We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms

by Harsh Kumar Verma, Ravindra Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 16
Year of Publication: 2012
Authors: Harsh Kumar Verma, Ravindra Kumar Singh
10.5120/5774-6002

Harsh Kumar Verma, Ravindra Kumar Singh . Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms. International Journal of Computer Applications. 42, 16 ( March 2012), 1-7. DOI=10.5120/5774-6002

@article{ 10.5120/5774-6002,
author = { Harsh Kumar Verma, Ravindra Kumar Singh },
title = { Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 16 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number16/5774-6002/ },
doi = { 10.5120/5774-6002 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:31:25.599939+05:30
%A Harsh Kumar Verma
%A Ravindra Kumar Singh
%T Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 16
%P 1-7
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, Performance analysis of RC6, Twofish and Rijndael block cipher algorithms have been done on the basis of execution time and resource utilization. CPU utilization and memory utilization both are considered for determining resource utilization. These algorithms are parameterized algorithm and were designed to meet the requirements of the Advanced Encryption Standard (AES) competition and selected among five finalists of that competition. These three algorithms have a variable block size and a variable key size in their structure and encrypt four w-bits at a time. Allowable choices for w are 16 bits, 32 bits, and 64 bits. Twofish and Rijndael have same structure for encryption and decryption while RC6 have different. RC6, Twofish and Rijndael have 20, 16 and 10 rounds respectively. Performances of these three algorithms have been evaluated on key size of 128-bits, 192-bit and 256-bit in this paper.

References
  1. "Report on the Development of the Advanced Encryption Standard (AES). ", "csrc. net". Available at: http://csrc. nist. gov/encryption/aes/round2/r2report. pdf
  2. Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin, The RC6 TM Block Cipher , M. I. T. Laboratory for Computer Science, 545 Technology Square, Cambridge, MA 02139, Version 1. 1 - August 20, 1998. Available at: http://people. csail. mit. edu/rivest/Rc6. pdf
  3. Bruce Schneier, John Kelsey, Doug Whiting ,David Wagner, Chris Hall, Niels Ferguson, "Twofish: A 128-Bit Block Cipher", 1998, [online] Available at: http://www. certainkey. com/resources/article/twofish. pdf
  4. W. Stallings, "Cryptography and Network Security: Principles and Practice", Prentice-Hall, New Jersey, 1999.
  5. "RC6® Block Cipher", "rsa. com". Available at: http://www. rsa. com/rsalabs/node. asp?id=2512
  6. "RC6", "wikipedia. org". Available at: http://en. wikipedia. org/wiki/RC6
  7. R. Merkle. " Fast software encryption functions". In A. J. Menezes and S. A. Vanstone, editors, Advances in Cryptology - CRYPTO'90, LNCS 537, pp. 476~501. Springer Verlag, 1991.
  8. J. Daemen, L. Knudsen, and V. Rijmen. "The block cipher Square". In E. Bi-ham, editor, Fast Software Encryption, Fourth International Workshop, Haifa, Israel, January 1997, LNCS 1267, pp. 149~165. Springer Verlag, 1997.
  9. J. L. Massey. " SAFER K-64: A byte-oriented block-ciphering algorithm". In R. Anderson, editor, Fast Software Encryption - Proc. Cambridge Security Workshop, Cambridge, U. K. , LNCS 809, pp. 1~17. Springer Verlag, 1994.
  10. H. Feistel, W. A. Notz, and J. L. Smith, "Some cryptographic Techniques for Machine-to-Machine Data Communications," Proceedings on the IEEE, v. 63, n. 11, pp. 1545-1554, 1975.
  11. C. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, vol 28,pp 656-715, 1949.
  12. Shun-Lung Su, Lih-Chyau Wuu, and Jhih-Wei Jhang, "A New 256-bits Block Cipher –Twofish256", ISBN: 978-1-4244-1365-2, 07 February 2008. http://ieeexplore. ieee. org/stamp/stamp. jsp?tp=&arnumber=4447043
  13. F. J. MacWilliams and N. J. A. Sloane, "The Theory of Error-Correcting Codes", North-Holland, Amsterdam, 1977.
  14. "Advanced Encryption Standard", "wikipedia. org", [online] Available at: http:// http://en. wikipedia. org/wiki/Advanced_Encryption_Standard
  15. Abdul Hamid M. Ragab, Nabil A. Ismail, Senior Member IEEE, and Osama S. Farag Allah, "Enhancements and Implementation of RC6TM Block Cipher for Data Security", IEEE Catalogue No. 01 CH37239-0-7803-7101-1/01 © 2001 IEEE.
  16. Fei Shao, Zinan Chang, Yi Zhang, "AES Encryption Algorithm Based on the High Performance Computing of GPU", IEEE, ISBN: 978-1-4244-5726-7, February 26-28, 2010.
  17. Parikh C. , Patel P. , "Performance Evaluation of AES Algorithm on Various Development Platforms", IEEE, ISBN: 978-1-4244-1109-2, June 22-23, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Block Cipher Symmetric Encryption Rc6 Twofish Rijndael