you may find the answer to your question in this Literature source:
Diaa Salama Abd Elminaam, Hatem Mohamed Abdual Kader and Mohiy Mohamed Hadhoud: Evaluating The Performance of Symmetric Encryption Algorithms; International Journal of Network Security, Vol.10 (3), May 2010