International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Today is the era of internet and networks applications. So the information security has been very important issue in data communication. Any loss to information can prove to be great loss to the organization. Encryption techniques are important in information security systems. This paper provides a fair comparison between five most common and used symmetric and asymmetric key algorithms: two fish & blowfish, IB-mRSA, RSA, and RC. A comparison has been made on the basis of these parameters: rounds block size, key size, and encryption/decryption time, and CPU process time in the form of throughput.