Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC

Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC

Volume 9, Issue 3, Page No 83-91, 2024

Author’s Name:  Rebwar Khalid Muhammed ¹,  Kamaran Hama Ali Farj ², Jaza Faiq Gul-Mohammed ³,  Tara Nawzad Ahmad Al Attar ², Shaida Jumaah Saydah 4,  Dlsoz Abdalkarim Rashid ²

View Affiliations

¹ Computer Science Institute, Sulaimani Polytechnic University , Sulaimani, Kurdistan Region, Iraq
² Department of Computer Science, University of Sulaimani, Sulaimani, Kurdistan Region, 46001, Iraq
² Department of Computer, Collage of Engineering and Computer Science, Lebanse Frence University, Erbil, 46001, Iraq ,
³ Department of Computer Engineering University of Sulaimani, Sulaimani, Kurdistan Region, 46001, Iraq
4 Ministry of education, Kirkuk Education Department of Kurdish Studies, Hawazen Preparatory School for Girls, Kirkuk, 46001, Iraq

a)whom correspondence should be addressed. E-mail: rebwar.khalid@spu.edu.iq

Adv. Sci. Technol. Eng. Syst. J. 9(3), 83-91(2024); a  DOI: 10.25046/aj090308

Keywords: Hybrid AES-RSA, Hybrid AES-ECC, Hybrid AES- ElGamal

Share

23 Downloads

Export Citations

Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and the cloud computing that suggestively increased our data every in milliseconds unit. This performance analysis by two factors namely Encryption , Decryption and throughput time of three Hybrid Encryption schemes namely; Hybrid AES-RSA, Hybrid AES-ECC, and Hybrid AES-ElGamal which are based on Encryption and Decryption times by milliseconds unit in the form of throughput. The results evaluation show clear distinctions schemes capabilities such as; Encryption and Decryption as well as throughput time consume. Nevertheless, the Hybrid AES-RSA emerges as the fastest types. Both encryption and decryption outcome with superior throughput. Hybrid AES-ECC and Hybrid AES-ElGamal results are slower processing times and making them more suitable for scenarios where performance is not the primary concern. The choice between these schemes should consider not only performance but also security requirements and specific application required for testing and realize to select Hybrid AES-RSA due to better performance in milliseconds . the programing language for proposed system is JAVA, this mean that all testing is by JAVA and discover that the Hybrid AES-RSA is better in performance. The security proposed is Hybrid AES-RSA for automated recruitment system is best.

Received: 24 February, 2024,  Revised: 17 May, 2024, Accepted: 18 May, 2024, Published Online: 22 June, 2024

  1. P. Patil and R. Bansode, “Performance Evaluation of Hybrid Cryptography Algorithm for Secure Sharing of Text & Images,” International Research Journal of Engineering and Technology, 2020, [Online]. Available: www.irjet.net
  2. K. H. A. Faraj, A. B. Kanbar, J. Gul-Mohammed, W. M. Hmeed, and S. F. Karim, “Cloud Computing Loading Time Over Different Operating Systems,” Science Journal of University of Zakho, 8(4):154–159, 2020, DOI: https://doi.org/10.25271/sjuoz.2020.8.4.756
  3. Z. C. Oleiwi, W. A. Alawsi, W. C. Alisawi, A. S. Alfoudi, and L. H. Alfarhani, “Overview and Performance Analysis of Encryption Algorithms,” J. Phys. Conf. Ser., 1664(1), 2020, DOI: https://doi.org/10.1088/1742-6596/1664/1/012051
  4. P. Chinnasamy, S. Padmavathi, R. Swathy, and S. Rakesh, “Efficient Data Security Using Hybrid Cryptography on Cloud Computing,” Lect. Notes Networks Syst., 145(September):537–547, 2021, DOI: https://doi.org/10.1007/978-981-15-7345-3_46
  5. F. Maqsood, M. Ahmed, M. M. Ali, and M. A. Shah, “Cryptography: A Comparative Analysis for Modern Techniques,” Int. J. Adv. Comput. Sci. Appl., 8(6):442-448, 2017, DOI: https://doi.org/10.14569/IJACSA.2017.080659
  6. P. Verma, J. Shekhar, P. Preety, and A. Asthana, “A Survey for Performance Analysis Various Cryptography Techniques Digital Contents,” International Journal of Computer Science and Mobile Computing, 4(1):522–531, 2015
  7. N. Bisht and S. Singh, “A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms,” International Journal of Innovative Research in Science, Engineering and Technology, 4(3):1028-1031, 2015, DOI: https://doi.org/10.15680/IJIRSET.2015.0403043
  8. S. Chandra and S. Paira, “A Comparative Survey of Symmetric and Asymmetric Key Cryptography,” in 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE), 2014, pp. 1-4, DOI: https://doi.org/10.1109/ICECCE.2014.7086640
  9. P. Kuppuswamy and S. Q. Y. Al-Khalidi, “Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm,” Manage. Inf. Syst. Rev., 19(2):1-13, 2014, DOI: https://doi.org/10.6131/MISR.2014.1902.01
  10. P. Verma, P. Guha, and S. Mishra, “Comparative Study of Different Cryptographic Algorithms,” Int. J. Emerg. Trends Technol. Comput. Sci., 5(2):58-63, 2016
  11. R. Harkanson and Y. Kim, “Applications of Elliptic Curve Cryptography: A Light Introduction to Elliptic Curves and a Survey of Their Applications,” in 12th Annual Cyber and Information Security Research Conference, USA, 2017, pp. 1-7
  12. K. Keerthi and B. Surendiran, “Elliptic Curve Cryptography for Secured Text Encryption,” in International Conference on Circuits Power and Computing Technologies, India, 2017
  13. S. C. Iyer, R. R. Sedamkar, and S. Gupta, “A Novel Idea on Multimedia Encryption Using Hybrid Crypto Approach,” in 7th International Conference on Communication, Computing and Virtualization, 2016, 79:293-298
  14. S. C. Iyer, R. R. Sedamkar, and S. Gupta, “An Efficient Multimedia Encryption Using Hybrid Crypto Approaches,” Int. J. Recent Trends Eng. Res., 2:442-452, 2016
  15. S. Sharma and V. Chopra, “Analysis of AES Encryption with ECC,” in Proceedings of International Interdisciplinary Conference On Engineering Science & Management, 2016, pp. 195
  16. D. Ameta and S. Upadhyay, “A Hybrid Approach for Image Encryption Using Different Number Iterations in ECC and AES Techniques,” Int. J. Comput. Appl., 175(3), 2017, DOI: https://doi.org/10.5120/ijca2017915469
  17. N. Mathura and R. Bansode, “AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection,” in Proc. 7th Int. Conf. Commun., Comput., Virtualization, 2016, pp. 131-135, DOI: https://doi.org/10.1016/j.procs.2016.03.131
  18. F. Yousif, “Encryption and Decryption of Audio Signal Based on RSA Algorithm,” Int. J. Eng. Technol. Manage. Res., 5(7):259-264, 2018, DOI: https://doi.org/10.29121/ijetmr.v5.i7.2018.259
  19. O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. Al-Din Abed, and A. T. Hammid, “Implementation of El-Gamal Algorithm for Speech Signals Encryption and Decryption,” Procedia Comput. Sci., 167:1028–1037, 2020, DOI: https://doi.org/10.1016/j.procs.2020.03.402

Citations by Dimensions

Citations by PlumX

Crossref Citations

This paper is currently not cited.

No. of Downloads Per Month

No. of Downloads Per Country