International Science and Technology Journal
Published by
Under supervision of
Open Access Journal
ISSN: 2519-9854 (Online)
ISSN: 2519-9846 (Print)
A peer-reviewed and open access journal concerned with publishing researches and studies in the field of applied sciences and engineering
Comparative Analysis of the RSA and AES Algorithms as Data Cryptosystems
Researcher(s): | - Musab A. Aldali
- Hesham Saleh Almssmari
- Mustafa M. Salama
|
Institution: | College of technical Sciences - Derna |
Field: | علوم الحاسوب و النظم الخبيرة وتقنية المعلومات |
Published in: | 34th volume - July 2024 |
الملخص
يُعرّف تشفير البيانات على أنه طريقة لتحويل المعلومات إلى صيغة مشفرة، مما يضمن أن الأفراد المصرح لهم فقط هم من يمكنهم فك تشفير المحتوى وفهمه بنجاح. بالإضافة إلى ذلك، يتم تصنيف التشفير بشكل أساسي إلى نوعين متميزين: التشفير بالمفتاح المتماثل والتشفير بالمفتاح غير المتماثل. في هذا البحث، نجري تحليلًا مقارنًا لنظامي تشفيرRSA للتشفير بالمفتاح غير المتماثل وAES للتشفير بالمفتاح المتماثل، وتحديداً تقييم أدائهما في تشفير البيانات للاتصالات من نقطة إلى نقطة. يركز التحليل على سرعة تشفير الملفات وفك تشفيرها بالإضافة إلى طول البيانات المشفرة. وقد كشفت النتائج أن كلاً من RSA وAES تعدّ خوارزميات تشفير قوية، إلا أن AES تتفوق على RSA من حيث سرعة التشفير وفك التشفير مع فاقد أقل في حجم البيانات التي لا يمكن تشفيره. أخيرًا، أثبتت الورقة البحثية أنه من الممكن دمج كلتا الخوارزميتين بفعالية لحماية المعلومات وتلبية الاحتياجات الأمنية للتطبيقات.
الكلمات المفتاحية: التشفير – فك التشفير- أنظمة التشفير –خورازمية التشفير –RSA - AES
Abstract
Data encryption IS defined as a method of transforming information into a coded format, ensuring that only authorized individuals can successfully decode and comprehend the content. In addition, cryptography is principally categorized into two distinct types: symmetric key cryptography and asymmetric key cryptography.
In this research, we conduct a comparative analysis of two cryptographic systems: RSA (asymmetric) and AES (symmetric key), specifically evaluating their performance in data encryption for point-to-point communications. The analysis focuses on the speed of file encryption and decryption as well as the length of the encrypted data. Experimental results reveal that both RSA and AES are robust encryption algorithms; however, AES outperforms RSA in terms of both encryption and decryption speeds while also producing a smaller remaining data size that could not be encrypted due. Finally, the paper has outlined strengths and weaknesses of reviewed algorithms which make it possible to effectively put these algorithms together in protecting information and satisfying the security needs of applications.........
Keywords:.... Data encryption IS defined as a method of transforming information into a coded format, ensuring that only authorized individuals can successfully decode and comprehend the content. In addition, cryptography is principally categorized into two distinct types: symmetric key cryptography and asymmetric key cryptography.
In this research, we conduct a comparative analysis of two cryptographic systems: RSA (asymmetric) and AES (symmetric key), specifically evaluating their performance in data encryption for point-to-point communications. The analysis focuses on the speed of file encryption and decryption as well as the length of the encrypted data. Experimental results reveal that both RSA and AES are robust encryption algorithms; however, AES outperforms RSA in terms of both encryption and decryption speeds while also producing a smaller remaining data size that could not be encrypted due. Finally, the paper has outlined strengths and weaknesses of reviewed algorithms which make it possible to effectively put these algorithms together in protecting information and satisfying the security needs of applications.
Keywords: Encryption – Decryption– Cryptosystems– Encryption Algorithm- RSA– AES.