Javascript must be enabled to continue!
A Comparative Analysis of AES, RSA, and 3DES Encryption Standards based on Speed and Performance
View through CrossRef
Information security is important in the digital era, with encryption emerging as a fixed solution to safeguard sensitive data from unauthorized access. This paper provides an overview of encryption by categorizing cryptographic algorithms into symmetric and asymmetric, along with hashing. Symmetric cryptography uses a single key for encryption and decryption, and asymmetric cryptography utilizes distinct public and private keys. Hashing maps input messages into compact bit strings. The literature survey explores the performance analysis of encryption algorithms, focusing on Rivest Shamir Adleman (RSA), Data Encryption Standard (DES), and Advanced Encryption Standard (AES), considering parameters like computation time and memory usage. Furthermore, the comparative analysis of encryption algorithms, including AES, RSA, and 3DES, is discussed. The paper delves into the motivation for cryptography in secure document transfer systems, emphasizing the need for confidentiality, integrity, and availability. Finally, the study presents detailed insights into AES, RSA, and 3DES encryption standards, highlighting their principles and applications.
Scientific Oasis
Title: A Comparative Analysis of AES, RSA, and 3DES Encryption Standards based on Speed and Performance
Description:
Information security is important in the digital era, with encryption emerging as a fixed solution to safeguard sensitive data from unauthorized access.
This paper provides an overview of encryption by categorizing cryptographic algorithms into symmetric and asymmetric, along with hashing.
Symmetric cryptography uses a single key for encryption and decryption, and asymmetric cryptography utilizes distinct public and private keys.
Hashing maps input messages into compact bit strings.
The literature survey explores the performance analysis of encryption algorithms, focusing on Rivest Shamir Adleman (RSA), Data Encryption Standard (DES), and Advanced Encryption Standard (AES), considering parameters like computation time and memory usage.
Furthermore, the comparative analysis of encryption algorithms, including AES, RSA, and 3DES, is discussed.
The paper delves into the motivation for cryptography in secure document transfer systems, emphasizing the need for confidentiality, integrity, and availability.
Finally, the study presents detailed insights into AES, RSA, and 3DES encryption standards, highlighting their principles and applications.
Related Results
Primerjalna književnost na prelomu tisočletja
Primerjalna književnost na prelomu tisočletja
In a comprehensive and at times critical manner, this volume seeks to shed light on the development of events in Western (i.e., European and North American) comparative literature ...
Enhanced RSA Algorithm for Data Security in the Internet of Things
Enhanced RSA Algorithm for Data Security in the Internet of Things
Abstract
Various devices are linked together through a variety of networks in order to exchange data in the Internet of Things (IoT). Life has changed dramatically as a res...
Hybrid Encryption for Securing HDFS Data in Big Data Environments
Hybrid Encryption for Securing HDFS Data in Big Data Environments
Abstract
In the previous era, Conventional encryption schemes that work on file were linked with a lot of processing overhead that negatively impacted performance in the Ha...
Comparative Analysis of Encryption Algorithms
Comparative Analysis of Encryption Algorithms
Purpose: Encryption algorithm allows users to extend the assurance found in the physical world to the electronic world in the carrying out of our day-to-day activities. This resear...
End to end encryption of chat using advanced encryption standard-256
End to end encryption of chat using advanced encryption standard-256
In an era marked by rampant digitalization and ubiquitous connectivity, ensuring the security and privacy of communications has become paramount. This paper introduces a novel appl...
Secured Electronic Voting System Using RSA Key Encapsulation Mechanism
Secured Electronic Voting System Using RSA Key Encapsulation Mechanism
A secured process whereas enumerating and casting of votes with the electronic aids with aim of improving the performance of electoral system is called E-voting (Electronic voting)...
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things (IoT) has ...
Securing Medical Data: The Integration of Advanced Encryption Standard and Blockchain
Securing Medical Data: The Integration of Advanced Encryption Standard and Blockchain
Objective: The research is to ensure the security of medical data and prevent data breaches. To achieve this objective, An efficient solution was proposed - the integration of bloc...


