Key size, vulnerability to known attacks, performance (computation time) with different types of data, flexibility of application to different platform types, randomness of cipher, cost, and so on. I think that in terms of strength, aside from key size, randomness is very important, even when encrypting repetitive plaintext.
This paper looks mostly at performance comparisons:
The favorite these days still appears to be AES, and many of the others have been downgraded, such as DES. So we can expect AES to be scrutinized most, in the near future.
Not all cryptography algorithms rely on mathematical complexity. When quantum cryptography algorithms are analyzed, due to the different nature of the problem to be solved, different metrics are used (Eavesdropper equivocation, or success rate for example). The question posted is of very general type, so the spectrum of answers exists, without possibility for unique answer, given the state of the Cryptography science.
Some cryptosystems are not size-preserving, in particular the asymmetrical. Thence, the space overhead also ought to be incorporated as metrics if applicable.
The best and easiest way to evaluate the performance of any telecom. system is to correlate the data at both ends. check the Correlation chapter in any statistic book.
-The algorithm running time in terms of its upper, lower and average bound, the time for security element generation, time for encryption/decryption and signature ..etc.
-The space complexity, i.e the storage needs to store keys, and signatures, however regarding key size refer to NIST recommendations. generally, lightweight algorithms are preferable if the data not highly confidential.
You can evaluate an encryption algorithm by measuring its encryption and decryption time. one of the factors that may affect the above time is the key size.
Please check my papers:
1) A novel network security algorithm based on private key encryption
2)A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm
3)Secure network communication based on text-to-image encryption
4) Block cipher encryption for text-to-image algorithm
5) A novel network security algorithm based on encrypting text into a white-page image
6) Analyzing the efficiency of Text-to-Image encryption algorithm
7) An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm