Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
Nowadays, cybersecurity has grown into a more significant and difficult sci-entific issue. The recognition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. Since cybersecurity guar-antees the privacy and security of data sent via the Internet, it is...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sulaimani Polytechnic University
2024-05-01
|
Series: | Kurdistan Journal of Applied Research |
Subjects: | |
Online Access: | https://kjar.spu.edu.iq/index.php/kjar/article/view/911 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1823861347376431104 |
---|---|
author | Rebwar Khalid Muhammed Ribwar Rashid Aziz Alla Ahmad Hassan Aso Mohammed Aladdin Shaida Jumaah Saydah Tarik Ahmed Rashid Bryar Ahmad Hassan |
author_facet | Rebwar Khalid Muhammed Ribwar Rashid Aziz Alla Ahmad Hassan Aso Mohammed Aladdin Shaida Jumaah Saydah Tarik Ahmed Rashid Bryar Ahmad Hassan |
author_sort | Rebwar Khalid Muhammed |
collection | DOAJ |
description |
Nowadays, cybersecurity has grown into a more significant and difficult sci-entific issue. The recognition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. Since cybersecurity guar-antees the privacy and security of data sent via the Internet, it is essential, while also providing protection against malicious attacks. Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. This study delves into the prevalent cryptographic methods and algorithms utilized for prevention and stream encryption, examining their encoding techniques such as advanced encryption standard (AES), Blowfish, Twofish, Salsa20, and ChaCha20. The primary objective of this research is to identify the optimal times and throughputs (speeds) for data encryption and decryption processes. The methodology of this study involved selecting five distinct types of images to compare the outcomes of the techniques evaluated in this research. The as-sessment focused on processing time and speed parameters, examining visual encoding and decoding using Java as the primary platform. A comparative analysis of several symmetric key ciphers was performed, focusing on handling large datasets. Despite this limitation, comparing different images helped evaluate the techniques' novelty. The results showed that ChaCha20 had the best average time for both encryption and decryption, being over 50% faster than some other algorithms. However, the Twofish algorithm had lower throughput during testing. The paper concludes with findings and suggestions for future improvements.
|
format | Article |
id | doaj-art-820139ca572a4c96a08fef3c7d0a0cd3 |
institution | Kabale University |
issn | 2411-7684 2411-7706 |
language | English |
publishDate | 2024-05-01 |
publisher | Sulaimani Polytechnic University |
record_format | Article |
series | Kurdistan Journal of Applied Research |
spelling | doaj-art-820139ca572a4c96a08fef3c7d0a0cd32025-02-09T20:59:33ZengSulaimani Polytechnic UniversityKurdistan Journal of Applied Research2411-76842411-77062024-05-019110.24017/science.2024.1.5Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image EncryptionRebwar Khalid Muhammed0https://orcid.org/0009-0009-3288-7340Ribwar Rashid Aziz1https://orcid.org/0000-0003-3380-6476Alla Ahmad Hassan2https://orcid.org/0009-0003-0595-5527Aso Mohammed Aladdin3https://orcid.org/0000-0002-8734-0811Shaida Jumaah Saydah4https://orcid.org/0000-0002-2884-004XTarik Ahmed Rashid5https://orcid.org/0000-0002-8661-258XBryar Ahmad Hassan6https://orcid.org/0000-0002-4476-9351Network department, Computer Science Institute, Sulaimani Polytechnic University, Sulaymaniyah, IraqDatabase department, Computer Science Institute, Sulaimani Polytechnic University, Sulaymaniyah, IraqDatabase department, Computer Science Institute, Sulaimani Polytechnic University, Sulaymaniyah, IraqDepartment of Computer Science, College of Science, Charmo University, Sulaymaniyah, IraqMinistry of Education, Kirkuk Education Department of Kurdish Studies, Hawazen Preparatory School for Girls, Kirkuk, IraqComputer Science and Engineering Department, School of Science and Engineering, University of Kurdistan Hewler, Erbil, IraqComputer Science and Engineering Department, School of Science and Engineering, University of Kurdistan Hewler, Erbil, Iraq | Department of Computer Science, College of Science, Charmo University, Sulaymaniyah, Iraq Nowadays, cybersecurity has grown into a more significant and difficult sci-entific issue. The recognition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. Since cybersecurity guar-antees the privacy and security of data sent via the Internet, it is essential, while also providing protection against malicious attacks. Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. This study delves into the prevalent cryptographic methods and algorithms utilized for prevention and stream encryption, examining their encoding techniques such as advanced encryption standard (AES), Blowfish, Twofish, Salsa20, and ChaCha20. The primary objective of this research is to identify the optimal times and throughputs (speeds) for data encryption and decryption processes. The methodology of this study involved selecting five distinct types of images to compare the outcomes of the techniques evaluated in this research. The as-sessment focused on processing time and speed parameters, examining visual encoding and decoding using Java as the primary platform. A comparative analysis of several symmetric key ciphers was performed, focusing on handling large datasets. Despite this limitation, comparing different images helped evaluate the techniques' novelty. The results showed that ChaCha20 had the best average time for both encryption and decryption, being over 50% faster than some other algorithms. However, the Twofish algorithm had lower throughput during testing. The paper concludes with findings and suggestions for future improvements. https://kjar.spu.edu.iq/index.php/kjar/article/view/911 Encoding DecodingBlowfishTwofishSalsa20Chach20 |
spellingShingle | Rebwar Khalid Muhammed Ribwar Rashid Aziz Alla Ahmad Hassan Aso Mohammed Aladdin Shaida Jumaah Saydah Tarik Ahmed Rashid Bryar Ahmad Hassan Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption Kurdistan Journal of Applied Research Encoding Decoding Blowfish Twofish Salsa20 Chach20 |
title | Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption |
title_full | Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption |
title_fullStr | Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption |
title_full_unstemmed | Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption |
title_short | Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption |
title_sort | comparative analysis of aes blowfish twofish salsa20 and chacha20 for image encryption |
topic | Encoding Decoding Blowfish Twofish Salsa20 Chach20 |
url | https://kjar.spu.edu.iq/index.php/kjar/article/view/911 |
work_keys_str_mv | AT rebwarkhalidmuhammed comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption AT ribwarrashidaziz comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption AT allaahmadhassan comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption AT asomohammedaladdin comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption AT shaidajumaahsaydah comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption AT tarikahmedrashid comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption AT bryarahmadhassan comparativeanalysisofaesblowfishtwofishsalsa20andchacha20forimageencryption |