Volume 3,Issue 8
Research on the Comparison of Encryption and Decryption Performance of Symmetric Encryption Algorithms
With the rapid development of information technology, data security has become particularly important in various fields. As one of the key technologies to ensure data security, symmetric encryption algorithms are widely used in data transmission and storage. This paper selects four common symmetric encryption algorithms (DES, 3DES, AES, and SM4) and conducts a comparative study on their encryption and decryption performance under three different data scales (100MB, 500MB, and 1000MB). Through experiments, data such as encrypted data size, decrypted data size, SHA256 value of pre-encrypted data, SHA256 value of post-decrypted data, average encryption time, and average decryption time of each algorithm are obtained and presented in the form of tables. The research results can provide a reference for the selection of symmetric encryption algorithms in practical applications.
[1] Yang W, Liu Z, 2025, Network Security Technology and Training (6th Edition). Posts & Telecom Press, Beijing, 200–203 + 205.
[2] Shi S, Chi R, 2025, Computer Network Security Technology (7th Edition). Posts & Telecom Press, Beijing, 200–203 + 205.
[3] Wang D, 2025, Research on the Application of Encryption Algorithm AES in Blockchain Technology. China New Technologies and Products, 2025(18): 139–140.
[4] Tang Y, Wan W, 2025, Design and Implementation of National Cryptographic SM4 Algorithm Demonstration Platform. Network Security Technology and Application, 2025(10): 37.
[5] Xie H, Qiao M, 2025, Design of Encryption and Decryption System Based on National Cryptographic SM2/SM3/SM4 Algorithms. Computer Knowledge and Technology, 21(13): 83–86.
[6] Wu X, Guo P, He D, 2014, Research and Implementation of Reconfigurable DES and SM4 Algorithms. Application Research of Computers, 31(03): 853.
[7] Huang J, Liu J, Cao Z, 2024, Research on File Desensitization System Based on National Cryptographic SM4 and Conformal Encryption Algorithms. Computer Measurement & Control, 32(11): 316.
[8] Gao W, 2025, Research on Secure Key Distribution and Communication System Based on OpenSSL. China Computer & Communication, 37(04): 77–78.
[9] Shi Y, Ma L, 2020, Design and Implementation of Program Integrity Measurement Scheme Based on OpenSSL. Electronics World, 2020(02): 47–48.
[10] Chen M, Zhao L, Wu T, 2023, Performance Comparison and Length Characteristic Research of 3DES and AES Algorithms. Computer Applications and Software, 40(4): 210–215.
[11] Sun B, Ruan H, Wu C, 2023, Distributed Data Encryption Scheme Based on SM4 and Experiment on Length Characteristics. Computer Engineering and Science, 45(6): 1089–1095.
[12] Xu Q, Li W, Li Z, et al., 2025, Research on the Application of SM4 National Cryptographic Algorithm in Train-Ground Wireless Communication of CTCS-3 Level Train Control System. Railway Signalling & Communication, 61(08): 10–11.
[13] Yang Y, Wang J, 2024, Quantum Logistic Map Image Encryption Algorithm Based on SHA-256 and Arnold Mapping. Journal of Anhui University (Natural Science Edition), 48(01): 35–42.
[14] Xie J, 2016, Research on the Application Value of Virtual Private Network Technology in Computer Network Information Security. Informatization Construction, 2016(04): 63–64.
[15] Zhao Z, Chen H, 2025, Research on Network Communication Information Encryption Methods for Internet Information Security Maintenance. Office Automation, 30(15): 86–87.