We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Superiority of Blowfish Algorithm in Wireless Networks

by Gurjeevan Singh, Ashwani Kr. Singla, K. S. Sandha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Number 11
Year of Publication: 2012
Authors: Gurjeevan Singh, Ashwani Kr. Singla, K. S. Sandha
10.5120/6308-8632

Gurjeevan Singh, Ashwani Kr. Singla, K. S. Sandha . Superiority of Blowfish Algorithm in Wireless Networks. International Journal of Computer Applications. 44, 11 ( April 2012), 23-26. DOI=10.5120/6308-8632

@article{ 10.5120/6308-8632,
author = { Gurjeevan Singh, Ashwani Kr. Singla, K. S. Sandha },
title = { Superiority of Blowfish Algorithm in Wireless Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 44 },
number = { 11 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume44/number11/6308-8632/ },
doi = { 10.5120/6308-8632 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:35:16.569941+05:30
%A Gurjeevan Singh
%A Ashwani Kr. Singla
%A K. S. Sandha
%T Superiority of Blowfish Algorithm in Wireless Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 44
%N 11
%P 23-26
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption algorithm plays a crucial role in information security which guarantees the recent growing internet and network applications. They are used to secure the data in wireless networks against malicious attacks but securing data also consumes resources such as C. P. U time, Memory, battery power, encryption time etc. In this paper, we evaluated the performance of four symmetric key encryption algorithms; AES, DES, 3DES and Blowfish which commonly used for data encryption in terms of encryption time, decryption time & throughput. In this research, we evaluated encryption time, decryption time and throughput for all four encryption algorithms in Visual Basic's environment using large size text data (. doc). Experimental results show that Blowfish encryption algorithm may be more suitable for wireless networks. Study reveals that Blowfish gives better performance than AES, DES and 3DES in terms of encryption time, decryption time & throughput.

References
  1. William Stalling, "Cryptography and Network Security Principles and Practice 5th Edition", Pearson.
  2. Hardjono, "Security in Wireless LANs and MANs", Architect House Publishers, 2005.
  3. Diaa Salama, Hatem Abdual Kader and Mohiy Hadhoud (2011), "Studying the Effects of Most Common Encryption Algorithms", International Arab Journal of e-Technology, Vol. 2, No. 1, January 2011, pp 1-10.
  4. SimarPreet Singh, and Raman Maini (2011), "Comparison of Data Encryption Algorithms", International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 125-127.
  5. A. Rathika, Parvathy Nair and Parvathy Nair (2011), "A High Throughput Algorithm for Data Encryption" International Journal of Computer Applications (0975 – 8887) Volume 13, No. 5, January 2011 pp 13-16.
  6. Lavanya P and M Rajashekhara Babu (2011), "Performance Analysis of Montgomery Multiplication Algorithm for Multi-core Systems Using Concurrent Java", Journal of Advances in Applied Science Research, 2011, 2 (3), pp 567-573.
  7. M. Umaparvathi, Dr. Dharmishtan and K Varughese (2010), "Evaluation of Symmetric Encryption Algorithms for MANETs", Proceedings of 2010 IEEE International conference on Computational Intelligence and Computing Research (ICCIC-2010), 28-29 Dec. 2010, pp 1-3.
  8. Tingyuan Nie, Chuanwang Songa and Xulong Zhi (2010), "Performance Evaluation of DES and Blowfish Algorithms", Proceedings of 2010 IEEE International Conference on Biomedical Engineering and Computer Science (ICBECS- 2010), 23-25 Apr 2010. pp 1-4.
  9. Mingyan Wang, Yanwen Que (2009),"The Design and Implementation of Passwords Management System Based on Blowfish Cryptographic Algorithm", International Forum on Computer Science-Technology and Applications, 2009. pp 24-28.
  10. Allam Mousa and Ahmad Hamad (2006), "Evaluation of the RC4 Algorithm for Data Encryption", International Journal of Computer Science & Applications Vol. 3, No. 2, June 2006, pp 44-56.
  11. Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud (2008), "Performance Evaluation of Symmetric Encryption Algorithms", IJCSNS, VOL. 8 No. 12, December 2008, pp 280-286.
  12. Challa Narasimham , Jayaram Pradhan (2008), "Evaluation of Performance Characteristics of Cryptosystem Using Text Files", Journal of Theoretical and Applied Information Technology, pp 254-259.
Index Terms

Computer Science
Information Sciences

Keywords

Aes Blowfish Des Encryption Algorithm Security