PERFORMANCE ANALYSIS OF SYMMETRIC AND HASHING CRYPTOGRAPHIC ALGORITHMS / PAULINE IMADEGBE EZE; SUPERVISOR: ASSOC. PROF. DR. MARY AGOYI
Dil: İngilizce 2022Tanım: 55 sheets; 31 cm. Includes CDİçerik türü:- text
- unmediated
- volume
Materyal türü | Geçerli Kütüphane | Koleksiyon | Yer Numarası | Durum | Notlar | İade tarihi | Barkod | Materyal Ayırtmaları | |
---|---|---|---|---|---|---|---|---|---|
Thesis | CIU LIBRARY Tez Koleksiyonu | Tez Koleksiyonu | YL 2450 E94 2022 (Rafa gözat(Aşağıda açılır)) | Kullanılabilir | Information Technologies Department | T2763 | |||
Suppl. CD | CIU LIBRARY Görsel İşitsel | YL 2450 E94 2022 (Rafa gözat(Aşağıda açılır)) | Kullanılabilir | Information Technologies Department | CDT2763 |
CIU LIBRARY raflarına göz atılıyor, Raftaki konumu: Görsel İşitsel Raf tarayıcısını kapatın(Raf tarayıcısını kapatır)
Thesis (Msc) - Cyprus International University. Institute of Graduate Studies and Research Information Technologies Department
Includes bibliography (sheets 52-55)
ABSTRACT
Information security is an important aspect of today's internet, and it is becoming more so by the day. As the network expands, more people become involved in communication from various perspectives, such as online data exchange, transactions, and payments. Concerns have been raised about secure payments and data transfer. By using authentication, integrity, confidentiality, and non-repudiation, cryptography helps to prevent unauthorized access to data. It is critical to select a cryptography algorithm that meets the needs of the user. The goal of this research is to analyze and compare the performance of symmetric key cryptography (AES-256 and Blowfish) and hash function cryptography (MD5 and SHA-512) and the combination of both functions using performance metrics such as execution time (encryption, decryption, and hashing time), CPU utilization, and memory usage. To extract features from the algorithms, the comparison was done using the JAVA Programming Language.
Keywords: AES-256, Blowfish, Cryptography, Encryption Techniques, Hash Function Techniques, MD5, SHA-512