Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms
Keywords:network data, encryption, data encryption standard, advanced encryption standard
The involvement of the Internet in the production of daily life has increased the demand for the security of private data on the Internet. This paper briefly introduced the principles of advanced encryption standard (AES) and data encryption standard (DES) algorithms and then conducted simulation experiments on the two encryption algorithms in a laboratory server. The results showed that both algorithms had excellent sensitivity to plaintext keys, and the sensitivity of the AES algorithm was higher; the encryption and decryption time of both algorithms increased as the file got larger, and the encryption and decryption time of the same algorithm was not much different; the encryption and decryption time of the AES algorithm was less than that of the DES algorithm for the same file, and the time taken to crack the AES-encrypted data by brute force was also much longer; during the transmission of encrypted data, as the data increased, the integrity of the ciphertext decryption by the third-party decreased, and the integrity of the AES algorithm-encrypted file was significantly smaller than that of the DES algorithm-encrypted file when it was decrypted.
Sawle P, and Baraskar T. Survey on Data Classification and Data Encryption Techniques Used in Cloud Computing. International Journal of Computer Applications, 135(12):35–40, 2016.
Kiran G M, and Nalini N. Enhanced security-aware technique and ontology data access control in cloud computing. International Journal of Communication Systems, 2020(23):e4554, 2020.
Teng L, Li H, Yin S, and Sun Y. A Modified Advanced Encryption Standard for Data Security. International Journal of Network Security, 22(1):112–117, 2020.
Mihret Z, and Ahmad M W. The Reverse Engineering of Reverse Encryption Algorithm and a Systematic Comparison to DES. Procedia Computer Science, 85:558–570, 2016.
Guo Z, Yang J, and Zhao Y. Double image multi-encryption algorithm based on fractional chaotic time series. Open Mathematics, 13(1):868–876, 2015.
Yoon M, Jang M, Shin Y S, and Chang J W. A Bitmap based Data Encryption Scheme in Cloud Computing. International Journal of Software Engineering & Its Applications, 9(5):345–360, 2015.
Xue S, and Ren C. Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment. Automatic Control and Computer Sciences, 53(4):342–350, 2019.
Koukou Y M, Othman S H, and Nkiama M. Comparative Study of AES, Blowfish, CAST-128 and DES Encryption Algorithm. IOSR Journal of Engineering, 06(6):01–07, 2016.
Lan Z L, Zhu L, Li Y C, and Liu J. A Color Image Encryption Algorithm Based on Improved DES. Applied Mechanics & Materials, 743:379–384, 2015.
Akbal E, Barua P D, Dogan S, Tuncer T, and Acharya UR. DesPatNet25: Data encryption standard cipher model for accurate automated construction site monitoring with sound signals. Expert Systems with Application, 193:1–10, 2022.
Jayaprakash J S, Balasubramanian K, Sulaiman R, Hasan M K, Parameshachari B D, and Iwendi C. Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method. Computer, Materials and Continuum (English), (7):519–534, 2022.
Nasution A B, Efendi S, and Suwilo S. Image Steganography In Securing Sound File Using Arithmetic Coding Algorithm, Triple Data Encryption Standard (3DES) and Modified Least Significant Bit (MLSB). Journal of Physics Conference, 1007:012010–, 2018.
Eltayeb G. Combination of the “Data Encryption Standard” algorithm (DES) and the ’Pub-lickey encryption’ algorithm (RSA) on the keygeneration stage. International Journal of Emerging Trends & Technology in Computer Science, 4(4):1–3, 2015.
Banushri A, and Karthika R A. A Survey on Data Security Using File Hierarchy Attribute-Based Encryption in Cloud Computing Environment. Journal of Advanced Research in Dynamical & Control Systems, 2017(4):144–149, 2017.
Teng L, Li H, Yin S, Sun Y. A Modified Advanced Encryption Standard for Data Security. International Journal of Network Security, 22(1):112–117, 2020.
More P R, and Gaikwad S Y. An Advanced Mechanism for Secure Data Sharing in Cloud Computing using Revocable Storage Identity Based Encryption. International Journal of Engineering Business Management, 1(1):12–14, 2017.
Paka T, and Divya S. Data Storage Security and Privacy in Mobile Cloud Computing Using Hierarchical Attribute Based Encryption (HABE). International Journal of Computer Sciences and Engineering, 7(6):750–754, 2019.
Alshammari A S. A Novel Cryptosystem based on Chaotic Signals for Data Encryption Applications and CDMA Communication System. Przeglad Elektrotechniczny, 98(2):10–13, 2022.
Kulshrestha V, Verma S, and Krishna C R. Hybrid probabilistic triple encryption approach for data security in cloud computing. International Journal of Advanced Intelligence Paradigms, 21(1/2):158–173, 2022.
How to Cite
Copyright (c) 2022 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.