Measuring the Efficiency of Symmetric Encryption using RC4 DES, Triple-DES, AES128-ECB, AES192-ECB, and AES256-ECB Algorithms

Main Article Content

นงลักษณ์ พรมทอง

Abstract

The encryption has been widely recognized and for security of data communication. There are different types of symmetric encryption. This study aims to measure the time efficiency of symmetric encryption of various algorithms, including RC4 DES, Triple-DES, AES128-ECB, AES192-ECB, and AES256-ECB. The experiment used OpenSSL software with data of 1 KB, 4 KB, 16 KB, 256 KB, 1 MB, 4 MB, 16 MB, 64, MB, and 256 MB. Each data have 30 files. Results found that the Triple-DES algorithm utilized the maximum time and followed by DES, RC4, and AES algorithms, respectively. For AES algorithm, the increased number of keys effected less time.

Article Details

How to Cite
พรมทอง น. (2018). Measuring the Efficiency of Symmetric Encryption using RC4 DES, Triple-DES, AES128-ECB, AES192-ECB, and AES256-ECB Algorithms. NKRAFA JOURNAL OF SCIENCE AND TECHNOLOGY, 12, 82–89. Retrieved from https://ph02.tci-thaijo.org/index.php/nkrafa-sct/article/view/155071
Section
Research Articles

References

[1] บรรจง หะรังษี. ความรู้เบื้องต้นของการเข้ารหัสข้อมูล. ศูนย์ประสานงานการรักษาความปลอดภัยคอมพิวเตอร์ ประเทศไทย.2547
www.inetsecurity.com/content_attack/ crypt_basicknowledge.php สืบค้นเมื่อ 26 กันยายน 2559.

[2] บุญเรือง ศรีเหรัญ. การเลือกใช้สถิติในงานวิจัย. วารสารเพชรบุรีวิทยาลงกรณ์. มหาวิทยาลัยราชภัฏวไลยอลงกรณ์: 28-29, 2542.

[3] Raymond R. Panko. Corporate Computer and Network Security. Prentice-Hall, 2004.

[4] StrackExchange 2012. How does wep wireless security works? http://security.stackexchange.com/ questions/17434/how-does-wep-wireless-security-work [Accessed on 10 Dec 2013].

[5] Encryption 2012: http://www.sm.luth.se/ csee/courses/smd/102/lek3/lek3.html [Accessed on 11 Dec 2013].

[6] Measurement-based research on cryptographic algorithms for embedded real-time systems: http://www.tnetsecurity.com/ content_attack/crypt_basicknowledge.php [Accessed on 11 Dec 2013].

[7] Neil Coffey 2012: http://www.javamex.com/ tutorials/ cryptography/ ciphers.shtml [Accessed on 9 Dec 2013].

[8] W. Jiang, Z. Guo, Y. Ma, and N. Sang. Measurement-based research on cryptographic algorithms for embedded real-time system. Journal of Systems Architecture, 59: 1394-1404, 2013.

[9] E.Michael Whitman. Information Security Lab Manual. 2nd Edition. Thomson, 2006.