Comparison of Efficiency and Security of AES, Blowfish, and ChaCha20 Cryptographic Algorithms on Image and Document Files
Abstract
Full Text:
PDF (13-20)References
R. K. Muhammed, Z. N. Rashid, and S. J. Saydah, “A Hybrid Approach to Cloud Data Security Using ChaCha20 and ECDH for Secure Encryption and Key Exchange,” KJAR, vol. 10, no. 1, pp. 66–82, Mar. 2025, doi: 10.24017/science.2025.1.5.
V. B. Prasad and U. Arul, “Accuracy analysis for secured file sharing by comparing RSA with blowfish,” presented at the INTERNATIONAL CONFERENCE ON APPLICATION OF ARTIFICIAL INTELLIGENCE FOR RENEWABLE ENERGY SOURCES AND ENVIRONMENTAL SUSTAINABILITY, Ariyalur, India, 2025, p. 020104. doi: 10.1063/5.0258720.
A.-L. Sousi, D. Yehya, and M. Joudi, “AES Encryption: Study & Evaluation”.
K. Muttaqin and J. Rahmadoni, “Analysis And Design of File Security System AES (Advanced Encryption Standard) Cryptography Based,” jaets, vol. 1, no. 2, pp. 113–123, May 2020, doi: 10.37385/jaets.v1i2.78.
J. P. Abasaheb and S. V. Mallapur, “Blockchain‐Integrated Secure Healthcare Information Sharing via Advanced Blowfish Encryption Standard With Optimal Key Generation,” Trans Emerging Tel Tech, vol. 36, no. 3, p. e70077, Mar. 2025, doi: 10.1002/ett.70077.
G. Dhaliwal, “Comparative analysis of DES and AES implementations in CyberSecurity applications,” Jan. 05, 2025, Preprints. doi: 10.36227/techrxiv.173611698.82877210/v1.
F. L. Bauer, “Cryptanalysis,” in Encyclopedia of Cryptography, Security and Privacy, S. Jajodia, P. Samarati, and M. Yung, Eds., Cham: Springer Nature Switzerland, 2025, pp. 468–471. doi: 10.1007/978-3-030-71522-9_164.
Z. Y. Dzahabi, N. Hayaty, and M. Bettiza, “CRYPTOGRAPHY OF CHACHA20 and RSA ALGORITHMS for TEXT SECURITY,” CNAHPC, vol. 7, no. 1, pp. 290–301, Feb. 2025, doi: 10.47709/cnahpc.v7i1.5345.
S. Sharma, K. N. Patel, and A. Siddhath Jha, “Cryptography Using Blowfish Algorithm,” in 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Greater Noida, India: IEEE, Dec. 2021, pp. 1375–1377. doi: 10.1109/ICAC3N53548.2021.9725661.
J. Ayad, N. Qaddoori, and H. Maytham, “Enhanced Audio Encryption Scheme: Integrating Blowfish, HMAC-SHA256, and MD5 for Secure Communication,” Mesopotamian Journal of CyberSecurity, vol. 5, no. 1, pp. 178–186, Feb. 2025, doi: 10.58496/MJCS/2025/012.
K. V. Saravanan and G. S. Priya, “Hybrid blowfish cryptography with elliptic curve Diffie-Hellman key exchange protocol for enhancing data security and performance,” Discov Electron, vol. 2, no. 1, p. 29, May 2025, doi: 10.1007/s44291-025-00071-0.
R. Gunawan and E. Rahmi, “Implementasi Algoritma Blowfish Untuk Pengamanan Data Transaksi Dalam Aplikasi Berbasis Website E-commerce,” tc, vol. 24, no. 2, pp. 427–438, May 2025, doi: 10.62411/tc.v24i2.12472.
A. Biryukov and C. De Cannière, “Linear Cryptanalysis for Block Ciphers,” in Encyclopedia of Cryptography, Security and Privacy, S. Jajodia, P. Samarati, and M. Yung, Eds., Cham: Springer Nature Switzerland, 2025, pp. 1422–1426. doi: 10.1007/978-3-030-71522-9_589.
B. A. Buhari et al., “Performance and Security Analysis of Symmetric Data Encryption Algorithms: AES, 3DES and Blowfish,” IJANA, vol. 16, no. 04, pp. 6473–6486, 2025, doi: 10.35444/IJANA.2025.16404.
H. Alabdulrazzaq and M. N. Alenezi, “Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish,” Int. j. commun. netw. inf. secur., vol. 14, no. 1, Apr. 2022, doi: 10.17762/ijcnis.v14i1.5262.
R. Musadaq, S. N. Abdulwahid, N. N. Abd Alwahed, and E. N. Abdulla, “Security analysis of an image encryption algorithm based on Blowfish in GPON,” Journal of Optical Communications, May 2025, doi: 10.1515/joc-2025-0109.
Refbacks
- There are currently no refbacks.