Comparative Analysis of AES (Advanced Encryption Standard) and Blowfish Algorithms in Camera Module IoT Applications
DOI:
https://doi.org/10.33795/jartel.v15i3.7517Keywords:
AES Algorithm, Blowfish, Camera Module, Encryption, IoTAbstract
The development of technology is currently becoming very advanced and sophisticated which results in many data leaks by irresponsible individuals, so data security is mandatory. Data that is easily hacked is usually images sent through social media. This research aims to secure image transmission data using Telegram BOT. The selection of social media is because Telegram does not yet have encryption for data transmission security. The methods used are AES (Advanced Encryption Standard) and Blowfish because AES is the strongest algorithm today while Blowfish was once named the best and patent-free algorithm. So it is appropriate to conduct a comparative analysis on AES and Blowfish. Duration testing carried out using unequal sizes has an encryption process value of 100-200 ms consistently. For the duration description time of the smallest and largest image has the same value of 300 ms. For the same image size, the better the AES algorithm, the longer the duration of time while the Blowfish algorithm has a faster time than AES. As for the description process Blowfish Algorithm has the longest duration and AES 192 has the fastest duration
References
Smith, J., & Johnson, A. (2023). The Impact of Technology on Industrial Growth. Journal of Industrial Technology, 15(2).
Kamaljit Singh, Et Al. (2023). Data Security and Privacy in The Era Of Big Data: Challenges And Solutions. Journal of Big Data, 10(1), 1-25.
A. Banafa, "Three Key Challenges Facing Iot," Ieee Internet Ofthings, March 2017. [On Line]. Available: Https://Iot.Ieee.Org/Newsletter/March-2017/Three-Major-Challenges-Facing-Iot.Html/. [Accessed Wednesday May 2023].
B.J. Mohd And T. Hayajneh, “Lightweight Block Ciphers for Iot: Energy Optimization and Survival Techniques,” Ieee Access, Vol. 6, P. 35 966–35 978, 2018.
Va Thakor, Ma Razzaque and Mr Khandaker, “Lightweight Cryptography for Iot: A State-Of-The-Art,” Researchgate, No. 19, P. 2, 2020.
F. Adani And S. Salsabil, "Internet of Things: History Of Technology And Its Application," Technology Issues, Vol. 14 No 2, No. 8, P. 1, 2019.
Najib, W., Sulistyo, S., & Widyawan. (2020). Review Of Threats And Security Solutions In Internet Of Things Technology. National Journal Of Electrical Engineering And Information Technology, 9(4), 1-2.
M. Conti, A. Gangwal, And S. Ruj, "The Evolution of Cryptographic Attacks: A Survey," Acm Computing Surveys, Vol. 54, No. 6, Article 128, 2021. Doi: 10.1145/3460418.
Ravi Kumar, Et Al. (2023). Performance Analysis of Aes And Blowfish Algorithms for Image Encryption. Multimedia Tools and Applications, 82(10), 15678-15690.
Hidayatulloh, Nw, Tahir, M., Amalia, H., & Basyar, Na (2023). Getting To Know Advance Encryption Standard (Aes) As A Cryptographic Algorithm In Securing Data. Digital Transformation Technology, 1-3.
S. Sitinjak, Y. Fauziah And J., "File Cryptography Application Using Blowfish Algorithm," National Informatics Seminar 2010, No. 9, Pp. C-79, 2010.
Erlina. (2022). Analysis Of The Use Of Telegram As A Media For Learning Arabic In The Industrial Era 4.0. Shaut Al-'Arabiyah.
Widya, Ma, & Airlangga, P. (2020). Development Of Telegram Bot Engine Using Webhook Method In Order To Improve E-Government Service Time. Journal Of Science And Technology, 14-18.
Mt Rahman, A. Pinandito And Es Pramukantoro, "Comparison of Advanced Encryption Standard (Aes) And Blowfish Cryptographic Algorithm Performance On Text On Android Platform," Journal Of Information Technology And Computer Science Development, Vol. 1, No. 9, P. 1559, 2017.
Wali, A., Sulistyanto, A., & Defisa, T. (2022). Development of A Database Server Filesystem Monitoring System With Alerts Using Telegram Bots. Jayakarta Informatics Management Journal, 292-296.
