Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption

https://doi.org/10.24017/science.2024.1.5

Abstract views: 317 / PDF downloads: 222

Authors

Abstract

Nowadays, cybersecurity has grown into a more significant and difficult sci-entific issue. The recognition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. Since cybersecurity guar-antees the privacy and security of data sent via the Internet, it is essential, while also providing protection against malicious attacks. Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. This study delves into the prevalent cryptographic methods and algorithms utilized for prevention and stream encryption, examining their encoding techniques such as advanced encryption standard (AES), Blowfish, Twofish, Salsa20, and ChaCha20. The primary objective of this research is to identify the optimal times and throughputs (speeds) for data encryption and decryption processes. The methodology of this study involved selecting five distinct types of images to compare the outcomes of the techniques evaluated in this research. The as-sessment focused on processing time and speed parameters, examining visual encoding and decoding using Java as the primary platform. A comparative analysis of several symmetric key ciphers was performed, focusing on handling large datasets. Despite this limitation, comparing different images helped evaluate the techniques' novelty. The results showed that ChaCha20 had the best average time for both encryption and decryption, being over 50% faster than some other algorithms. However, the Twofish algorithm had lower throughput during testing. The paper concludes with findings and suggestions for future improvements.

Keywords:

Encoding , Decoding, Blowfish, Twofish, Salsa20, Chach20, AES

References

B. A. Buhari, A. A. Obiniyi, K. Sunday, and S. Shehu, “Performance evaluation of symmetric data encryption algorithms: Aes and blowfish,” Saudi Journal of Engineering and Technology, vol. 4, no. 10, pp. 407–414, 2019. DOI: https://doi.org/10.36348/SJEAT.2019.v04i10.002

A. M. Aladdin, C. M. Rahman, and M. S. Abdulkarim, “The Scientific Comparison between Web-Based Site and Web-Builder (Open Source) Project: Functionalities, Usability, Design and Security”.

D. S. Abd Elminaam, H. M. Abdual-Kader, and M. M. Hadhoud, “Evaluating The Performance of Symmetric Encryption Algorithms.,” Int. J. Netw. Secur., vol. 10, no. 3, pp. 216–222, 2010.

A. Ali, B. A. S. Al-Rimy, A. A. Almazroi, F. S. Alsubaei, A. A. Almazroi, and F. Saeed, “Securing secrets in cyber-physical systems: A cutting-edge privacy approach with consortium blockchain,” Sensors, vol. 23, no. 16, p. 7162, 2023. DOI: https://doi.org/10.3390/s23167162

J. Lin and Q. Tang, Applied Cryptography in Computer and Communications: Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings, vol. 448. Springer Nature, 2022. DOI: https://doi.org/10.1007/978-3-031-17081-2

A. Ghosh, “Comparison of encryption algorithms: AES, Blowfish and Twofish for security of wireless networks,” International Research Journal of Engineering Technology, vol. 7, pp. 4656–4658, 2020.

B. Xing, D. Wang, Y. Yang, Z. Wei, J. Wu, and C. He, “Accelerating DES and AES algorithms for a heterogeneous many-core processor,” Int J Parallel Program, vol. 49, no. 3, pp. 463–486, 2021. DOI: https://doi.org/10.1007/s10766-021-00692-4

M. Panda and A. Nag, “Plain text encryption using AES, DES and SALSA20 by java based bouncy castle API on Windows and Linux,” in 2015 Second International Conference on Advances in Computing and Communication Engineering, IEEE, 2015, pp. 541–548. DOI: https://doi.org/10.1109/ICACCE.2015.130

B. Schneier, “The Twofish encryption algorithm.,” Dr. Dobb’s Journal: Software Tools for the Professional Programmer, vol. 23, no. 12, pp. 30–34, 1998.

B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, “Twofish: A 128-bit block cipher,” NIST AES Proposal, vol. 15, no. 1, pp. 23–91, 1998.

D. J. Bernstein, “Salsa20 specification,” eSTREAM Project algorithm description, http://www. ecrypt. eu. org/stream/salsa20pf. html, 2005.

K. F. Jasim, R. J. Ismail, A. A. N. Al-Rabeeah, and S. Solaimanzadeh, “Analysis the Structures of Some Symmetric Cipher Algorithms Suitable for the Security of IoT Devices,” Cihan University-Erbil Scientific Journal, vol. 5, no. 2, pp. 13–19, 2021. DOI: https://doi.org/10.24086/cuesj.v5n2y2021.pp13-19

D. A. S. Anjana, “Hybrid Cryptographic solution using RSA, Blowfish and MD5 for Information Security in Cloud Computing,” Mathematical Statistician and Engineering Applications, vol. 71, no. 3s, pp. 1250–1268, 2022.

