A Comparative Study of Symmetric Encryption Algorithms and Techniques for Enhancing Smartphone Security


Authors : C.V. Mbamala; M.O Onyesolu; G.N Ezeh; U.V Maduabuchi; C.N Onyechi; C.D Anyiam

Volume/Issue : Volume 10 - 2025, Issue 2 - February


Google Scholar : https://tinyurl.com/42m9972b

Scribd : https://tinyurl.com/37x4amnv

DOI : https://doi.org/10.38124/ijisrt/25feb1650

Google Scholar

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 15 to 20 days to display the article.


Abstract : The increasing reliance on smartphones has heightened the need for robust data security. Symmetric cryptography, recognized for its efficiency and speed, plays a crucial role in safeguarding data on mobile devices. This study evaluates the performance of selected symmetric encryption algorithms, DES, 3DES, AES, Twofish, and Blowfish on smartphones. The algorithms were tested for encryption time, decryption time, and avalanche effect using file sizes of 1000KB, 2000KB, 3000KB, 4000KB, and 5000KB. The avalanche effect was also assessed for each algorithm with block sizes and key sizes tailored to their specifications. The results reveal that AES and Twofish exhibit the lowest encryption and decryption times, particularly for large files, demonstrating superior efficiency. For avalanche effect, AES achieved 53.9063%, surpassing the critical 50% threshold, followed by 3DES (50%), Blowfish (46.875%), Twofish (46.094%), and DES (23.4375%). AES strikes an optimal balance between speed and security, making it the most suitable encryption algorithm for smartphone applications

Keywords : Smartphones, Security, Encryption, Decryption, Cryptography, Symmetric, Block Cipher.

References :

  1. Arora, P., Singh, A., and Tyagi, H. (2021). Evaluation and comparison of security issues on cloud computing environment. World of Computer Science and Information Technology Journal (WCSIT), 2(5), 179-183
  2. Alenezi, M.N., Haneen, A., and Nada, Q.M. (2020). Symmetric
  3. encryption algorithms: Review and evaluation study. Iraqi Journal of Science, 12(1), 104-109.
  4. Hendi, A., Dwariri M., and Quadi, Z. (2019). A novel simple and highly secure method for data encryption- decryption. Journal of communication Network and International security, 11(1), 232-238.
  5. M-shabi, M.A, (2019). A survey of symmetric and Asymmetric cryptography algorithms in information security. International Journal of scientific Research publication, 9(3), 576-589.
  6. Elminaam, D. S. A., Kader, H. M. A., and Hadhoud, M. M. (2023). Performance evaluation of symmetric encryption algorithms. International Journal of Computer Science and Network Security, 8(12), 280-286.
  7. Longunleko, K.B., Aeniji, O.D., and Lonuneleko, A.M. (2020). A comparative study of symmetric cryptography mechanism on DES, AES and EB64 for information security. International Journal of Scientific Research in Computer Science and Engineering, 8(1), 45-51.
  8. Pavithra, S, and Ramadevi, D, (2019), Performance evaluation of symmetric algorithm. Journal of Mathematical and Computing Science, 2(8), 67-73.
  9. Alanazi, H., Zaidan, B. B., Zaidan, A. A., Jalab, H. A., Shabbir, M., and Al-Nabhani, Y. (2023). New comparative study between DES, 3DES and AES within nine factors. International Journal of Computer Science and Network Security, 4(1), 56-65.
  10. Beniwal, T. and Deepak, P. (2020). Enhancement in AES algorithms. International Research Journal of Engineering and Technology,9(2), 423-427.
  11. Roo, P.A., and Harpreet, K. (2023). A literature review on RSA, DES and AES encryption algorithm. Emerging Trends in Engineering and Management, 2(5), 57-63.
  12. Mandal, A. K., Parakash, C., and Tiwari, A. (2019). Performance evaluation of cryptographic algorithms: DES and AES. In IEEE Students Conference on Electrical, Electronics and Computer Science, 12-14 October 2019, (pp. 1-5). Australia: IEEE.
  13. A., Singh, M. L., and Bansal, P. K. (2018). Comparison of various encryption algorithms and techniques for secured data communication in multi-node network. International Journal of Engineering and Technology, 7(3), 89-95.

The increasing reliance on smartphones has heightened the need for robust data security. Symmetric cryptography, recognized for its efficiency and speed, plays a crucial role in safeguarding data on mobile devices. This study evaluates the performance of selected symmetric encryption algorithms, DES, 3DES, AES, Twofish, and Blowfish on smartphones. The algorithms were tested for encryption time, decryption time, and avalanche effect using file sizes of 1000KB, 2000KB, 3000KB, 4000KB, and 5000KB. The avalanche effect was also assessed for each algorithm with block sizes and key sizes tailored to their specifications. The results reveal that AES and Twofish exhibit the lowest encryption and decryption times, particularly for large files, demonstrating superior efficiency. For avalanche effect, AES achieved 53.9063%, surpassing the critical 50% threshold, followed by 3DES (50%), Blowfish (46.875%), Twofish (46.094%), and DES (23.4375%). AES strikes an optimal balance between speed and security, making it the most suitable encryption algorithm for smartphone applications

Keywords : Smartphones, Security, Encryption, Decryption, Cryptography, Symmetric, Block Cipher.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe