Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC
Volume 9, Issue 3, Page No 83-91, 2024
Author’s Name:
Rebwar Khalid Muhammed 1, Kamaran Hama Ali Faraj 2,3, Jaza Faiq Gul-Mohammed 4, Tara Nawzad Ahmad Al Attar 2, Shaida Jumaah Saydah 5, Dlsoz Abdalkarim Rashid 2
View Affiliations
1Computer Science Institute, Sulaimani Polytechnic University, Sulaimani, Kurdistan Region, Iraq
2Department of Computer Science, University of Sulaimani, Sulaimani, Kurdistan Region, Iraq
3Department of Computer, Collage of Engineering and Computer Science, Lebanse Frence University, Erbil, Iraq
4Department of Computer Engineering University of Sulaimani, Sulaimani, Kurdistan Region, Iraq
5Ministry of education, Kirkuk Education Department of Kurdish Studies, Hawazen Preparatory School for Girls, Kirkuk, Iraq
a)whom correspondence should be addressed. E-mail: rebwar.khalid@spu.edu.iq
Adv. Sci. Technol. Eng. Syst. J. 9(3), 83-91(2024); DOI: 10.25046/aj090308
Keywords: Hybrid AES-RSA, Hybrid AES-ECC, Hybrid AES- ElGamal
Export Citations
Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and the cloud computing that suggestively increased our data every in milliseconds unit. This performance analysis by two factors namely Encryption , Decryption and throughput time of three Hybrid Encryption schemes namely; Hybrid AES-RSA, Hybrid AES-ECC, and Hybrid AES-ElGamal which are based on Encryption and Decryption times by milliseconds unit in the form of throughput. The results evaluation show clear distinctions schemes capabilities such as; Encryption and Decryption as well as throughput time consume. Nevertheless, the Hybrid AES-RSA emerges as the fastest types. Both encryption and decryption outcome with superior throughput. Hybrid AES-ECC and Hybrid AES-ElGamal results are slower processing times and making them more suitable for scenarios where performance is not the primary concern. The choice between these schemes should consider not only performance but also security requirements and specific application required for testing and realize to select Hybrid AES-RSA due to better performance in milliseconds . the programing language for proposed system is JAVA, this mean that all testing is by JAVA and discover that the Hybrid AES-RSA is better in performance. The security proposed is Hybrid AES-RSA for automated recruitment system is best.
Received: 24 February 2024, Revised: 17 May 2024, Accepted: 18 May 2024, Published Online: 22 June 2024
- P. Patil and R. Bansode, “Performance Evaluation of Hybrid Cryptography Algorithm for Secure Sharing of Text & Images,” International Research Journal of Engineering and Technology, 2020, [Online]. Available: www.irjet.net
- K. H. A. Faraj, A. B. Kanbar, J. Gul-Mohammed, W. M. Hmeed, and S. F. Karim, “Cloud Computing Loading Time Over Different Operating Systems,” Science Journal of University of Zakho, 8(4):154–159, 2020, DOI: https://doi.org/10.25271/sjuoz.2020.8.4.756
- Z. C. Oleiwi, W. A. Alawsi, W. C. Alisawi, A. S. Alfoudi, and L. H. Alfarhani, “Overview and Performance Analysis of Encryption Algorithms,” J. Phys. Conf. Ser., 1664(1), 2020, DOI: https://doi.org/10.1088/1742-6596/1664/1/012051
- P. Chinnasamy, S. Padmavathi, R. Swathy, and S. Rakesh, “Efficient Data Security Using Hybrid Cryptography on Cloud Computing,” Lect. Notes Networks Syst., 145(September):537–547, 2021, DOI: https://doi.org/10.1007/978-981-15-7345-3_46
- F. Maqsood, M. Ahmed, M. M. Ali, and M. A. Shah, “Cryptography: A Comparative Analysis for Modern Techniques,” Int. J. Adv. Comput. Sci. Appl., 8(6):442-448, 2017, DOI: https://doi.org/10.14569/IJACSA.2017.080659
- P. Verma, J. Shekhar, P. Preety, and A. Asthana, “A Survey for Performance Analysis Various Cryptography Techniques Digital Contents,” International Journal of Computer Science and Mobile Computing, 4(1):522–531, 2015
- N. Bisht and S. Singh, “A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms,” International Journal of Innovative Research in Science, Engineering and Technology, 4(3):1028-1031, 2015, DOI: https://doi.org/10.15680/IJIRSET.2015.0403043
- S. Chandra and S. Paira, “A Comparative Survey of Symmetric and Asymmetric Key Cryptography,” in 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE), 2014, pp. 1-4, DOI: https://doi.org/10.1109/ICECCE.2014.7086640
- P. Kuppuswamy and S. Q. Y. Al-Khalidi, “Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm,” Manage. Inf. Syst. Rev., 19(2):1-13, 2014, DOI: https://doi.org/10.6131/MISR.2014.1902.01
- P. Verma, P. Guha, and S. Mishra, “Comparative Study of Different Cryptographic Algorithms,” Int. J. Emerg. Trends Technol. Comput. Sci., 5(2):58-63, 2016
- R. Harkanson and Y. Kim, “Applications of Elliptic Curve Cryptography: A Light Introduction to Elliptic Curves and a Survey of Their Applications,” in 12th Annual Cyber and Information Security Research Conference, USA, 2017, pp. 1-7
- K. Keerthi and B. Surendiran, “Elliptic Curve Cryptography for Secured Text Encryption,” in International Conference on Circuits Power and Computing Technologies, India, 2017
- S. C. Iyer, R. R. Sedamkar, and S. Gupta, “A Novel Idea on Multimedia Encryption Using Hybrid Crypto Approach,” in 7th International Conference on Communication, Computing and Virtualization, 2016, 79:293-298
- S. C. Iyer, R. R. Sedamkar, and S. Gupta, “An Efficient Multimedia Encryption Using Hybrid Crypto Approaches,” Int. J. Recent Trends Eng. Res., 2:442-452, 2016
- S. Sharma and V. Chopra, “Analysis of AES Encryption with ECC,” in Proceedings of International Interdisciplinary Conference On Engineering Science & Management, 2016, pp. 195
- D. Ameta and S. Upadhyay, “A Hybrid Approach for Image Encryption Using Different Number Iterations in ECC and AES Techniques,” Int. J. Comput. Appl., 175(3), 2017, DOI: https://doi.org/10.5120/ijca2017915469
- N. Mathura and R. Bansode, “AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection,” in Proc. 7th Int. Conf. Commun., Comput., Virtualization, 2016, pp. 131-135, DOI: https://doi.org/10.1016/j.procs.2016.03.131
- F. Yousif, “Encryption and Decryption of Audio Signal Based on RSA Algorithm,” Int. J. Eng. Technol. Manage. Res., 5(7):259-264, 2018, DOI: https://doi.org/10.29121/ijetmr.v5.i7.2018.259
- O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. Al-Din Abed, and A. T. Hammid, “Implementation of El-Gamal Algorithm for Speech Signals Encryption and Decryption,” Procedia Comput. Sci., 167:1028–1037, 2020, DOI: https://doi.org/10.1016/j.procs.2020.03.402
No. of Downloads Per Month