Performance Analysis of Des And Rsa Suitability for Different System : Current School News

Performance Analysis of Des And Rsa Suitability for Different System Applications

ADS! Download JAMB CBT Software Now for FREE!

Performance Analysis of Des And Rsa Suitability for Different System Applications.

Abstract

This work is based on performance Analysis of DES and RSA suitability for different system applications. The rationale behind the work was to find out how suitable DES (Data Encryption Standard) and RSA (Rivest, Shamir and Adlemen) are for different application systems under different systems requirements.

In order to achieve these objectives, an application that implements DES and RSA was developed using object oriented analysis and design (OOAD) approach, and was implemented in java programming language.

The application was used to encrypt and decrypt different file sizes for DES and RSA. The Encryption Execution Time (EET) and Decryption Execution Time (DET) were taken, and throughput was calculated.

Also, other parameters like security strength and memory consumption of the two algorithms were gotten from the works reviewed.

The work went further to make a comparison based on EET and DET of DES and RSA using generated data. Also, power consumption, memory usage, and security strength of the two algorithms were compared.

The result of the analysis shows that DES is faster than RSA, consumes low power than RSA, takes less memory than RSA but weaker in security.

While RSA is stronger in security than DES, slower compare to DES, and consumes more power and memory than DES.

Therefore DES was judged suitable for applications where speed takes higher priority than security and other requirement while RSA is more suitable for applications where system security takes higher priority than other requirements.

Introduction

Background Of Study

In our society today, we depend on Information Technology (IT) and this dependency is continuously growing. Further existence and successful development of society without computerized infrastructure is not feasible.

On the other hand, due to the use of advanced information technologies, the society has become more and more vulnerable.

The failure or misuse of information technology can negatively influence not only a single organization, but can afflict a large number of people too.

Therefore, information security has emerged as one of the most important requirements or preconditions of the information age.

When a message is sent across an insecure network, it is most likely to pass through a number of machines on the way [1]. Any of these machines is capable of reading and recording the message for further use, and this do not portray privacy

[2]. In reality, people would prefer to have their message(s) concealed, so that they will be able to send a message that should be read only by the intended recipient.

The quest for privacy has motivated researchers and system developers to adopt the techniques of cryptography and intensive study of these two mostly used cryptographic algorithms:

Data Encryption Standard (DES) and Rivest-Shamir-Adleman (RSA), nevertheless, these algorithms have their strength and weakness which them suitable or not to a particular information exchange.

For every system, there are basic priorities or requirements that the developer wants the system to satisfy; it might be speed of processing, security of the data, small memory consumption or others.

References

Hindocha, & E. Chien, “Malicious threats and vulnerabilities in instant Messaging”. Virus Bulletin Conference, vb2003, 2003.

O. Asagba, and E. O. Nwachukwu, “A Review of RSA Cryptosystems and Cryptographic Protocols”. West African Journal of Industrial and Academic Research, vol 10, Num.1, pp 3-16, 2014

Alanazi, B. B. Zaidan, A. A. Zaidan , H. A Jalab, M. Shabbir, & Y. Al- Nabhani, “New comparative study between DES, 3DES and AES within nine factors” arXiv preprint arXiv:1003.4085. 2010

L. Capron,    Computers:    Tools    for    an    information     age,    USA:           The Benjamin/Cummings Publishing Coy. Inc, 1990.

CERT “Home Network Security. Pittsburgh”. Blog. Retrieved from retieved http://www.cert.org/tech_tips/home_networks.html , 2001

Casad, D. Newland, “MCSE, MCT; MSCE Training Guide: networking essentials”. USA: New Riders Publishing. 1997.

Join Over 5 Million Subscribers Today!


=> FOLLOW US ON INSTAGRAM | FACEBOOK & TWITTER FOR LATEST UPDATE

Tags: , , , , , , ,

Comments are closed.

%d bloggers like this: