Comparative Analysis of AES and Blowfish in Cloud Storage Encryption
by AYENI, James Kehinde, Ipeayeda Funmi W., Mayowa Oyedepo Oyediran, OBISESAN, Rachael Oyeranti, OBISESAN, Stephen Oluwatosin
Published: December 19, 2025 • DOI: 10.51244/IJRSI.2025.12110138
Abstract
Cloud storage requires efficient and secure encryption to ensure data confidentiality.This study evaluates and compares the performance of the AES and Blowfish encryption algorithms with the aim of determining which algorithm offers superior efficiency and reliability for secure data processing. The specific objectives are to measure and analyze their encryption time, execution time, throughput, and Mean Square Error (MSE) across multiple experimental runs. MATLAB was used as the primary methodology for implementing both algorithms, generating datasets, executing repeated trials, and computing performance metrics. Execution time values were recorded for twenty samples, where AES consistently produced lower times such as 72 s, 154 s, 95 s, 78 s, 25 s, and a minimum of 9.1 s, while Blowfish recorded higher corresponding values including 106 s, 213 s, 138 s, 136 s, 31 s, and a minimum of 10 s. Comparative averages further showed that AES achieved a lower overall execution range, indicating faster computational behaviour. Throughput values also demonstrated AES superiority, with sample values above 1.00, while Blowfish maintained lower throughput levels. MSE analysis revealed significantly lower values for AES, such as 59.88, compared to Blowfish’s much higher 126.83, indicating better data accuracy and reduced distortion during encryption and decryption. The bar and line graph analyses confirmed AES’s consistent performance advantage across all metrics. The results demonstrate that AES outperforms Blowfish in terms of speed, efficiency, and reliability. In conclusion, AES is better suited for high-performance encryption applications requiring fast execution and accurate data reconstruction. Blowfish, although functional, shows slower and more inconsistent behaviour, making it less ideal for time-critical or high-volume security systems.