Performance Comparison of File Security System using TEA and Blowfish Algorithms

Abstract

With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms are commonly used for information security in many research areas. Although there are two encryption techniques, asymmetric and symmetric, the simpler symmetric encryption technique is employed for testing file security system. In this study, the performance evaluation of the most common two symmetric encryption algorithms such as TEA and Blowfish algorithm is focused on the execution time intervals. Simulation has been conducted with many types of file encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most common video file formats by using Java Programming Language. Win Myat Thu | Tin Lai Win | Su Mu Tyar "Performance Comparison of File Security System using TEA and Blowfish Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26462.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/26462/performance-comparison-of-file-security-system-using-tea-and-blowfish-algorithms/win-myat-thu

Authors and Affiliations

Keywords

Related Articles

Mechanical Properties of Recycled Aggregate

For environmental conservation, the usage of recycled aggregates in concrete may be beneficial. The products for the future are recycled aggregates. The usage of recycled aggregates has been initiated in several European...

A Study on the Impact of Manpower Planning with Special Reference to in Big it at Kumbakonam

BIG IT Every organization operates for the aim of achieving some goals and objective .to facilitate that, corporation’s worker and unitize resources like man, money, machine and material. Force coming up with is that t...

Form Mind and Thinking through Music

In this article, the formation of national consciousness and thinking in the hearts of every young person growing up is the goal of today, the national ideology a system of ideas and views justifying the existence and de...

Intergrated Training Model of Business Skills for Kawedegan Farmers, Nganjuk-East Java Indonesia

This research is motivated by the living conditions of smallholder forestry land in Kawedegan, Balonggebang, Gondang District, Nganjuk-East Java that besides the level of education is low, and also they do not have a fix...

Analysis of Text Classification Algorithms A Review

Classification of data has become an important research area. The process of classifying documents into predefined categories based on their content is Text classification. It is the automated assignment of natural langu...

Download PDF file
  • EP ID EP628731
  • DOI 10.31142/ijtsrd26462
  • Views 88
  • Downloads 0

How To Cite

(2019). Performance Comparison of File Security System using TEA and Blowfish Algorithms. International Journal of Trend in Scientific Research and Development, 3(5), 871-877. https://europub.co.uk/articles/-A-628731