Why choose IJSRM?

High Quality Editorial Board, Globally Index Journal, Open Access & high citation rate, will apply for ISI track & other data base in near future for indexing ...

Title: Superiority of Twofish over Blowfish

Author(s): Deepali D. Rane

 DOI : http://dx.doi.org/10.18535/ijsrm/v4i11.01

Assistant Professor

Department of Information Technology,

D.Y. Patil College of Engineering, Akurdi.

This email address is being protected from spambots. You need JavaScript enabled to view it.

License: This work is licensed under a Creative Commons Attribution 4.0 International License.

Website: http://www.ijsrm.in

e-ISSN:  2321-3418



Now a day’s users are generating huge amount of data and hence they are motivated to outsource it to the public cloud. As cloud server is not trusted server, so data users wants their data to be safe at cloud side. To preserve the privacy of documents, it should get encrypted before outsourcing to the cloud. For ensuring privacy of documents, numerous algorithms have been proposed which makes user data private and avoid unauthorized access to their confidential data. Most essential characteristics of any Encryption algorithm are: Speed of Encryption and Security. In this Paper, speed comparisons between two algorithms i.e. Twofish and Blowfish have been studied. We have analyzed encryption speed of both algorithms by encrypting different sized data. Performance has been calculated in terms of throughput of each algorithm on different sets of data..


Social Science and Humanities

Antropology & Art

Communication studies

Corporate governance

Crosscultural Studies

Population Studies

Read More

Managment and Economics

Global Business

Economic Growth

Finance and Investment


Strategic Management

Read More

Science and Medical Science

Life Science


Public health

Clinical Research


Read More

Go to top