Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms

Authors

  • Dongliang Bian Department of Computer Information Engineering, Baoding Vocational and Technical College, Baoding 071000, Hebei, China
  • Jun Pan Department of Computer Information Engineering, Baoding Vocational and Technical College, Baoding 071000, Hebei, China
  • Yanhui Wang Department of Computer Information Engineering, Baoding Vocational and Technical College, Baoding 071000, Hebei, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1154

Keywords:

network data, encryption, data encryption standard, advanced encryption standard

Abstract

The involvement of the Internet in the production of daily life has increased the demand for the security of private data on the Internet. This paper briefly introduced the principles of advanced encryption standard (AES) and data encryption standard (DES) algorithms and then conducted simulation experiments on the two encryption algorithms in a laboratory server. The results showed that both algorithms had excellent sensitivity to plaintext keys, and the sensitivity of the AES algorithm was higher; the encryption and decryption time of both algorithms increased as the file got larger, and the encryption and decryption time of the same algorithm was not much different; the encryption and decryption time of the AES algorithm was less than that of the DES algorithm for the same file, and the time taken to crack the AES-encrypted data by brute force was also much longer; during the transmission of encrypted data, as the data increased, the integrity of the ciphertext decryption by the third-party decreased, and the integrity of the AES algorithm-encrypted file was significantly smaller than that of the DES algorithm-encrypted file when it was decrypted.

Downloads

Download data is not yet available.

Author Biographies

Dongliang Bian, Department of Computer Information Engineering, Baoding Vocational and Technical College, Baoding 071000, Hebei, China

Dongliang Bian, born in July 1977, in Baoding, Hebei Province, graduated from the school of economics, Hebei University, with a bachelor’s degree in 1998. He is now an associate professor of Baoding vocational and technical college. His research interests include vocational education and web front-end development. He has won the third prize in the provincial vocational college skills competition, published five academic papers, participated in one textbook of the 12th Five Year Plan, presided over and participated in two provincial and municipal projects.

Jun Pan, Department of Computer Information Engineering, Baoding Vocational and Technical College, Baoding 071000, Hebei, China

Jun Pan, born in November, 1981, in Baoding, Hebei Province, graduated from Hebei Agricultural University with a bachelor’s degree in computer science and technology in 2005 and obtained a master’s degree in engineering from Hebei University in 2011. He is now an associate professor of Baoding Vocational and Technical College and a special commissioner for science and technology in Hebei Province. He has obtained red hat RHCE certification and rhci certification as lecturer. His research interests are vocational education and computer network technology. He has guided students to participate in the national vocational college skills competition and won one second prize and two third prizes. He has published six academic papers, edited four textbooks, presided over two municipal projects, and participated in two provincial and municipal projects.

Yanhui Wang, Department of Computer Information Engineering, Baoding Vocational and Technical College, Baoding 071000, Hebei, China

Yanhui Wang, born in December, 1980, graduated from Hebei University with a master of Engineering in 2012, and is now an associate professor of Baoding Vocational and Technical College. His research interests are computer technology, vocational education, and e-commerce. He has published six academic papers, edited two textbooks, presided over three provincial and municipal projects, and won one third prize for provincial teaching achievements.

References

Sawle P, and Baraskar T. Survey on Data Classification and Data Encryption Techniques Used in Cloud Computing. International Journal of Computer Applications, 135(12):35–40, 2016.

Kiran G M, and Nalini N. Enhanced security-aware technique and ontology data access control in cloud computing. International Journal of Communication Systems, 2020(23):e4554, 2020.

Teng L, Li H, Yin S, and Sun Y. A Modified Advanced Encryption Standard for Data Security. International Journal of Network Security, 22(1):112–117, 2020.

Mihret Z, and Ahmad M W. The Reverse Engineering of Reverse Encryption Algorithm and a Systematic Comparison to DES. Procedia Computer Science, 85:558–570, 2016.

Guo Z, Yang J, and Zhao Y. Double image multi-encryption algorithm based on fractional chaotic time series. Open Mathematics, 13(1):868–876, 2015.

Yoon M, Jang M, Shin Y S, and Chang J W. A Bitmap based Data Encryption Scheme in Cloud Computing. International Journal of Software Engineering & Its Applications, 9(5):345–360, 2015.

Xue S, and Ren C. Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment. Automatic Control and Computer Sciences, 53(4):342–350, 2019.

Koukou Y M, Othman S H, and Nkiama M. Comparative Study of AES, Blowfish, CAST-128 and DES Encryption Algorithm. IOSR Journal of Engineering, 06(6):01–07, 2016.

Lan Z L, Zhu L, Li Y C, and Liu J. A Color Image Encryption Algorithm Based on Improved DES. Applied Mechanics & Materials, 743:379–384, 2015.

Akbal E, Barua P D, Dogan S, Tuncer T, and Acharya UR. DesPatNet25: Data encryption standard cipher model for accurate automated construction site monitoring with sound signals. Expert Systems with Application, 193:1–10, 2022.

Jayaprakash J S, Balasubramanian K, Sulaiman R, Hasan M K, Parameshachari B D, and Iwendi C. Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method. Computer, Materials and Continuum (English), (7):519–534, 2022.

Nasution A B, Efendi S, and Suwilo S. Image Steganography In Securing Sound File Using Arithmetic Coding Algorithm, Triple Data Encryption Standard (3DES) and Modified Least Significant Bit (MLSB). Journal of Physics Conference, 1007:012010–, 2018.

Eltayeb G. Combination of the “Data Encryption Standard” algorithm (DES) and the ’Pub-lickey encryption’ algorithm (RSA) on the keygeneration stage. International Journal of Emerging Trends & Technology in Computer Science, 4(4):1–3, 2015.

Banushri A, and Karthika R A. A Survey on Data Security Using File Hierarchy Attribute-Based Encryption in Cloud Computing Environment. Journal of Advanced Research in Dynamical & Control Systems, 2017(4):144–149, 2017.

Teng L, Li H, Yin S, Sun Y. A Modified Advanced Encryption Standard for Data Security. International Journal of Network Security, 22(1):112–117, 2020.

More P R, and Gaikwad S Y. An Advanced Mechanism for Secure Data Sharing in Cloud Computing using Revocable Storage Identity Based Encryption. International Journal of Engineering Business Management, 1(1):12–14, 2017.

Paka T, and Divya S. Data Storage Security and Privacy in Mobile Cloud Computing Using Hierarchical Attribute Based Encryption (HABE). International Journal of Computer Sciences and Engineering, 7(6):750–754, 2019.

Alshammari A S. A Novel Cryptosystem based on Chaotic Signals for Data Encryption Applications and CDMA Communication System. Przeglad Elektrotechniczny, 98(2):10–13, 2022.

Kulshrestha V, Verma S, and Krishna C R. Hybrid probabilistic triple encryption approach for data security in cloud computing. International Journal of Advanced Intelligence Paradigms, 21(1/2):158–173, 2022.

Downloads

Published

2022-12-03

How to Cite

1.
Bian D, Pan J, Wang Y. Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms. JCSANDM [Internet]. 2022 Dec. 3 [cited 2024 Nov. 20];11(05):713-26. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/18193

Issue

Section

Articles