A Comparative Analysis of AES, RSA, and 3DES Encryption Standards based on Speed and Performance
DOI:
https://doi.org/10.31181/msa1120244Keywords:
Encryption, Symmetric Cryptography, Asymmetric Cryptography, Hashing, Information SecurityAbstract
Information security is important in the digital era, with encryption emerging as a fixed solution to safeguard sensitive data from unauthorized access. This paper provides an overview of encryption by categorizing cryptographic algorithms into symmetric and asymmetric, along with hashing. Symmetric cryptography uses a single key for encryption and decryption, and asymmetric cryptography utilizes distinct public and private keys. Hashing maps input messages into compact bit strings. The literature survey explores the performance analysis of encryption algorithms, focusing on Rivest Shamir Adleman (RSA), Data Encryption Standard (DES), and Advanced Encryption Standard (AES), considering parameters like computation time and memory usage. Furthermore, the comparative analysis of encryption algorithms, including AES, RSA, and 3DES, is discussed. The paper delves into the motivation for cryptography in secure document transfer systems, emphasizing the need for confidentiality, integrity, and availability. Finally, the study presents detailed insights into AES, RSA, and 3DES encryption standards, highlighting their principles and applications.
Downloads
References
Forouzan, B. A. (2007). Data Communication and Networking. Huga Media.
Ammiudin, A. (2021). Android assets protection using RSA and AES cryptography to prevent app piracy. In Proceedings of the 2021 IEEE International Conference on Information Technology and Electrical Engineering (ICOIACT) (pp. 1–6). https://doi.org/10.1109/ICOIACT50329.2020.9331988.
Singh, S. L. (2011). The Code Book: The Secret History of Codes and Code-Breaking. HarperCollins Publishers.
Asaad, R. R., Abdulrahman, S. M., & Hani, A. A. (2017). Advanced Encryption Standard Enhancement with Output Feedback Block Mode Operation. Academic Journal of Nawroz University, 6(3), 1-10. https://doi.org/10.25007/ajnu.v6n3a70.
Aumasson, J.-P., & Green, M. D. (2017). Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press.
Alenezi, M. N., Alabdulrazzaq, H., & Mohammad, N. Q. (2020). Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 12(2), 256-272.
Delfs, H., Knebl, H., & Knebl, H. (2002). Introduction to Cryptography: Principles and Applications. Springer. https://doi.org/10.1007/978-3-662-47974-2.
Katz, J., & Lindell, Y. (2014). Introduction to Cryptography. Chapman and Hall/CRC.
Sood, R. H. K. (2023). A literature review on RSA, DES, and AES encryption algorithms. Journal of Information Security, 12, 37–50. https://doi.org/10.56155/978-81-955020-3-5-07.
Arora, A., & Kumar, T. (2012). Evaluation and comparison of security issues on cloud computing environment. In Proceedings of the World Conference on Computer Science and Information Technology (pp. 1–5). https://doi.org/10.1109/WCSIT.2012.XX.
Wang, Y., Chen, C., & Jiang, Q. (2019). Security algorithm of Internet of Things based on ZigBee protocol. Cluster Computing, 22, 14759-14766. https://doi.org/10.1007/s10586-018-2388-4.
Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M. (2008). Performance evaluation of symmetric encryption algorithms. IJCSNS International Journal of Computer Science and Network Security, 8(12), 280-286. https://doi.org/10.22937/IJCSNS.2008.8.8.2.
Singh, G. P. (2021). A DES, AES, DSS, and RSA-based security system for protecting sensitive information during communication and providing fast, reliable file identification. Webology, 18. https://doi.org/10.14704/web/v18n2/a52.
Hamza, A., & Kumar, B. (2020). A review paper on DES, AES, RSA encryption standards. In 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART) (pp. 333-338). IEEE. https://doi.org/10.1109/SMART50582.2020.9336800.
Tayde, S., & Siledar, S. (2015). File encryption, decryption using AES algorithm in android phone. International Journel of Advanced Research in computer science and software engineering, 5(5), 53-56.
National Institute of Standards and Technology (NIST). (2001). FIPS PUB 197: Advanced Encryption Standard (AES).
Singh, G. (2015). A study of encryption algorithms (RSA, AES, 3DES, DES) for information security. International Journal of Computer Applications, 115(7), 1-5. https://doi.org/10.5120/11507-7224.
Commey, D., Griffith, S., & Dzisi, J. (2020). Performance comparison of 3DES, AES, Blowfish and RSA for Dataset Classification and Encryption in Cloud Data Storage. International Journal of Computer Applications, 177(40), 17-22. https://doi.org/10.5120/ijca2020919897.
Mandal, A. K., Parakash, C., & Tiwari, A. (2012, March). Performance evaluation of cryptographic algorithms: DES and AES. In 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science (pp. 1-5). IEEE. https://doi.org/10.1109/SCEECS.2012.6184991.
Juniawan, F. P. (2016, August). RSA implementation for data transmission security in BEM chairman E-voting Android based application. In 2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE) (pp. 93-98). IEEE. https://doi.org/10.1109/ICITISEE.2016.7803054.
Stallings, W. (2017). Cryptography and Network Security: Principles and Practices. Pearson.
Barker, E., & Roginsky, A. (2018). Transitioning the use of cryptographic algorithms and key lengths (No. NIST Special Publication (SP) 800-131A Rev. 2 (Draft)). National Institute of Standards and Technology.
National Institute of Standards and Technology (NIST). (1999). Data encryption standard. Federal Information Processing Standards Publication, 112, 3.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 CC Attribution-NonCommercial-NoDerivatives 4.0
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.