{"title":"AES和TwoFish加密方案的性能分析","authors":"S. Rizvi, S. Z. Hussain, N. Wadhwa","doi":"10.1109/CSNT.2011.160","DOIUrl":null,"url":null,"abstract":"The two main characteristics of a good encryption algorithm are: Security and Speed. Usually security algorithms have to be embedded in a variety of applications like e-banking, online shopping, mails etc. So they should be fast as well as secure in different environments. In this paper, we do security v/s performance analysis of two algorithms Two fish and AES. First, we will discuss security issues of both algorithms by considering their safety factor. Then we study encryption speed of both algorithms by encrypting different type of data (text, image, audio) and analyze their performance in terms of throughput of every algorithm on different size of RAMs. The results show the relationship between performance of algorithms and size of RAM and type of data.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"218 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":"{\"title\":\"Performance Analysis of AES and TwoFish Encryption Schemes\",\"authors\":\"S. Rizvi, S. Z. Hussain, N. Wadhwa\",\"doi\":\"10.1109/CSNT.2011.160\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The two main characteristics of a good encryption algorithm are: Security and Speed. Usually security algorithms have to be embedded in a variety of applications like e-banking, online shopping, mails etc. So they should be fast as well as secure in different environments. In this paper, we do security v/s performance analysis of two algorithms Two fish and AES. First, we will discuss security issues of both algorithms by considering their safety factor. Then we study encryption speed of both algorithms by encrypting different type of data (text, image, audio) and analyze their performance in terms of throughput of every algorithm on different size of RAMs. The results show the relationship between performance of algorithms and size of RAM and type of data.\",\"PeriodicalId\":294850,\"journal\":{\"name\":\"2011 International Conference on Communication Systems and Network Technologies\",\"volume\":\"218 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-06-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"36\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Communication Systems and Network Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSNT.2011.160\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Communication Systems and Network Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNT.2011.160","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance Analysis of AES and TwoFish Encryption Schemes
The two main characteristics of a good encryption algorithm are: Security and Speed. Usually security algorithms have to be embedded in a variety of applications like e-banking, online shopping, mails etc. So they should be fast as well as secure in different environments. In this paper, we do security v/s performance analysis of two algorithms Two fish and AES. First, we will discuss security issues of both algorithms by considering their safety factor. Then we study encryption speed of both algorithms by encrypting different type of data (text, image, audio) and analyze their performance in terms of throughput of every algorithm on different size of RAMs. The results show the relationship between performance of algorithms and size of RAM and type of data.