Data Comparison among Encrypted Data using AES and Two Fish Algorithm on Cloud Computing Security

Authors

  • SP. Chokkalingam, E. Srimathi

Abstract

Now a day’s cloud security is an important aspects in cloud computing. The cloud usage among the public user increases rapidly. Due to security risk, data reliability and data privacy is lost among the cloud user. In this research we compared two different security algorithms such as AES and TwoFish algorithm with different parameter techniques. The five different parameters which are used to compare these algorithms such as Key length, Key strength, Time taken for Encryption, Encrypting quality by applying different attack such as (Partial attack, Dictionary attack, Brute Force attack, Time taken for Decryption). These two algorithms are most probably used among organization and users on promising manner and this entire algorithm can be worked in 256 bit length. By knowing the result of this parameters we can identify which algorithm is best for security.

Downloads

Published

2020-05-12

Issue

Section

Articles