Authors :
C.V. Mbamala; M.O Onyesolu; G.N Ezeh; U.V Maduabuchi; C.N Onyechi; C.D Anyiam
Volume/Issue :
Volume 10 - 2025, Issue 2 - February
Google Scholar :
https://tinyurl.com/42m9972b
Scribd :
https://tinyurl.com/37x4amnv
DOI :
https://doi.org/10.38124/ijisrt/25feb1650
Google Scholar
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 15 to 20 days to display the article.
Abstract :
The increasing reliance on smartphones has heightened the need for robust data security. Symmetric
cryptography, recognized for its efficiency and speed, plays a crucial role in safeguarding data on mobile devices. This study
evaluates the performance of selected symmetric encryption algorithms, DES, 3DES, AES, Twofish, and Blowfish on
smartphones. The algorithms were tested for encryption time, decryption time, and avalanche effect using file sizes of
1000KB, 2000KB, 3000KB, 4000KB, and 5000KB. The avalanche effect was also assessed for each algorithm with block sizes
and key sizes tailored to their specifications. The results reveal that AES and Twofish exhibit the lowest encryption and
decryption times, particularly for large files, demonstrating superior efficiency. For avalanche effect, AES achieved
53.9063%, surpassing the critical 50% threshold, followed by 3DES (50%), Blowfish (46.875%), Twofish (46.094%), and
DES (23.4375%). AES strikes an optimal balance between speed and security, making it the most suitable encryption
algorithm for smartphone applications
Keywords :
Smartphones, Security, Encryption, Decryption, Cryptography, Symmetric, Block Cipher.
References :
- Arora, P., Singh, A., and Tyagi, H. (2021). Evaluation and comparison of security issues on cloud computing environment. World of Computer Science and Information Technology Journal (WCSIT), 2(5), 179-183
- Alenezi, M.N., Haneen, A., and Nada, Q.M. (2020). Symmetric
- encryption algorithms: Review and evaluation study. Iraqi Journal of Science, 12(1), 104-109.
- Hendi, A., Dwariri M., and Quadi, Z. (2019). A novel simple and highly secure method for data encryption- decryption. Journal of communication Network and International security, 11(1), 232-238.
- M-shabi, M.A, (2019). A survey of symmetric and Asymmetric cryptography algorithms in information security. International Journal of scientific Research publication, 9(3), 576-589.
- Elminaam, D. S. A., Kader, H. M. A., and Hadhoud, M. M. (2023). Performance evaluation of symmetric encryption algorithms. International Journal of Computer Science and Network Security, 8(12), 280-286.
- Longunleko, K.B., Aeniji, O.D., and Lonuneleko, A.M. (2020). A comparative study of symmetric cryptography mechanism on DES, AES and EB64 for information security. International Journal of Scientific Research in Computer Science and Engineering, 8(1), 45-51.
- Pavithra, S, and Ramadevi, D, (2019), Performance evaluation of symmetric algorithm. Journal of Mathematical and Computing Science, 2(8), 67-73.
- Alanazi, H., Zaidan, B. B., Zaidan, A. A., Jalab, H. A., Shabbir, M., and Al-Nabhani, Y. (2023). New comparative study between DES, 3DES and AES within nine factors. International Journal of Computer Science and Network Security, 4(1), 56-65.
- Beniwal, T. and Deepak, P. (2020). Enhancement in AES algorithms. International Research Journal of Engineering and Technology,9(2), 423-427.
- Roo, P.A., and Harpreet, K. (2023). A literature review on RSA, DES and AES encryption algorithm. Emerging Trends in Engineering and Management, 2(5), 57-63.
- Mandal, A. K., Parakash, C., and Tiwari, A. (2019). Performance evaluation of cryptographic algorithms: DES and AES. In IEEE Students Conference on Electrical, Electronics and Computer Science, 12-14 October 2019, (pp. 1-5). Australia: IEEE.
- A., Singh, M. L., and Bansal, P. K. (2018). Comparison of various encryption algorithms and techniques for secured data communication in multi-node network. International Journal of Engineering and Technology, 7(3), 89-95.
The increasing reliance on smartphones has heightened the need for robust data security. Symmetric
cryptography, recognized for its efficiency and speed, plays a crucial role in safeguarding data on mobile devices. This study
evaluates the performance of selected symmetric encryption algorithms, DES, 3DES, AES, Twofish, and Blowfish on
smartphones. The algorithms were tested for encryption time, decryption time, and avalanche effect using file sizes of
1000KB, 2000KB, 3000KB, 4000KB, and 5000KB. The avalanche effect was also assessed for each algorithm with block sizes
and key sizes tailored to their specifications. The results reveal that AES and Twofish exhibit the lowest encryption and
decryption times, particularly for large files, demonstrating superior efficiency. For avalanche effect, AES achieved
53.9063%, surpassing the critical 50% threshold, followed by 3DES (50%), Blowfish (46.875%), Twofish (46.094%), and
DES (23.4375%). AES strikes an optimal balance between speed and security, making it the most suitable encryption
algorithm for smartphone applications
Keywords :
Smartphones, Security, Encryption, Decryption, Cryptography, Symmetric, Block Cipher.