K. Assa-Agyei and F. Olajide, “A Comparative Study of Twofish, Blowfish, and Advanced Encryption Standard for Secured Data Transmission,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 3, pp. 393–398, 2023. DOI: https://doi.org/10.14569/IJACSA.2023.0140344

P. Nema and M. A. Rizvi, “Critical analysis of various symmetric key cryptographic algorithms,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 3, no. 6, pp. 4301–4306, 2015.

N. Tyagi and A. Ganpati, “Comparative Analysis of Symmetric Key Encryption Algorithms,” 2014. [Online]. Available: www.ijarcsse.com

G. Singh, A. Kumar, and K. S. Sandha, “A study of new trends in Blowfish algorithm,” Int. J. Eng. Res. Appl, vol. 1, no. 2, pp. 321–326, 2011.

A. Ramesh and A. Suruliandi, “Performance analysis of encryption algorithms for Information Security,” in 2013 international conference on circuits, power and computing technologies (ICCPCT), IEEE, 2013, pp. 840–844. DOI: https://doi.org/10.1109/ICCPCT.2013.6528957

R. Yegireddi and R. K. Kumar, “A survey on conventional encryption algorithms of Cryptography,” in 2016 International Conference on ICT in Business Industry & Government (ICTBIG), IEEE, 2016, pp. 1–4. DOI: https://doi.org/10.1109/ICTBIG.2016.7892684

H. Abroshan, “A hybrid encryption solution to improve cloud computing security using symmetric and asymmetric cryptography algorithms,” International Journal of Advanced Computer Science and Applications, vol. 12, no. 6, pp. 31–37, 2021. DOI: https://doi.org/10.14569/IJACSA.2021.0120604

M. A. Al-Shabi, “A survey on symmetric and asymmetric cryptography algorithms in information security,” International Journal of Scientific and Research Publications (IJSRP), vol. 9, no. 3, pp. 576–589, 2019. DOI: https://doi.org/10.29322/IJSRP.9.03.2019.p8779

A. M. Abdullah, “Advanced encryption standard (AES) algorithm to encrypt and decrypt data,” Cryptography and Network Security, vol. 16, no. 1, p. 11, 2017.

M. A. Albahar, O. Olawumi, K. Haataja, and P. Toivanen, “Novel hybrid encryption algorithm based on aes, RSA, and twofish for bluetooth encryption,” 2018. DOI: https://doi.org/10.4236/jis.2018.92012

O. C. Abikoye, A. D. Haruna, A. Abubakar, N. O. Akande, and E. O. Asani, “Modified advanced encryption standard algorithm for information security,” Symmetry (Basel), vol. 11, no. 12, p. 1484, 2019. DOI: https://doi.org/10.3390/sym11121484

K. R. Qasim and S. S. Qasim, “Encrypt medical image using Csalsa20 stream algorithm,” Jinu. M, Thankamma. P. George, NA Balaram, Sujisha. SS 2. Profile of Burn Deaths: A Study Based on Postmortem Examination of Burn Cases at RNT, vol. 20, no. 3, p. 569, 2020.

E. L. Mohaisen and R. S. Mohammed, “Improving Salsa20 stream cipher using random chaotic maps,” in 2020 3rd International Conference on Engineering Technology and its Applications (IICETA), IEEE, 2020, pp. 1–6. DOI: https://doi.org/10.1109/IICETA50496.2020.9318902

C. L. Chowdary, P. Nallamothu, M. C. Reddy, and B. Babu, “Comparative study on blowfish and twofish algorithms for image encryption and decryption,” International Research Journal of Engineering and Technology (IRJET), vol. 7, no. 11, pp. 2372–2395, 2020.

T. U. Haq, T. Shah, G. F. Siddiqui, M. Z. Iqbal, I. A. Hameed, and H. Jamil, “Improved twofish algorithm: a digital image enciphering application,” IEEE Access, vol. 9, pp. 76518–76530, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3081792

S. Barbero, D. Bazzanella, and E. Bellini, “Rotational Cryptanalysis on ChaCha Stream Cipher,” Symmetry (Basel), vol. 14, no. 6, p. 1087, 2022. DOI: https://doi.org/10.3390/sym14061087

S. Kataria, E. J. Lopes, B. M. Niravil, and S. Keshav, “IMAGE ENCRYPTION TECHNIQUES AND COMPARATIVE ANALYSIS,” 2021.

A. M. Aladdin and T. A. Rashid, “Leo: Lagrange Elementary Optimization,” arXiv preprint arXiv:2304.05346, 2023.

Downloads

How to Cite

[1]
R. K. . Muhammed, “Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption”, KJAR, vol. 9, no. 1, pp. 52–65, May 2024, doi: 10.24017/science.2024.1.5.

Article Metrics

Published

30-05-2024

Issue

Section

Pure and Applied Science