Statistical analysis of advanced encryption standard (AES), serpent, blowfish, twofish encryption algorithms
Keywords:
AES, Algorithm, Blowfish, Cryptography, Encryption, Serpent, TwofishAbstract
The need for strong and reliable encryption algorithms is increasing with the increase of new technologies. Building new algorithm without examining the strengths and weaknesses of the existing ones would only increase the number of algorithms without improvement in performance. The security and efficiency of four (4) encryption algorithms, Advanced Encryption Standard (AES), Serpent, Blowfish, and Twofish are investigated extensively in this study. Serpent and AES are very robust, showing minimal relationships and significant avalanche effects. Despite its general effectiveness, Blowfish and Twofish might expose flaws in some situations. The algorithms' merits are reinforced by NIST testing tools, which also point out possible issues with crucial scheduling randomization. Avalanche Test has shown AES to have 60%, Twofish 84%, Blowfish 91% and Serpent 96%. In all other tests conducted, AES and Twofish provide a balance between security and performance, whereas Serpent and Blowfish are recommended for applications needing the highest level of protection. The importance of implementation and key management in affecting algorithm security is emphasized. AES is at the top of the performance hierarchy, followed by Serpent, Blowfish, and Twofish. These consequences emphasize how crucial it is to implement algorithms correctly, handle keys effectively, take performance into account, and choose algorithms that are specific to a certain use case. The study's conclusion highlights how dynamic cryptographic risks are and how ongoing assessment is necessary to adjust to new difficulties. For practitioners and researchers negotiating the challenging terrain of choosing and implementing encryption algorithms, this work is a valuable resource.