Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption

Nowadays, cybersecurity has grown into a more significant and difficult sci-entific issue. The recognition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. Since cybersecurity guar-antees the privacy and security of data sent via the Internet, it is...

Full description

Saved in:
Bibliographic Details
Main Authors: Rebwar Khalid Muhammed, Ribwar Rashid Aziz, Alla Ahmad Hassan, Aso Mohammed Aladdin, Shaida Jumaah Saydah, Tarik Ahmed Rashid, Bryar Ahmad Hassan
Format: Article
Language:English
Published: Sulaimani Polytechnic University 2024-05-01
Series:Kurdistan Journal of Applied Research
Subjects:
Online Access:https://kjar.spu.edu.iq/index.php/kjar/article/view/911
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1823861347376431104
author Rebwar Khalid Muhammed
Ribwar Rashid Aziz
Alla Ahmad Hassan
Aso Mohammed Aladdin
Shaida Jumaah Saydah
Tarik Ahmed Rashid
Bryar Ahmad Hassan
author_facet Rebwar Khalid Muhammed
Ribwar Rashid Aziz
Alla Ahmad Hassan
Aso Mohammed Aladdin
Shaida Jumaah Saydah
Tarik Ahmed Rashid
Bryar Ahmad Hassan
author_sort Rebwar Khalid Muhammed
collection DOAJ
description Nowadays, cybersecurity has grown into a more significant and difficult sci-entific issue. The recognition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. Since cybersecurity guar-antees the privacy and security of data sent via the Internet, it is essential, while also providing protection against malicious attacks. Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. This study delves into the prevalent cryptographic methods and algorithms utilized for prevention and stream encryption, examining their encoding techniques such as advanced encryption standard (AES), Blowfish, Twofish, Salsa20, and ChaCha20. The primary objective of this research is to identify the optimal times and throughputs (speeds) for data encryption and decryption processes. The methodology of this study involved selecting five distinct types of images to compare the outcomes of the techniques evaluated in this research. The as-sessment focused on processing time and speed parameters, examining visual encoding and decoding using Java as the primary platform. A comparative analysis of several symmetric key ciphers was performed, focusing on handling large datasets. Despite this limitation, comparing different images helped evaluate the techniques' novelty. The results showed that ChaCha20 had the best average time for both encryption and decryption, being over 50% faster than some other algorithms. However, the Twofish algorithm had lower throughput during testing. The paper concludes with findings and suggestions for future improvements.
format Article
id doaj-art-820139ca572a4c96a08fef3c7d0a0cd3
institution Kabale University
issn 2411-7684
2411-7706
language English
publishDate 2024-05-01
publisher Sulaimani Polytechnic University
record_format Article
series Kurdistan Journal of Applied Research
spelling doaj-art-820139ca572a4c96a08fef3c7d0a0cd32025-02-09T20:59:33ZengSulaimani Polytechnic UniversityKurdistan Journal of Applied Research2411-76842411-77062024-05-019110.24017/science.2024.1.5Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image EncryptionRebwar Khalid Muhammed0https://orcid.org/0009-0009-3288-7340Ribwar Rashid Aziz1https://orcid.org/0000-0003-3380-6476Alla Ahmad Hassan2https://orcid.org/0009-0003-0595-5527Aso Mohammed Aladdin3https://orcid.org/0000-0002-8734-0811Shaida Jumaah Saydah4https://orcid.org/0000-0002-2884-004XTarik Ahmed Rashid5https://orcid.org/0000-0002-8661-258XBryar Ahmad Hassan6https://orcid.org/0000-0002-4476-9351Network department, Computer Science Institute, Sulaimani Polytechnic University, Sulaymaniyah, IraqDatabase department, Computer Science Institute, Sulaimani Polytechnic University, Sulaymaniyah, IraqDatabase department, Computer Science Institute, Sulaimani Polytechnic University, Sulaymaniyah, IraqDepartment of Computer Science, College of Science, Charmo University, Sulaymaniyah, IraqMinistry of Education, Kirkuk Education Department of Kurdish Studies, Hawazen Preparatory School for Girls, Kirkuk, IraqComputer Science and Engineering Department, School of Science and Engineering, University of Kurdistan Hewler, Erbil, IraqComputer Science and Engineering Department, School of Science and Engineering, University of Kurdistan Hewler, Erbil, Iraq | Department of Computer Science, College of Science, Charmo University, Sulaymaniyah, Iraq Nowadays, cybersecurity has grown into a more significant and difficult sci-entific issue. The recognition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. Since cybersecurity guar-antees the privacy and security of data sent via the Internet, it is essential, while also providing protection against malicious attacks. Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. This study delves into the prevalent cryptographic methods and algorithms utilized for prevention and stream encryption, examining their encoding techniques such as advanced encryption standard (AES), Blowfish, Twofish, Salsa20, and ChaCha20. The primary objective of this research is to identify the optimal times and throughputs (speeds) for data encryption and decryption processes. The methodology of this study involved selecting five distinct types of images to compare the outcomes of the techniques evaluated in this research. The as-sessment focused on processing time and speed parameters, examining visual encoding and decoding using Java as the primary platform. A comparative analysis of several symmetric key ciphers was performed, focusing on handling large datasets. Despite this limitation, comparing different images helped evaluate the techniques' novelty. The results showed that ChaCha20 had the best average time for both encryption and decryption, being over 50% faster than some other algorithms. However, the Twofish algorithm had lower throughput during testing. The paper concludes with findings and suggestions for future improvements. https://kjar.spu.edu.iq/index.php/kjar/article/view/911 Encoding DecodingBlowfishTwofishSalsa20Chach20
spellingShingle Rebwar Khalid Muhammed
Ribwar Rashid Aziz
Alla Ahmad Hassan
Aso Mohammed Aladdin
Shaida Jumaah Saydah
Tarik Ahmed Rashid
Bryar Ahmad Hassan
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
Kurdistan Journal of Applied Research
Encoding
Decoding
Blowfish
Twofish
Salsa20
Chach20
title Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
title_full Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
title_fullStr Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
title_full_unstemmed Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
title_short Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
title_sort comparative analysis of aes blowfish twofish salsa20 and chacha20 for image encryption
topic Encoding
Decoding
Blowfish
Twofish
Salsa20
Chach20
url https://kjar.spu.edu.iq/index.php/kjar/article/view/911
work_keys_str_mv AT rebwarkhalidmuhammed comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption
AT ribwarrashidaziz comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption
AT allaahmadhassan comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption
AT asomohammedaladdin comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption
AT shaidajumaahsaydah comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption
AT tarikahmedrashid comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption
AT bryarahmadhassan comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption