Comparative Analysis of Encryption Algorithms
Keywords:Cipher Length, Encryption, Decryption, Advanced Encryption Standard (AES) and Rivest Shamir Algorithm (RSA) and Algorithm.
Purpose: Encryption algorithm allows users to extend the assurance found in the physical world to the electronic world in the carrying out of our day-to-day activities. This research attempts to make a comparative evaluation of two encryption algorithms (Advanced Encryption Standard (AES) and Rivest Shamir Algorithm (RSA) in order to ascertain the most reliable in terms of their encryption time, decryption time, Key length, and cipher length.
Methodology: Java programming was used for the development and Mongo Db to generate data parsing.
Findings: The results obtained from the development revealed that AES is considered more efficient because it uses lesser time for encryption and decryption, reduces cipher and key length as compared with RSA which consumes longer encryption and decryption time, and increases cipher and key length. Excel package was also used to display the pictorial representation of the comparison between these algorithms.
Recommendation: Advanced encryption standard is recommended for security-based application developers because of the small time of encryption and decryption.
Adolf, F., Joseph, G. & Kwabena, R. (2014) Comparative Analysis of Advanced Encryption Standard, Blowfish, and Rivest Cipher 4 Algorithms. Journal of Innovative Research and Development. Vol. 3, Issue 11.
Agbelusi, O. (2019). Development of a Secured Framework for Societal Health Inclusion using Mobile Devices. Published Ph.D. Thesis Submitted to Department of Computer Science, Federal University of Technology, Akure, Nigeria.
Elminaam, D.S, Kader, H.M and Hadhoud, M.M (2008) "Performance Evaluation of Symmetric Encryption Algorithms", International Journal of Computer Science and Network Security, Vol.8 No.12, pp. 280-286.
Mandal, A.K, Parakash, C and Tiwari, A (2012) “Performance Evaluation of Cryptographic Algorithms: DES and AES” IEEE Students’ Conference on Electrical, Electronics and Computer Science, pp. 15.
Mansoor, E., Shujaat, K. and Umer, B. (2013). Symmetric Algorithm Survey: A Comparative Analysis. International Journal of Computer Applications. 61(20)
Meena1, M & Komathi, A. (2013) Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats. International Journal of Science and Research (IJSR). Volume 5 Issue 8.
Pavithra, S. and Ramade, E. (2012) "Performance Evaluation of Symmetric Algorithms", Journal of Global Research in Computer Science, Volume 3, No. 8, pp. 43
Nureni & Sayyidina (2018). Comparative Analysis of Encryption Algorithms. Covenant Journal of Informatics & Communication Technology. Vol. 6 No1
Seth, S.M, Rajan Ishra, R (2011) “Comparative Analysis of Encryption Algorithms for Data Communication”. International Journal of Computer Science and Technology. Vol. 2, Issue 2, pp. 292-294
Singh & Supriya (2013). A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security International Journal of Computer Applications, Vol. 67, pp: 33 – 38