2019
DOI: 10.11591/ijeecs.v16.i2.pp988-994
|View full text |Cite
|
Sign up to set email alerts
|

Time performance analysis of advanced encryption standard and data encryption standard in data security transaction

Abstract: The advancement of the data communication technologies has increased the traffic of data exchange over the internet and at the same time created the opportunity of data attack by various party.  This paper present  Time Performance Analysis Of Advanced Encryption Standard And Data Encryption Standard  in Data Security Transaction<strong>. </strong>In this study we proposed an AES algorithm with  different key size, and different file format. Our aim is to safely to transfer the file for using the A… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 15 publications
(13 reference statements)
0
4
0
Order By: Relevance
“…Mining refers to the process of adding a new block (transaction) to the blockchain. Miners (individual network nodes) create blocks with authorized transactions and add them to the blockchain [25].…”
Section: Immutable Ledger (Blockchain)mentioning
confidence: 99%
“…Mining refers to the process of adding a new block (transaction) to the blockchain. Miners (individual network nodes) create blocks with authorized transactions and add them to the blockchain [25].…”
Section: Immutable Ledger (Blockchain)mentioning
confidence: 99%
“…On the other hand, the PSNR and SSIM decryption process can be used to measure the perfection of the image decryption process, where the PSNR and SSIM values are infinity and 1 respectively, to get the perfect image decryption. PSNR can be calculated by (6), whereas SSIM can be calculated by (7). ; is a dynamic range (2 − 1) with the default value 1 = 0.01 and 2 = 0.03.…”
Section: Psnr and Ssimmentioning
confidence: 99%
“…At present, many cryptographic algorithms can be used to secure digital files. However, along with the times, cryptographic algorithms must also be developed and maintained to provide better security [5][6][7][8][9]. Cryptographic algorithms that are widely implemented in digital files are AES, DES, RC4, OTP, RSA, and Chaotic Map [4,5,8,[10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…The AES method that uses a block cipher system can perform symmetric key encoding Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  operations with the operating mode. In addition, AES has advantages in security, speed, and characteristics of the algorithm and its implementation [3], [9]- [14].…”
Section: Introductionmentioning
confidence: 99%