Comparison of Efficiency and Security of AES, Blowfish, and ChaCha20 Cryptographic Algorithms on Image and Document Files

Muhammad Bagus Bintang Timur, Royansyah Royansyah, Dewi Kusumaningsih

Abstract

This study presents a comparative analysis of the Advanced Encryption Standard (AES), Blowfish, and ChaCha20 cryptographic algorithms in terms of their efficiency and security when applied to image and document files. The growing need for secure data transmission and storage has highlighted the importance of selecting suitable encryption algorithms based on specific file types and operational contexts. In this research, various sample files in image (JPG, PNG) and document (PDF, DOCX) formats were encrypted using the three algorithms. Performance was measured based on encryption and decryption time, CPU and memory usage, and file size changes after encryption. Security evaluation focused on resistance to brute-force attacks, key length strength, and algorithmic robustness. The experimental results indicate that ChaCha20 demonstrated superior performance in terms of processing speed and resource efficiency, especially on low-power systems. AES, while slightly slower, offered a high level of security and is widely trusted for sensitive document encryption. Blowfish, although fast, showed limitations in handling larger files and is less favored due to its shorter block size. This study concludes that no single algorithm is universally optimal; instead, the choice should depend on the specific use case, balancing efficiency and security requirements. These findings provide useful insights for practitioners and researchers in selecting appropriate cryptographic methods for protecting digital assets.

Full Text:

PDF (13-20)

References

R. K. Muhammed, Z. N. Rashid, and S. J. Saydah, “A Hybrid Approach to Cloud Data Security Using ChaCha20 and ECDH for Secure Encryption and Key Exchange,” KJAR, vol. 10, no. 1, pp. 66–82, Mar. 2025, doi: 10.24017/science.2025.1.5.

V. B. Prasad and U. Arul, “Accuracy analysis for secured file sharing by comparing RSA with blowfish,” presented at the INTERNATIONAL CONFERENCE ON APPLICATION OF ARTIFICIAL INTELLIGENCE FOR RENEWABLE ENERGY SOURCES AND ENVIRONMENTAL SUSTAINABILITY, Ariyalur, India, 2025, p. 020104. doi: 10.1063/5.0258720.

A.-L. Sousi, D. Yehya, and M. Joudi, “AES Encryption: Study & Evaluation”.

K. Muttaqin and J. Rahmadoni, “Analysis And Design of File Security System AES (Advanced Encryption Standard) Cryptography Based,” jaets, vol. 1, no. 2, pp. 113–123, May 2020, doi: 10.37385/jaets.v1i2.78.

J. P. Abasaheb and S. V. Mallapur, “Blockchain‐Integrated Secure Healthcare Information Sharing via Advanced Blowfish Encryption Standard With Optimal Key Generation,” Trans Emerging Tel Tech, vol. 36, no. 3, p. e70077, Mar. 2025, doi: 10.1002/ett.70077.

G. Dhaliwal, “Comparative analysis of DES and AES implementations in CyberSecurity applications,” Jan. 05, 2025, Preprints. doi: 10.36227/techrxiv.173611698.82877210/v1.

F. L. Bauer, “Cryptanalysis,” in Encyclopedia of Cryptography, Security and Privacy, S. Jajodia, P. Samarati, and M. Yung, Eds., Cham: Springer Nature Switzerland, 2025, pp. 468–471. doi: 10.1007/978-3-030-71522-9_164.

Z. Y. Dzahabi, N. Hayaty, and M. Bettiza, “CRYPTOGRAPHY OF CHACHA20 and RSA ALGORITHMS for TEXT SECURITY,” CNAHPC, vol. 7, no. 1, pp. 290–301, Feb. 2025, doi: 10.47709/cnahpc.v7i1.5345.

S. Sharma, K. N. Patel, and A. Siddhath Jha, “Cryptography Using Blowfish Algorithm,” in 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Greater Noida, India: IEEE, Dec. 2021, pp. 1375–1377. doi: 10.1109/ICAC3N53548.2021.9725661.

J. Ayad, N. Qaddoori, and H. Maytham, “Enhanced Audio Encryption Scheme: Integrating Blowfish, HMAC-SHA256, and MD5 for Secure Communication,” Mesopotamian Journal of CyberSecurity, vol. 5, no. 1, pp. 178–186, Feb. 2025, doi: 10.58496/MJCS/2025/012.

K. V. Saravanan and G. S. Priya, “Hybrid blowfish cryptography with elliptic curve Diffie-Hellman key exchange protocol for enhancing data security and performance,” Discov Electron, vol. 2, no. 1, p. 29, May 2025, doi: 10.1007/s44291-025-00071-0.

R. Gunawan and E. Rahmi, “Implementasi Algoritma Blowfish Untuk Pengamanan Data Transaksi Dalam Aplikasi Berbasis Website E-commerce,” tc, vol. 24, no. 2, pp. 427–438, May 2025, doi: 10.62411/tc.v24i2.12472.

A. Biryukov and C. De Cannière, “Linear Cryptanalysis for Block Ciphers,” in Encyclopedia of Cryptography, Security and Privacy, S. Jajodia, P. Samarati, and M. Yung, Eds., Cham: Springer Nature Switzerland, 2025, pp. 1422–1426. doi: 10.1007/978-3-030-71522-9_589.

B. A. Buhari et al., “Performance and Security Analysis of Symmetric Data Encryption Algorithms: AES, 3DES and Blowfish,” IJANA, vol. 16, no. 04, pp. 6473–6486, 2025, doi: 10.35444/IJANA.2025.16404.

H. Alabdulrazzaq and M. N. Alenezi, “Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish,” Int. j. commun. netw. inf. secur., vol. 14, no. 1, Apr. 2022, doi: 10.17762/ijcnis.v14i1.5262.

R. Musadaq, S. N. Abdulwahid, N. N. Abd Alwahed, and E. N. Abdulla, “Security analysis of an image encryption algorithm based on Blowfish in GPON,” Journal of Optical Communications, May 2025, doi: 10.1515/joc-2025-0109.

Refbacks

  • There are currently no refbacks.