Performance and Security of AES, DES, and RSA in Hybrid Systems: An Empirical Analysis of Triple Encryption
DOI:
https://doi.org/10.22399/ijcesen.694Keywords:
Hybrid Encryption, Cryptographic Algorithms, Data Security, MamdaniAbstract
Abstract: This study evaluates the performance and security of three cryptographic algorithms AES, DES, and RSA individually and in hybrid combinations. It aims to enhance information security through a novel three-step hybrid encryption method. Initially, each algorithm's execution time, memory usage, CPU usage, and data usage were analyzed separately. Subsequently, binary hybrid and triple hybrid techniques were assessed. The results indicate that AES is the fastest in terms of encryption speed, while RSA significantly increases memory usage in hybrid methods. DES exhibited the highest CPU usage. The triple hybrid method (AES + DES + RSA) demonstrated lower CPU and memory resource utilization, making it a viable option for applications requiring high security. This empirical analysis suggests that the triple hybrid method optimizes both performance and security, offering a balanced solution for secure data transmission. The findings contribute to the development of more effective data security methods and highlight the potential for further optimization and application in various contexts.
References
S. Kumar, M. S. Gaur, P. Sagar Sharma and D. Munjal, (2021). A Novel Approach of Symmetric Key Cryptography, 2nd International Conference on Intelligent Engineering and Management (ICIEM), 2021, pp. 593-598, doi: 10.1109/ICIEM51511.2021.9445343.
A. Markandey, P. Dhamdhere and Y. Gajmal, (2018) "Data Access Security in Cloud Computing: A Review," 2018 International Conference on Computing, Power and Communication Technologies (GUCON), Greater Noida, Uttar Pradesh, India, 2018, pp. 633-636.doi: 10.1109/GUCON.2018.8675033
A. Kumar, V. Jain and A. Yadav, (2020). A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique," 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), Mathura, Uttar Pradesh, India, 2020, pp. 514-517, doi: 10.1109/PARC49193.2020.236666
Dahiya, O. and Solanki, K. (2019). Comprehensive Cognizance of Regression Test Case Prioritization Techniques, International Journal of Emerging Trends in Engineering Research, 7(11);638-646. DOI: 10.30534/ijeter/2019/377112019
P. Gupta, D. Kumar Verma and A. Kumar Singh, (2018). Improving RSA Algorithm Using Multi-Threading Model for Outsourced Data Security in Cloud Storage," 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, 2018, pp. 14-15.doi: 10.1109/CONFLUENCE.2018.8442788
D. M. Alsaffar et al., (2020). Image Encryption Based on AES and RSA Algorithms," 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 2020, pp. 1-5, doi: 10.1109/ICCAIS48893.2020.9096809
S. Kumar, M. S. Gaur, P. Sagar Sharma and D. Munjal, (2021). A Novel Approach of Symmetric Key Cryptography, 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), 2021, pp. 593-598, doi: 10.1109/ICIEM51511.2021.9445343
G. Jain and V. Sejwar, (2017). Improving the security by using various cryptographic techniques in cloud computing, 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, pp. 23-28.doi: 10.1109/ICCONS.2017.8250721
S. A. Ahmad and A. B. Garko, (2019). Hybrid Cryptography Algorithms in Cloud Computing: A Review," 2019 15th International Conference on Electronics, Computer and Computation (ICECCO), Abuja, Nigeria, 2019, pp. 1-6, doi: 10.1109/ICECCO48375.2019.9043254.
Sanap, S. D., & More, V. (2021). Analysis of Encryption Techniques for Secure Communication. 2021 International Conference on Emerging Smart Computing and Informatics (ESCI). doi:10.1109/esci50559.2021.9396926.
E. Özer and H. Aydos, "Utilizing Hybrid Encryption Methods to Ensure the Security of Financial Transactions," 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP), Malatya, Turkiye, 2024, pp. 1-4, doi: 10.1109/IDAP64064.2024.10710781.
Guru, M.A., & Ambhaikar, A. (2021). AES and RSA-based Hybrid Algorithms for Message Encryption & Decryption. Information Technology in Industry, 9(1), 273-279. doi:10.17762/itii.v9i1.129.
V. Malgari, R. Dugyala and A. Kumar, (2019). A Novel Data Security Framework in Distributed Cloud Computing, 2019 Fifth International Conference on Image Information Processing (ICIIP), Shimla, India, 2019, pp. 373-378, doi: 10.1109/ICIIP47207.2019.8985941.
