Performance Evaluation of Various Symmetric Encryption Algorithms
Performance Evaluation of Various Symmetric Encryption Algorithms
3HUIRUPDQFH(YDOXDWLRQRI9DULRXV6\PPHWULF
(QFU\SWLRQ$OJRULWKPV
Shaify Kansal Meenakshi Mittal
Centre for Computer Science and Technology Centre for Computer Science and Technology
Central University of Punjab Central University of Punjab
Bathinda, India Bathinda, India
shaifykansal@gmail.com
Abstract -With rise in the use of internet in various fields like or human-readable form [1]. In Fig. 1, the plain text is converted
banking, military and government sector, the security and into the cipher text by applying the encryption procedure and the
privacy of the data has been the main concern. Today, most of cipher text is converted back to the plain text through the process
the data handling and electronic transactions are done on the of decryption.
internet. When the information is transferred from the sender to
the receiver over the internet, it may be eavesdropped by an
intruder and thus is a continuous threat to the secrecy or
confidentiality of the data. The popular technique that protects
the confidentiality of the data is cryptography which converts the
plain text into unreadable form and then receiver applies reverse
mechanism to decrypt the unreadable form of data to readable
form. This mechanism is called as encryption-decryption process.
Thus to secure the data over the internet, it is important to find
out which algorithm performs better than the other algorithms.
In this paper, the different symmetric encryption algorithms like
DES, 3DES, AES have been analyzed with respect to different Fig. 1. Encryption-Decryption Flow
parameters and data types (like text files, image) on i7 processor.
Keywords—DES, 3DES, AES The Cryptographic process makes use of an algorithm and a
secret (key) value. The key can be same for both encryption-
decryption process or can be a different one depending on the
I. INTRODUCTION type of encryption algorithm used. Depending upon the type of
key used, cryptography techniques can be divided into two
different categories - Symmetric (secret) and Asymmetric
The internet today has greatly influenced the people around the
(public) key encryption.
world with the increased utility of the internet applications by
the general population throughout the globe. Everyday a large
amount of security related information is accessed and
transferred across the internet in real-life applications. When the
information is transferred from the sender to the receiver over
the internet, it may be eavesdropped by an intruder and thus is a
continuous threat to the secrecy or confidentiality of the data.
The popular technique that protects the confidentiality of the
data is cryptography. Cryptography as the word suggests is the
combination of two words crypto (meaning secret or hidden) and
graphy (an art of writing).Thus Cryptography can be stated as
the art of writing which involves the transition of messages to a
concealed form or unintelligible data. The data is unintelligible
in the sense that understanding of the data is difficult or
impossible. The terms encryption and decryption are mainly
used with the cryptographic process. Encryption is the process
involving the changeover of human-readable plain-text to the
cryptic (cipher) text. Encryption has its reverse process known as
decryption where cryptic text is converted back to the plain text Fig. 2. Classification of cryptography techniques
Symmetric key encryption is the type of encryption method symmetric block cipher that has replaced DES for the wide
where the sender and receiver makes use of the same secret range of applications .The AES encryption algorithm is a
key for encryption as well as decryption process. Because a block cipher as it works on a single block of data at a time.
single key is used for both functions, secret key cryptography AES makes use of an encryption key and several rounds of
is also called symmetric key encryption. Examples of encryption [10]. The AES takes as input the block length of
symmetric key encryption algorithms are DES, 3DES, AES, 128 bits and the key length of 128,192 or 256 bits
Blowfish [3]. corresponding to 10, 12 or 14 rounds.
In the asymmetric key encryption, two different keys (public
and private keys) are used in encryption and decryption
III. EXPERIMENTAL SETUP
process. One key is used for encryption and the other one is
used for decryption and vice-versa. The two keys are different In order to compare the performance of various algorithms, the
but complementary in function. Information that is encrypted simulation is done in C language, compiled with Borland C++
with the public key can be decrypted only with the Compiler. Table I describes the simulation scenario followed.
corresponding private key of the set and vice-versa. One such
example of asymmetric cryptography is RSA algorithm [3].
TABLE I. SIMULATION SCENARIO
The two major problems faced by the earlier algorithms were Et: Encryption time (second)
the small key size (in case of DES algorithm) and slow speed
(Triple des algorithm). To overcome these shortcomings;
NIST (National Institute of Standards and Technology) Memory Utilization - The Memory Utilization defines how
published a new encryption algorithm known as AES much memory is being consumed by the process while doing
(Advanced Encryption Standard) in 2001. AES is an important encryption or decryption. It is measured in Kilobytes (KB).
106
2014 International Conference on Parallel, Distributed and Grid Computing
3000
DES
2000
3DES Memory Utilization (KB)
1000
AES
16000
0 Memory Utilization(KB)--->
15 KB 70 KB 2 MB 12000
107
2014 International Conference on Parallel, Distributed and Grid Computing
60
40
20
0
DES 3DES AES
Algorithm
ms --->
40
ENCRYPTION TIME (SECONDS) 24.571 74.7116 4.143
20
Algorithm
ms---->
THROUGHPUT (KB/SEC) 0.244 0.08003 1.448
108
2014 International Conference on Parallel, Distributed and Grid Computing
1.5
1 CES
REFERENC
[1] A. Nadeem and M. Y. Javed, "A performance comparison of data
0.5 encryption algorithms," in Info formation and communication
technologies, 2005. ICICT 2005. FirstF international conference on,
2005, pp. 84-89.
[2] S. William and W. Stallings, Cryptog graphy and Network Security, 4/E:
0 Pearson Education India, 2006.
[3] O. Verma, R. Agarwal, D. Dafo outi, and S. Tyagi, "Peformance
DES 3DES AES analysis of data encryption algoritthms," in Electronics Computer
Technology (ICECT), 2011 3rd Intern national Conference on, 2011, pp.
Algorithms ---> 399-403.
[4] D. S. A. Elminaam, H. M. Abdu ual-Kader, and M. M. Hadhoud,
"Evaluating The Performance of Sym mmetric Encryption Algorithms,"
Fig. 10. Comparison of Throughput for various algorithms IJ Network Security, vol. 10, pp. 216--222, 2010.
[5] A. Tamimi, "Performance analysiss of data encryption algorithms,"
Retrieved October, vol. 1, 2008.
[6] D. S. A. Elminaam, H. M. Abdu ual-Kader, and M. M. Hadhoud,
"Evaluating the Effects of Symmettric Cryptography Algorithms on
Memory Utilization ((KB) Power Consumption for Different Data
vol. 11, pp. 78-87, 2010.
D Types," IJ Network Security,
Algorithms --->
Analysis – It has been observed that for imagge data type, AES
algorithm takes least time for encryption andd decryption than
the other algorithms. Throughput varies iinversely to the
encryption time. Thus it is more in case of AES and less in
case of 3DES algorithm. Memory utilization oof DES algorithm
is less compared to other algorithms.
CONCLUSION
The paper presents the performance evaluaation of different
symmetric key encryption algorithms- DES, 3DES and AES
for text and image data type.
The results show that encryption and decrypttion time of AES
algorithm is less than other algorithms as the number of
rounds is comparatively less in case of AES while 3DES has
more encryption-decryption time as it applies the algorithm
three times. Throughput varies inversely to tthe encryption or
decryption time. Therefore, AES has more annd 3DES has less
109