Comparative Analysis of AES and RSA with Other Encryption Techniques for Secure Communication
DOI:
https://doi.org/10.32628/CSEIT2410263Keywords:
Encryption, Advanced Encryption Standard , Rivest-Shamir-Adleman, Secure Communication, Comparative Analysis, Key Management, Computational Complexity, ScalabilityAbstract
In today’s digitized era, where the whole world is interconnected and every information about individuals are collected, it is important to process and store the data such that it is safe from unauthorized access. Encryption is used to turn the plain text into cipher text which makes the data unreadable, thus maintaining its confidentiality and integrity. Among the several encryption methods available, Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) are popularly used due to their effectiveness and efficiency. However, alternative encryption techniques exist, each offers different level of security and performance. This study presents a thorough comparative analysis of AES and RSA alongside other encryption methods to assess their suitability for secure communication. Factors such as encryption strength, computational complexity, key management, scalability, and versatility are examined to provide a comprehensive understanding of each technique's strengths and weaknesses. By scrutinizing these aspects, this research aims to offer insights for decision-makers in selecting the most suitable encryption method tailored to specific requirements and constraints.
Downloads
References
Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES - the Advanced Encryption Standard. Springer Science & Business Media.
Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.
Bernstein, D. J. (2007). The ChaCha stream cipher. In New Stream Cipher Designs (pp. 90-171). Springer, Berlin, Heidelberg.
Schneier, B. (1994). Description of a new variable-length key, 64-bit block cipher (Blowfish). In Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg.
Lange, T., & Bernstein, D. J. (2006). Faster addition and doubling on elliptic curves. In Advances in Cryptology-EUROCRYPT 2006 (pp. 29-50). Springer, Berlin, Heidelberg.
Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information -Theory, 22(6), 644-654.
National Institute of Standards and Technology (NIST). (2001). FIPS PUB 197: Advanced Encryption Standard (AES). Retrieved from https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf
National Institute of Standards and Technology (NIST). (2016). FIPS PUB 186-4: Digital Signature Standard (DSS). Retrieved from https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
Ducas, L., Durmus, A., Lepoint, T., Lyubashevsky, V., Schwabe, P., & Seiler, G. (2019). Lattice Signatures and Bimodal Gaussians. In Advances in Cryptology–CRYPTO 2019 (pp. 537-566). Springer, Cham.
National Institute of Standards and Technology (NIST). (2019). NISTIR 8105: Report on Post-Quantum Cryptography. Retrieved from https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8105.pdf
Rogaway, P. (2011). The sponge construction. In Fast Software Encryption (pp. 443-457). Springer, Berlin, Heidelberg.
Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES - the Advanced Encryption Standard. Springer Science & Business Media.
Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.
Morteza SaberiKamarposhti, Amirabbas Ghorbani, Mehdi Yadollahi. "A comprehensive survey on image encryption: Taxonomy, challenges, and futuredirections", Chaos, Solitons & Fractals, 2024
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.