You may be interested in the best public cryptanalysis for both algorithms:
For AES, there is an associated key attack in the 192-bit and 256-bit versions, discovered by Alex Biryukov and Dmitry Khovratovich , who uses AES key planning in operations 2^99.5 . This is faster than brute force, but still somewhat impracticable. This attack does not affect 128-bit AES.
For Blowfish, its four rounds are susceptible to a second-order differential attack (Rijmen, 1997). It can also be distinguished (for example, โHey, this box uses Blowfishโ) for a class of weak keys . However, there is currently no effective cryptanalysis in the full-blown version of Blowfish.
source share