This research aims to investigate five different symmetric
algorithms: AES, DES, 3DES, Rijndael, and RC2. The primary objective is to
identify the most suitable algorithm for encrypting text files of varying sizes
and to promote a positive cryptographic culture for text file security.
Each algorithm is evaluated based on its performance in encrypting
and decrypting text files of different sizes, specifically 10 KB, 20 KB, 50 KB,
1 MB, 2 MB, and 5 MB. The study focuses on measuring the time duration each algorithm
requires for these processes. While numerous encryption algorithms can secure
computerized information across different organizations, the time efficiency of
each algorithm varies with the size of the text file. Some algorithms perform
optimally for small files, while others are more suitable for larger files.
In this study, five symmetric algorithms are integrated into a
single program using object-oriented programming concepts such as classes and
inheritance. The program automatically selects the appropriate encryption
algorithm based on the size of the text file to be encrypted. The file size
remains stable before and after encryption, ensuring the same process is
applied during decryption. The encryption and decryption code is developed
using Visual Studio 2013, and the results are analyzed using the R programming
language.
The encrypted text, or ciphertext, is represented in UTF-8 format,
where "UTF-8" stands for Unicode Transformation Format, with
"8" indicating that each character is represented by 8 bits. The file
sizes are measured in kilobytes (KB). The performance analysis prioritizes
smaller text files and arranges the algorithms in ascending order of their
suitability: AES, 3DES, DES, RC2, and Rijndael. AES is found to be most
effective for small text files, while Rijndael is more suitable for larger text
files.
Author
(s) Details
Allajabu
Dafalla Khamis
College of Computer and Information Science, Faculty of Graduate
Studies, Alzaem Alazhari University, Khartoum, Sudan.
Saad
Subair
College of Computer Studies, International University of Africa,
Khartoum, Sudan.
Please see the book here:- https://doi.org/10.9734/bpi/mcscd/v4/1704
No comments:
Post a Comment