PERFORMANCE ANALYSIS OF SYMMETRIC AND HASHING CRYPTOGRAPHIC ALGORITHMS / PAULINE IMADEGBE EZE; SUPERVISOR: ASSOC. PROF. DR. MARY AGOYI

Yazar: Katkıda bulunan(lar):Dil: İngilizce 2022Tanım: 55 sheets; 31 cm. Includes CDİçerik türü:
  • text
Ortam türü:
  • unmediated
Taşıyıcı türü:
  • volume
Konu(lar): Tez notu: Thesis (Msc) - Cyprus International University. Institute of Graduate Studies and Research Information Technologies Department Özet: ABSTRACT Information security is an important aspect of today's internet, and it is becoming more so by the day. As the network expands, more people become involved in communication from various perspectives, such as online data exchange, transactions, and payments. Concerns have been raised about secure payments and data transfer. By using authentication, integrity, confidentiality, and non-repudiation, cryptography helps to prevent unauthorized access to data. It is critical to select a cryptography algorithm that meets the needs of the user. The goal of this research is to analyze and compare the performance of symmetric key cryptography (AES-256 and Blowfish) and hash function cryptography (MD5 and SHA-512) and the combination of both functions using performance metrics such as execution time (encryption, decryption, and hashing time), CPU utilization, and memory usage. To extract features from the algorithms, the comparison was done using the JAVA Programming Language. Keywords: AES-256, Blowfish, Cryptography, Encryption Techniques, Hash Function Techniques, MD5, SHA-512
Materyal türü: Thesis
Mevcut
Materyal türü Geçerli Kütüphane Koleksiyon Yer Numarası Durum Notlar İade tarihi Barkod Materyal Ayırtmaları
Thesis Thesis CIU LIBRARY Tez Koleksiyonu Tez Koleksiyonu YL 2450 E94 2022 (Rafa gözat(Aşağıda açılır)) Kullanılabilir Information Technologies Department T2763
Suppl. CD Suppl. CD CIU LIBRARY Görsel İşitsel YL 2450 E94 2022 (Rafa gözat(Aşağıda açılır)) Kullanılabilir Information Technologies Department CDT2763
Toplam ayırtılanlar: 0

Thesis (Msc) - Cyprus International University. Institute of Graduate Studies and Research Information Technologies Department

Includes bibliography (sheets 52-55)

ABSTRACT
Information security is an important aspect of today's internet, and it is becoming more so by the day. As the network expands, more people become involved in communication from various perspectives, such as online data exchange, transactions, and payments. Concerns have been raised about secure payments and data transfer. By using authentication, integrity, confidentiality, and non-repudiation, cryptography helps to prevent unauthorized access to data. It is critical to select a cryptography algorithm that meets the needs of the user. The goal of this research is to analyze and compare the performance of symmetric key cryptography (AES-256 and Blowfish) and hash function cryptography (MD5 and SHA-512) and the combination of both functions using performance metrics such as execution time (encryption, decryption, and hashing time), CPU utilization, and memory usage. To extract features from the algorithms, the comparison was done using the JAVA Programming Language.
Keywords: AES-256, Blowfish, Cryptography, Encryption Techniques, Hash Function Techniques, MD5, SHA-512

Araştırmaya Başlarken  
  Sıkça Sorulan Sorular