Sanap, S. D., & More, V. (2021). Analysis of Encryption Techniques for Secure Communication. 2021 International Conference on Emerging Smart Computing and Informatics (ESCI). doi:10.1109/esci50559.2021.9396926
K. Saini, V. Agarwal, A. Varshney and A. Gupta, (2018).E2EE For Data Security For Hybrid Cloud Services: A Novel Approach, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida (UP), India, 2018, pp. 340-347. doi: 10.1109/ICACCCN.2018.8748782
Jin Meiyu, Tang Yaling, Zhang Xuefeng (2020). Hybrid encryption algorithm of DPAPI and RSA [J]. Computer System Application, 29 (11): 151-156. doi: 10.15888/j.cnki.CsA.007673.
K. N. Sreehari, (2018). Efficient key management methods for symmetric cryptographic algorithm”, in 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).
R, U. M., P, R. S., Gokul Chandrasekaran, & K, M. (2024). Assessment of Cybersecurity Risks in Digital Twin Deployments in Smart Cities. International Journal of Computational and Experimental Science and Engineering, 10(4);695-700. https://doi.org/10.22399/ijcesen.494
Prasada, P., & Prasad, D. S. (2024). Blockchain-Enhanced Machine Learning for Robust Detection of APT Injection Attacks in the Cyber-Physical Systems. International Journal of Computational and Experimental Science and Engineering, 10(4);799-810. https://doi.org/10.22399/ijcesen.539
Srinivas Aluvala, & V. Srikanth. (2024). Characterization of Destructive Nodes and Analysing their Impact in Wireless Networks. International Journal of Computational and Experimental Science and Engineering, 10(4);1584-1593. https://doi.org/10.22399/ijcesen.726
S, P., & A, P. (2024). Secured Fog-Body-Torrent : A Hybrid Symmetric Cryptography with Multi-layer Feed Forward Networks Tuned Chaotic Maps for Physiological Data Transmission in Fog-BAN Environment. International Journal of Computational and Experimental Science and Engineering, 10(4);671-681. https://doi.org/10.22399/ijcesen.490
MOHAMED, N. N., Yulianta SIREGAR, Nur Arzilawati MD YUNUS, & Fazlina MOHD ALI. (2024). Modelling the Hybrid Security Approach for Secure Data Exchange: A Proof of Concept . International Journal of Computational and Experimental Science and Engineering, 10(4);1475-1485. https://doi.org/10.22399/ijcesen.344
M. Swetha, & G. Appa Rao. (2024). Hybrid Ensemble Lightweight Cryptosystem for Internet of Medical Things Security. International Journal of Computational and Experimental Science and Engineering, 10(4);1528-1540. https://doi.org/10.22399/ijcesen.625
Kosaraju Chaitanya, & Gnanasekaran Dhanabalan. (2024). Precise Node Authentication using Dynamic Session Key Set and Node Pattern Analysis for Malicious Node Detection in Wireless Sensor Networks. International Journal of Computational and Experimental Science and Engineering, 10(4);1462-1474. https://doi.org/10.22399/ijcesen.613
B. Jayakumar, & S. Prabakar. (2024). A Case study on MGNREGA and social security in Tamil Nadu’s Krishnagiri district, India. International Journal of Computational and Experimental Science and Engineering, 10(4);1290-1299. https://doi.org/10.22399/ijcesen.712
El-Taj, H. (2024). A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden Communication. International Journal of Computational and Experimental Science and Engineering, 10(3);434-460. https://doi.org/10.22399/ijcesen.382
Suneetha Madduluri, & T. Kishorekumar. (2024). Multimodal Biometric Authentication System for Military Weapon Access: Face and ECG Authentication. International Journal of Computational and Experimental Science and Engineering, 10(4);952-961. https://doi.org/10.22399/ijcesen.565
G. Saraniya, & C. Yamini. (2024). Design of Effective Amplification Signal by Controlling Bandwidth Using Adaptive Learning Technique In Voice Over Internet Protocol. International Journal of Computational and Experimental Science and Engineering, 10(4);1661-1672. https://doi.org/10.22399/ijcesen.659
Godavarthi, S., & G., D. V. R. (2024). Federated Learning’s Dynamic Defense Against Byzantine Attacks: Integrating SIFT-Wavelet and Differential Privacy for Byzantine Grade Levels Detection. International Journal of Computational and Experimental Science and Engineering, 10(4);775-786. https://doi.org/10.22399/ijcesen.538
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.