Comparative Analysis of Encryption Algorithms

Authors

  • Agbelusi Olutola
  • Matthew Olumuyiwa

DOI:

https://doi.org/10.47672/ejt.1312
Abstract views: 571
PDF downloads: 402

Keywords:

Cipher Length, Encryption, Decryption, Advanced Encryption Standard (AES) and Rivest Shamir Algorithm (RSA) and Algorithm.

Abstract

Purpose: Encryption algorithm allows users to extend the assurance found in the physical world to the electronic world in the carrying out of our day-to-day activities. This research attempts to make a comparative evaluation of two encryption algorithms (Advanced Encryption Standard (AES) and Rivest Shamir Algorithm (RSA) in order to ascertain the most reliable in terms of their encryption time, decryption time, Key length, and cipher length.

Methodology: Java programming was used for the development and Mongo Db to generate data parsing.

Findings: The results obtained from the development revealed that AES is considered more efficient because it uses lesser time for encryption and decryption, reduces cipher and key length as compared with RSA which consumes longer encryption and decryption time, and increases cipher and key length. Excel package was also used to display the pictorial representation of the comparison between these algorithms.

Recommendation: Advanced encryption standard is recommended for security-based application developers because of the small time of encryption and decryption.

Downloads

Download data is not yet available.

Author Biographies

Agbelusi Olutola

Computer Science Department, Rufus Giwa Polytechnic, Owo

Matthew Olumuyiwa

School of Computing, University of Portsmouth, United Kingdom

References

Adolf, F., Joseph, G. & Kwabena, R. (2014) Comparative Analysis of Advanced Encryption Standard, Blowfish, and Rivest Cipher 4 Algorithms. Journal of Innovative Research and Development. Vol. 3, Issue 11.

Agbelusi, O. (2019). Development of a Secured Framework for Societal Health Inclusion using Mobile Devices. Published Ph.D. Thesis Submitted to Department of Computer Science, Federal University of Technology, Akure, Nigeria.

Elminaam, D.S, Kader, H.M and Hadhoud, M.M (2008) "Performance Evaluation of Symmetric Encryption Algorithms", International Journal of Computer Science and Network Security, Vol.8 No.12, pp. 280-286.

Mandal, A.K, Parakash, C and Tiwari, A (2012) “Performance Evaluation of Cryptographic Algorithms: DES and AES” IEEE Students’ Conference on Electrical, Electronics and Computer Science, pp. 15.

Mansoor, E., Shujaat, K. and Umer, B. (2013). Symmetric Algorithm Survey: A Comparative Analysis. International Journal of Computer Applications. 61(20)

Meena1, M & Komathi, A. (2013) Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats. International Journal of Science and Research (IJSR). Volume 5 Issue 8.

Pavithra, S. and Ramade, E. (2012) "Performance Evaluation of Symmetric Algorithms", Journal of Global Research in Computer Science, Volume 3, No. 8, pp. 43

Nureni & Sayyidina (2018). Comparative Analysis of Encryption Algorithms. Covenant Journal of Informatics & Communication Technology. Vol. 6 No1

Seth, S.M, Rajan Ishra, R (2011) “Comparative Analysis of Encryption Algorithms for Data Communication”. International Journal of Computer Science and Technology. Vol. 2, Issue 2, pp. 292-294

Singh & Supriya (2013). A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security International Journal of Computer Applications, Vol. 67, pp: 33 – 38

Downloads

Published

2023-01-04

How to Cite

Olutola, A. ., & Olumuyiwa, M. . (2023). Comparative Analysis of Encryption Algorithms. European Journal of Technology, 7(1), 1 - 9. https://doi.org/10.47672/ejt.1312

Issue

Section

Articles