Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Comparative Analysis of AES, RSA, and 3DES Encryption Standards based on Speed and Performance

View through CrossRef
Information security is important in the digital era, with encryption emerging as a fixed solution to safeguard sensitive data from unauthorized access. This paper provides an overview of encryption by categorizing cryptographic algorithms into symmetric and asymmetric, along with hashing. Symmetric cryptography uses a single key for encryption and decryption, and asymmetric cryptography utilizes distinct public and private keys. Hashing maps input messages into compact bit strings. The literature survey explores the performance analysis of encryption algorithms, focusing on Rivest Shamir Adleman (RSA), Data Encryption Standard (DES), and Advanced Encryption Standard (AES), considering parameters like computation time and memory usage. Furthermore, the comparative analysis of encryption algorithms, including AES, RSA, and 3DES, is discussed. The paper delves into the motivation for cryptography in secure document transfer systems, emphasizing the need for confidentiality, integrity, and availability. Finally, the study presents detailed insights into AES, RSA, and 3DES encryption standards, highlighting their principles and applications.
Title: A Comparative Analysis of AES, RSA, and 3DES Encryption Standards based on Speed and Performance
Description:
Information security is important in the digital era, with encryption emerging as a fixed solution to safeguard sensitive data from unauthorized access.
This paper provides an overview of encryption by categorizing cryptographic algorithms into symmetric and asymmetric, along with hashing.
Symmetric cryptography uses a single key for encryption and decryption, and asymmetric cryptography utilizes distinct public and private keys.
Hashing maps input messages into compact bit strings.
The literature survey explores the performance analysis of encryption algorithms, focusing on Rivest Shamir Adleman (RSA), Data Encryption Standard (DES), and Advanced Encryption Standard (AES), considering parameters like computation time and memory usage.
Furthermore, the comparative analysis of encryption algorithms, including AES, RSA, and 3DES, is discussed.
The paper delves into the motivation for cryptography in secure document transfer systems, emphasizing the need for confidentiality, integrity, and availability.
Finally, the study presents detailed insights into AES, RSA, and 3DES encryption standards, highlighting their principles and applications.

Related Results

Primerjalna književnost na prelomu tisočletja
Primerjalna književnost na prelomu tisočletja
In a comprehensive and at times critical manner, this volume seeks to shed light on the development of events in Western (i.e., European and North American) comparative literature ...
Photosynthetic Physiological Basis of Forage Mass Stability in a Progeny of Rhizome-Rooted ‘Qingshui’ Medicago sativa L.
Photosynthetic Physiological Basis of Forage Mass Stability in a Progeny of Rhizome-Rooted ‘Qingshui’ Medicago sativa L.
Rhizome-rooted alfalfa (Medicago sativa L.) is an excellent forage for establishing grazing and ecological grasslands, requiring a high and stable yield. Studying the genetic and p...
ANALISIS KINERJA ALGORITMA ADVANCED ENCRYPTION STANDARD (AES) TERMODIFIKASI DALAM ENRKIPSI DAN DEKRIPSI DATA
ANALISIS KINERJA ALGORITMA ADVANCED ENCRYPTION STANDARD (AES) TERMODIFIKASI DALAM ENRKIPSI DAN DEKRIPSI DATA
Advanced Encryption Standard (AES) adalah salah satu algoritma yang paling popular digunakan . Penelitian ini bertujuan untuk menganalisis kinerja algoritma Advanced Encryption Sta...
Enhanced RSA Algorithm for Data Security in the Internet of Things
Enhanced RSA Algorithm for Data Security in the Internet of Things
Abstract Various devices are linked together through a variety of networks in order to exchange data in the Internet of Things (IoT). Life has changed dramatically as a res...
Hybrid Encryption for Securing HDFS Data in Big Data Environments
Hybrid Encryption for Securing HDFS Data in Big Data Environments
Abstract In the previous era, Conventional encryption schemes that work on file were linked with a lot of processing overhead that negatively impacted performance in the Ha...
End to end encryption of chat using advanced encryption standard-256
End to end encryption of chat using advanced encryption standard-256
In an era marked by rampant digitalization and ubiquitous connectivity, ensuring the security and privacy of communications has become paramount. This paper introduces a novel appl...
Comparative Analysis of Encryption Algorithms
Comparative Analysis of Encryption Algorithms
Purpose: Encryption algorithm allows users to extend the assurance found in the physical world to the electronic world in the carrying out of our day-to-day activities. This resear...
Secured Electronic Voting System Using RSA Key Encapsulation Mechanism
Secured Electronic Voting System Using RSA Key Encapsulation Mechanism
A secured process whereas enumerating and casting of votes with the electronic aids with aim of improving the performance of electoral system is called E-voting (Electronic voting)...

Back to Top