv Munjal, and Harsh Sharma, “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures,” International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, Oct 2011. [3] Nivedita Bisht, and Sapna Singh, “A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 4, Issue 3, March 2015, ISSN(Online) : 2319 – 8753 [4] M. Meena, and A. Komathi , “ A Study and Comparative Analysis of Cryptographic Algorithms for Various File Format”, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 [5] Behrouz A. Forouzan, “Data Communication and Networking”, McGraw-Hill Forouzan Networking Series, 2007. [6] Simar Preet Singh, and Raman Maini, “COMPARISON OF DATA ENCRYPTION ALGORITHMS”, international Journal of Computer Science and Communication ,Vol. 2, No. 1, January-June 2011, pp. 125-127 [7] Anjula Gupta, and Navpreet Kaur Walia, “Cryptography Algorithms”, Sri Guru Granth Sahib World University, Fatehgarh Sahib, India.