Performance Evaluation of Symmetric Encryption Algorithms

Communications of the IBIMA

Download PDF

D.S. Abdul. Elminaam1, H. M. Abdul Kader2 and M. M. Hadhoud3

1D. S. Abdul. Elminaam, Higher Technological Institute, 10th of Ramadan City, Egypt

2,3 Faculty of Computers and Information, Minufiya University, Egypt,


Volume 2009 (2009), Article ID 600033, Communications of the IBIMA, 7 pages, DOI:

Received date : 10 April 2009; Accepted date : 9 July 2009; Published date : 8 September 2009


Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types ,battery power consumption, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm. .

Keywords: Encryption techniques, Computer security, AES, DES, RC2, 3DES, Blowfish, RC6