IBIMA Publishing

Journal Details
Editorial Board
Review Process
Author Guidelines
Manuscript Publication Charges
Call for papers

Search IBIMA Publishing library
Open Accesss to full-text Articles
Communications of the IBIMA

Performance Evaluation of Symmetric Encryption Algorithms

D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud
Volume 8, number 8, Communications of the IBIMA, 2009, pages 58-64


Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and    RC6.    A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types ,battery power consumption,  different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm. .

Article Access

Full Text PDF

IBIMA Publishing - All Rights Reserved -  Copyright 2009