Main Article Content
The encryption has been widely recognized and for security of data communication. There are different types of symmetric encryption. This study aims to measure the time efficiency of symmetric encryption of various algorithms, including RC4 DES, Triple-DES, AES128-ECB, AES192-ECB, and AES256-ECB. The experiment used OpenSSL software with data of 1 KB, 4 KB, 16 KB, 256 KB, 1 MB, 4 MB, 16 MB, 64, MB, and 256 MB. Each data have 30 files. Results found that the Triple-DES algorithm utilized the maximum time and followed by DES, RC4, and AES algorithms, respectively. For AES algorithm, the increased number of keys effected less time.
- Content and information in articles published in NKRAFA Journal of Science and Technology are comment and responsibility of authors of articles directly. Journal editorial do no need to agree or share any responsibility.
- NKRAFA Journal of Science and Technology Articles holds the copyright of the content, pictures, images etc. which published in it. If any person or agency require to reuse all or some part of articles, the permission must be obtained from the NKRAFA Journal of Science and Technology.
www.inetsecurity.com/content_attack/ crypt_basicknowledge.php สืบค้นเมื่อ 26 กันยายน 2559.
 บุญเรือง ศรีเหรัญ. การเลือกใช้สถิติในงานวิจัย. วารสารเพชรบุรีวิทยาลงกรณ์. มหาวิทยาลัยราชภัฏวไลยอลงกรณ์: 28-29, 2542.
 Raymond R. Panko. Corporate Computer and Network Security. Prentice-Hall, 2004.
 StrackExchange 2012. How does wep wireless security works? http://security.stackexchange.com/ questions/17434/how-does-wep-wireless-security-work [Accessed on 10 Dec 2013].
 Encryption 2012: http://www.sm.luth.se/ csee/courses/smd/102/lek3/lek3.html [Accessed on 11 Dec 2013].
 Measurement-based research on cryptographic algorithms for embedded real-time systems: http://www.tnetsecurity.com/ content_attack/crypt_basicknowledge.php [Accessed on 11 Dec 2013].
 Neil Coffey 2012: http://www.javamex.com/ tutorials/ cryptography/ ciphers.shtml [Accessed on 9 Dec 2013].
 W. Jiang, Z. Guo, Y. Ma, and N. Sang. Measurement-based research on cryptographic algorithms for embedded real-time system. Journal of Systems Architecture, 59: 1394-1404, 2013.
 E.Michael Whitman. Information Security Lab Manual. 2nd Edition. Thomson, 2006.