Superiority of Twofish over Blowfish

Authors

  • Deepali D. Rane Assistant Professor Department of Information Technology, D.Y. Patil College of Engineering, Akurdi. deepalirane35@gmail.com, India
November 1, 2016

Downloads

Now a day’s users are generating huge amount of data and hence they are motivated to outsource it to the public cloud. As cloud server is not trusted server, so data users wants their data to be safe at cloud side. To preserve the privacy of documents, it should get encrypted before outsourcing to the cloud. For ensuring privacy of documents, numerous algorithms have been proposed which makes user data private and avoid unauthorized access to their confidential data. Most essential characteristics of any Encryption algorithm are: Speed of Encryption and Security. In this Paper, speed comparisons between two algorithms i.e. Twofish and Blowfish have been studied. We have analyzed encryption speed of both algorithms by encrypting different sized data. Performance has been calculated in terms of throughput of each algorithm on different sets of data..