Performance Analysis of Two Famous Cryptographic Algorithms on Mixed Data
- 1 Department of Computer Sciences, Precious Cornerstone University, Ibadan, Oyo State, Nigeria
- 2 PUCRID Center, SDG 9 (Industry, Innovation, and Infrastructure Research Group), Precious Cornerstone University, Ibadan, Oyo State, Nigeria
- 3 PUCRID Center, SDG 4 (Quality Education), Precious Cornerstone University, Ibadan, Oyo State, Nigeria
- 4 Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos 100213, Nigeria
- 5 Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, 44801 Bochum, Germany
- 6 Department of Computer Science, Faculty of Information and Communication Sciences, University of Ilorin, Ilorin 240003, Nigeria
- 7 Department of Library and Information Science, Fu Jen Catholic University, New Taipei City 24205, Taiwan
- 8 Department of Computer Science and Information Engineering, Asia University, Taichung City 41354, Taiwan
- 9 Department of Computer and Industrial Production Engineering, First Technical University, Ibadan, 200255, Nigeria
Abstract
The rapid development of digital data sharing has made information security a crucial concern in data communication. The information security system heavily relies on encryption methods. These algorithms employ strategies to increase data secrecy and privacy by obscuring the information, which only those parties who have the accompanying key can decode or decrypt. Nevertheless, these methods also use a lot of computational resources, including battery life, memory, and CPU time. So, to determine the optimal algorithm to utilize moving forward, it is necessary to assess the performance of various cryptographic algorithms. Therefore, this study evaluates two well-known cryptographies (RSA and ElGamal) using mixed data such as binary, text, and image files. CPU internal clock was used to obtain the time complexity used by both algorithms during encryption and decryption. The algorithms used CPU internal memory to obtain memory usage during the encryption and decryption of mixed data. Evaluation criteria such as encryption time, decryption time, and throughput were used to compare these encryption algorithms. The response time, confidentiality, bandwidth, and integrity are all factors in the cryptography approach. The results revealed that RSA is a time-efficient and resourceful model, while the ElGamal algorithm is a memory-efficient and resourceful model.
DOI: https://doi.org/10.3844/jcssp.2023.694.706
Copyright: © 2023 Emmanuel Abidemi Adeniyi, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, Peace Falola, Rasheed Gbenga Jimoh and Sunday Adeola Ajagbe. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 1,860 Views
- 1,204 Downloads
- 0 Citations
Download
Keywords
- Cryptographic Algorithms
- Asymmetric Encryption
- RSA
- ElGamal
- Complexity