Document Type : Research Paper


1 Computer Sciences Department, University of Technology, Baghdad, Iraq

2 department of computer science, university of technology, Baghdad, Iraq


Securing information is difficult in the modern internet era, as
terabytes of data are generated daily online and online transactions occur
virtually every second. The current world's information security relies heavily on
cryptography, which makes the internet a safer environment. Making information
incoherent to an unauthorized person is done through the use of cryptography.
Providing legitimate users with confidentiality as a result. There are a wide
variety of cryptographic algorithms suitable for this purpose. An ideal
cryptography method would allow the user to do their job without breaking the
bank. Unfortunately, there is no magic formula that can address every
issue.Several algorithms balance cost and performance. A banking application
needs robust security at a high cost, while a gaming software that sends user
patterns for analytics cares more about speed and cost. Thus, choosing the
appropriate encryption technique for the user. This study offers important
insights in the process of selecting cryptographic algorithms in terms of each
algorithm's strengths, weaknesses, cost, and performance . In order to
demonstrate an entire performance analysis in this article, as opposed to just
theoretical comparisons, this research developed and thoroughly examined the
cost and performance of commonly used cryptographic algorithms, including
DES, 3DES, AES, RSA, and blowfish. According to the findings, blowfish
requires the smallest amount of time to decrypt files of various sizes (25K, 50K,
1M, 2M, 3M, and 4M), and it also consumes the smallest amount of memory. This
makes it approximately three times faster than other cryptographic algorithms.


Main Subjects