A text security evaluation based on advanced encryption standard algorithm
Main Article Content
Abstract
This research approach analysis and examines a number of advanced encryption standard (AES) performance factors, including as encryption and decryption speed, processing resource, consumption, and resilience, to cryptanalysis attacks. The study’s findings demonstrate that AES is successful in providing high-level data security, particularly when used in the CBC (Cipher Block Chaining) operating mode. Performance is dependent on the length of the key that is utilized. Increasing the level of security through the use of longer keys may result in an increase in the amount of time needed for encryption. The experimental results show that the highest results from the data are as follows the length of the encryption time is 0.00005317 seconds, the length of the decryption time is 0.00000882 seconds, the results of BER and CER are 0, the results of entropy are 7.44237, and the results of avalanche influence are 54.86%.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
A. K. Agrahari, M. Sheth, and N. Praveen, “Comprehensive Survey on Image Stegnography Using LSB With AES,” vol. 13, no. 8, pp. 5841–5844, 2018.
D. M. Kuryazov, “Development of electronic digital signature algorithms with compound modules and their cryptanalysis,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 24, no. 4, pp. 1085–1099, May 2021, doi: 10.1080/09720529.2021.1878628.
R. Marqas, S. M. Almufti, and R. Rebar, “Comparing Symmetric and Asymmetric cryptography in message encryption and decryption by using AES and RSA algorithms,” JOURNAL OF XI’AN UNIVERSITY OF ARCHITECTURE & TECHNOLOGY, vol. XII, no. III, Mar. 2020, doi: 10.37896/JXAT12.03/262.
T. Kumar, K. Reddy, S. Rinaldi, B. Parameshachari, and K. Arunachalam, “A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application,” Electronics (Basel), vol. 10, no. 16, p. 2023, Aug. 2021, doi: 10.3390/electronics10162023.
K. Patel, “Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files,” International Journal of Information Technology, vol. 11, no. 4, pp. 813–819, Dec. 2019, doi: 10.1007/s41870-018-0271-4.
A. U. Rohmah and D. Djuniadi, “Tiny encryption algorithm (TEA) for analysis and implementation of cryptool2-based text message encryption and decryption processes,” Journal of Student Research Exploration, vol. 1, no. 1, pp. 33–40, Dec. 2023, doi: 10.52465/josre.v1i1.111.
E. Y. Purba, S. Efendi, P. Sirait, and P. Sihombing, “Collaboration of RSA Algorithm Using EM2B Key with Word Auto Key Encryption Cryptography Method in Encryption of SQL Plaintext Database,” Journal of Physics: Conference Series, vol. 1230, no. 1, p. 012009, Jul. 2019, doi: 10.1088/1742-6596/1230/1/012009.
E. H. Rachmawanto, R. S. Amin, D. R. I. M. Setiadi, and C. A. Sari, “A performance Analysis StegoCrypt Algorithm based on LSB-AES 128 bit in Various Image Size,” in International Seminar on Application for Technology of Information and Communication, 2017. doi: 10.1109/ISEMANTIC.2017.8251836.
A. Alamsyah, B. Prasetiyo, and Y. Muhammad, “S-box Construction on AES Algorithm using Affine Matrix Modification to Improve Image Encryption Security,” Scientific Journal of Informatics, vol. 10, no. 2, pp. 69–82, Apr. 2023, doi: 10.15294/sji.v10i2.42305.
N. Sharma, Prabhjot, and H. Kaur, “A Review of Information Security using Cryptography Technique.,” International Journal of Advanced Research in Computer Science, vol. 8, no. 4, pp. 323–326, 2017.
A. Ajmera, S. S. Ghosh, and T. Vijayetha, “Secure LSB Steganography over Modified Vigenère-AES Cipher and Modified Interrupt Key-AES Cipher,” in 2018 IEEE Punecon, IEEE, Nov. 2018, pp. 1–7. doi: 10.1109/PUNECON.2018.8745393.
P. P. Bandekar and G. C. Suguna, “LSB Based Text and Image Steganography Using AES Algorithm,” Proceedings of the 3rd International Conference on Communication and Electronics Systems, ICCES 2018, no. Icces, pp. 782–788, 2018, doi: 10.1109/CESYS.2018.8724069.
