Comparative Analysis of Encryption Algorithms
نویسندگان
چکیده
Purpose: Encryption algorithm allows users to extend the assurance found in physical world electronic carrying out of our day-to-day activities. This research attempts make a comparative evaluation two encryption algorithms (Advanced Standard (AES) and Rivest Shamir Algorithm (RSA) order ascertain most reliable terms their time, decryption Key length, cipher length.
 Methodology: Java programming was used for development Mongo Db generate data parsing.
 Findings: The results obtained from revealed that AES is considered more efficient because it uses lesser time decryption, reduces key length as compared with RSA which consumes longer increases length. Excel package also display pictorial representation comparison between these algorithms.
 Recommendation: Advanced standard recommended security-based application developers small decryption.
منابع مشابه
Comparative Analysis of Block Key Encryption Algorithms
Humankind has grown phenomenally from Stone Age to information technology age. Information technology is deeply treasured; mainly because of the Internet. The internet has brought great changes in almost every domain of life. Besides a computer, laptop, Desktop, even a Mobile Phones, I-Pad, IPod have the facility to use the Internet. With the Internet, life has become easier to get things done ...
متن کاملComparative Analysis and Implementation of Image Encryption Algorithms
Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication and storage of images. Image security has found a great need in many applications where the information (in the form of image) is to be protected from unauthorized access. Encryption is one of the ways to ensure high security. In recent years, encryption technology h...
متن کاملComparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey
Nowadays, network security is increasing rapidly and becoming an important and challenging issue. Information and internet security threats and attacks are becoming difficult to be detected. Therefore, encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. In this paper we implemented four encrypt ...
متن کاملComparative Analysis of Machine Learning Algorithms with Optimization Purposes
The field of optimization and machine learning are increasingly interplayed and optimization in different problems leads to the use of machine learning approaches. Machine learning algorithms work in reasonable computational time for specific classes of problems and have important role in extracting knowledge from large amount of data. In this paper, a methodology has been employed to opt...
متن کاملa comparative pragmatic analysis of the speech act of “disagreement” across english and persian
the speech act of disagreement has been one of the speech acts that has received the least attention in the field of pragmatics. this study investigates the ways power relations, social distance, formality of the context, gender, and language proficiency (for efl learners) influence disagreement and politeness strategies. the participants of the study were 200 male and female native persian s...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: European journal of technology
سال: 2023
ISSN: ['2520-0712']
DOI: https://doi.org/10.47672/ejt.1312