Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Comparative Analysis of Encryption Algorithms

View through CrossRef
Purpose: Encryption algorithm allows users to extend the assurance found in the physical world to the electronic world in the carrying out of our day-to-day activities. This research attempts to make a comparative evaluation of two encryption algorithms (Advanced Encryption Standard (AES) and Rivest Shamir Algorithm (RSA) in order to ascertain the most reliable in terms of their encryption time, decryption time, Key length, and cipher length. Methodology: Java programming was used for the development and Mongo Db to generate data parsing. Findings: The results obtained from the development revealed that AES is considered more efficient because it uses lesser time for encryption and decryption, reduces cipher and key length as compared with RSA which consumes longer encryption and decryption time, and increases cipher and key length. Excel package was also used to display the pictorial representation of the comparison between these algorithms. Recommendation: Advanced encryption standard is recommended for security-based application developers because of the small time of encryption and decryption.
Title: Comparative Analysis of Encryption Algorithms
Description:
Purpose: Encryption algorithm allows users to extend the assurance found in the physical world to the electronic world in the carrying out of our day-to-day activities.
This research attempts to make a comparative evaluation of two encryption algorithms (Advanced Encryption Standard (AES) and Rivest Shamir Algorithm (RSA) in order to ascertain the most reliable in terms of their encryption time, decryption time, Key length, and cipher length.
Methodology: Java programming was used for the development and Mongo Db to generate data parsing.
Findings: The results obtained from the development revealed that AES is considered more efficient because it uses lesser time for encryption and decryption, reduces cipher and key length as compared with RSA which consumes longer encryption and decryption time, and increases cipher and key length.
Excel package was also used to display the pictorial representation of the comparison between these algorithms.
Recommendation: Advanced encryption standard is recommended for security-based application developers because of the small time of encryption and decryption.

Related Results

Primerjalna književnost na prelomu tisočletja
Primerjalna književnost na prelomu tisočletja
In a comprehensive and at times critical manner, this volume seeks to shed light on the development of events in Western (i.e., European and North American) comparative literature ...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
A Comparative Analysis of AES, RSA, and 3DES Encryption Standards based on Speed and Performance
A Comparative Analysis of AES, RSA, and 3DES Encryption Standards based on Speed and Performance
Information security is important in the digital era, with encryption emerging as a fixed solution to safeguard sensitive data from unauthorized access. This paper provides an over...
Control the Sensitivity of the Encryption Key to Ensure the Security of Big Data
Control the Sensitivity of the Encryption Key to Ensure the Security of Big Data
With the increasing technological development that has led to the complexity of big data systems, the importance lies in the challenge that ensures the security of sensitive inform...
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things (IoT) has ...

Back to Top