G. N. Salmi and F. Siagian, “Implementation of the data encryption using caesar cipher and vernam cipher methods based on CrypTool2,” Journal of Soft Computing Exploration, vol. 3, no. 2, Sep. 2022, doi: 10.52465/joscex.v3i2.86.
C. A. Sari, G. Ardiansyah, D. R. I. Moses Setiadi, and E. H. Rachmawanto, “An improved security and message capacity using AES and Huffman coding on image steganography,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 17, no. 5, 2019, doi: 10.12928/TELKOMNIKA.v17i5.9570.
Y. Alemami, M. A. Mohamed, and S. Atiewi, “Advanced approach for encryption using advanced encryption standard with chaotic map,” International Journal of Electrical and Computer Engineering (IJECE), vol. 13, no. 2, p. 1708, Apr. 2023, doi: 10.11591/ijece.v13i2.pp1708-1723.
U. Banerjee, S. Das, and A. P. Chandrakasan, “Accelerating post-quantum cryptography using an energy-efficient TLS crypto-processor,” Proceedings - IEEE International Symposium on Circuits and Systems, vol. 2020-Octob, pp. 1–5, 2020, doi: 10.1109/iscas45731.2020.9180550.
K. Muttaqin and J. Rahmadoni, “Analysis And Design of File Security System AES (Advanced Encryption Standard) Cryptography Based,” Journal of Applied Engineering and Technological Science (JAETS), vol. 1, no. 2, pp. 113–123, May 2020, doi: 10.37385/jaets.v1i2.78.
M. Alwazzeh, S. Karaman, and M. N. Shamma, “Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat,” Journal of Cyber Security and Mobility, vol. 9, pp. 449–468, 2020, doi: 10.13052/jcsm2245-1439.933.
D. Kuswanto and A. Rachmad, “COMBINATION SCHEME OF AES ENCRYPTION AND ERROR CORRECTION TURBO CODE FOR CRYPTOGRAPHY OF CLOUD STORAGE,” in Proceedings of the International Conference on Science and Technology (ICST 2018), Paris, France: Atlantis Press, 2018, pp. 720–724. doi: 10.2991/icst-18.2018.146.
D. Kuswanto, “Performances Combination Schemes AES-Turbo Code Based-on Keys Length,” IOP Conference Series: Materials Science and Engineering, vol. 1125, no. 1, p. 012047, May 2021, doi: 10.1088/1757-899X/1125/1/012047.
H. Kevin Ronaldo Cahyono, C. A. Sari, de Rosal Ignatius Moses Setiadi, and E. H. Rachmawanto, “Dual protection on message transmission based on Chinese remainder theorem and rivest cipher 4,” in 2019 International Conference on Information and Communications Technology, ICOIACT 2019, 2019. doi: 10.1109/ICOIACT46704.2019.8938568.
M. T. Elkandoz, W. Alexan, and H. H. Hussein, “Double-Layer Image Security Scheme with Aggregated Mathematical Sequences,” in 2019 International Conference on Advanced Communication Technologies and Networking (CommNet), IEEE, Apr. 2019, pp. 1–7. doi: 10.1109/COMMNET.2019.8742370.
M. Essaid, I. Akharraz, A. Saaidi, and et A. Mouhib, “Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps,” Journal of Information Security and Applications, vol. 47, pp. 173–187, Aug. 2019, doi: 10.1016/j.jisa.2019.05.006.
R. G. Barrieta, A. S. Canlas, D. M. A. Cortez, and K. E. Mata, “Modified Hill Cipher Algorithm using Myszkowski Transposition to address Known-Plaintext attack,” International Journal for Research in Applied Science and Engineering Technology, vol. 10, no. 4, pp. 3242–3249, Apr. 2022, doi: 10.22214/ijraset.2022.41970.
H. V. Gamido, “Implementation of a bit permutation-based advanced encryption standard for securing text and image files,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 19, no. 3, p. 1596, Sep. 2020, doi: 10.11591/ijeecs.v19.i3.pp1596-1601.