CFP last date
20 January 2025
Reseach Article

Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms

by Harsh Kumar Verma, Ravindra Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 16
Year of Publication: 2012
Authors: Harsh Kumar Verma, Ravindra Kumar Singh
10.5120/5775-6004

Harsh Kumar Verma, Ravindra Kumar Singh . Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms. International Journal of Computer Applications. 42, 16 ( March 2012), 8-14. DOI=10.5120/5775-6004

@article{ 10.5120/5775-6004,
author = { Harsh Kumar Verma, Ravindra Kumar Singh },
title = { Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 16 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 8-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number16/5775-6004/ },
doi = { 10.5120/5775-6004 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:31:26.222960+05:30
%A Harsh Kumar Verma
%A Ravindra Kumar Singh
%T Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 16
%P 8-14
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, Performance analysis of RC5, Blowfish and DES block cipher algorithms have been done on the basis of execution time and resource utilization. CPU utilization and memory utilization both are considered for determining resource utilization. These three algorithms are parameterized algorithm and encrypt two w-bits at a time. Allowable choices for w are 16 bits, 32 bits, and 64 bits. Blowfish and DES have same structure for encryption and decryption while RC5 have different. RC5 has 12 and Blowfish & DES have 16 rounds. These three algorithms have a variable block size and a variable key size in their structure. Performances of RC5 & Blowfish algorithms have been evaluated on key size of 128-bits, 192-bit and 256-bit while key size is fixed 64-bit for DES in this paper.

References
  1. W. Stallings, "Cryptography and Network Security: Principles and Practice", Prentice-Hall, New Jersey, 1999.
  2. "RC5" "wikipedia. org". Available at: http://en. wikipedia. org/wiki/RC5
  3. "Blowfish", "wikipedia. org", [online] Available at: http://en. wikipedia. org/wiki/Blowfish_(cipher)
  4. "Data Encryption Standard", "wikipedia. org", [online] Available at: http:// http://en. wikipedia. org/wiki/Data_Encryption_Standard
  5. Ronald L. Rivest, "RC5 Encryption Algorithm", Dr Dobbs Journal, Vol. 226, PP. 146-148, Jan 1995.
  6. Ronald L. Rivest, The RC5 Encryption Algorithm, MIT Laboratory for Computer Science 545 Technology Square, Cambridge, Mass. 02139 (Revised March 20, 1997). Available at: httu://theory. lcs. mit. cdu/-rivest/Rivest-rc5rev. pdf
  7. B. Schneier, "Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)", [online] Available at: http://www. schneier. com/paper-blowfish-fse. html
  8. NIST FIPS PUB 46-3. "Data Encryption Standard. Federal Information Processing Standards, National Bureau of Standards, U. S. Department of Commerce, Washington D. C. , 1977.
  9. H. Feistel, W. A. Notz, and J. L. Smith, "Some Cryptographic Techniques for Machine-to-Machine Data Communications", Proceedings on the IEEE, v. 63, n. 11, 1975, pp. 1545 -1554.
  10. C. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, vol 28,pp 656-715, 1949.
  11. "What are RC5 and RC6","rsa. com". Available at: http://www. rsa. com/rsalabs/node. asp?id=2251
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Block Cipher Symmetric Encryption Rc5 Blowfish Des