Comparative Analysis of AES and RSA with Other Encryption Techniques for Secure Communication

Authors

  • Prashant School of Computer Science and Engineering, Lovely Professional University Phagwara, Punjab, India Author
  • Md Sohail Haque School of Computer Science and Engineering, Lovely Professional University Phagwara, Punjab, India Author
  • Amrinder Kaur School of Computer Science and Engineering, Lovely Professional University Phagwara, Punjab, India Author
  • Pankaj Yadav Assistant Professor, School of Computer Science and Engineering, Lovely Professional University Phagwara, Punjab, India Author

DOI:

https://doi.org/10.32628/CSEIT2410263

Keywords:

Encryption, Advanced Encryption Standard , Rivest-Shamir-Adleman, Secure Communication, Comparative Analysis, Key Management, Computational Complexity, Scalability

Abstract

In today’s digitized era, where the whole world is interconnected and every information about individuals are collected, it is important to process and store the data such that it is safe from unauthorized access. Encryption is used to turn the plain text into cipher text which makes the data unreadable, thus maintaining its confidentiality and integrity. Among the several encryption methods available, Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) are popularly used due to their effectiveness and efficiency. However, alternative encryption techniques exist, each offers different level of security and performance. This study presents a thorough comparative analysis of AES and RSA alongside other encryption methods to assess their suitability for secure communication. Factors such as encryption strength, computational complexity, key management, scalability, and versatility are examined to provide a comprehensive understanding of each technique's strengths and weaknesses. By scrutinizing these aspects, this research aims to offer insights for decision-makers in selecting the most suitable encryption method tailored to specific requirements and constraints.

Downloads

Download data is not yet available.

References

Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES - the Advanced Encryption Standard. Springer Science & Business Media.

Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.

Bernstein, D. J. (2007). The ChaCha stream cipher. In New Stream Cipher Designs (pp. 90-171). Springer, Berlin, Heidelberg.

Schneier, B. (1994). Description of a new variable-length key, 64-bit block cipher (Blowfish). In Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg. DOI: https://doi.org/10.1007/3-540-58108-1_24

Lange, T., & Bernstein, D. J. (2006). Faster addition and doubling on elliptic curves. In Advances in Cryptology-EUROCRYPT 2006 (pp. 29-50). Springer, Berlin, Heidelberg. DOI: https://doi.org/10.1007/978-3-540-76900-2_3

Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information -Theory, 22(6), 644-654. DOI: https://doi.org/10.1109/TIT.1976.1055638

National Institute of Standards and Technology (NIST). (2001). FIPS PUB 197: Advanced Encryption Standard (AES). Retrieved from https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf

National Institute of Standards and Technology (NIST). (2016). FIPS PUB 186-4: Digital Signature Standard (DSS). Retrieved from https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf

Ducas, L., Durmus, A., Lepoint, T., Lyubashevsky, V., Schwabe, P., & Seiler, G. (2019). Lattice Signatures and Bimodal Gaussians. In Advances in Cryptology–CRYPTO 2019 (pp. 537-566). Springer, Cham.

National Institute of Standards and Technology (NIST). (2019). NISTIR 8105: Report on Post-Quantum Cryptography. Retrieved from https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8105.pdf

Rogaway, P. (2011). The sponge construction. In Fast Software Encryption (pp. 443-457). Springer, Berlin, Heidelberg.

Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES - the Advanced Encryption Standard. Springer Science & Business Media. DOI: https://doi.org/10.1007/978-3-662-04722-4_1

Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126. DOI: https://doi.org/10.1145/359340.359342

Morteza SaberiKamarposhti, Amirabbas Ghorbani, Mehdi Yadollahi. "A comprehensive survey on image encryption: Taxonomy, challenges, and futuredirections", Chaos, Solitons & Fractals, 2024 DOI: https://doi.org/10.1016/j.chaos.2023.114361

Downloads

Published

19-04-2024

Issue

Section

Research Articles

Similar Articles

1-10 of 406

You may also start an advanced similarity search for this article.