000 02178nam a22002897a 4500
003 KOHA
005 20230418112333.0
008 221109d2022 cy ||||| m||| 00| 0 eng d
040 _aCY-NiCIU
_beng
_cCY-NiCIU
_erda
041 _aeng
090 _aYL 2450
_bE94 2022
100 1 _aEze, Pauline Imadegbe
245 1 0 _aPERFORMANCE ANALYSIS OF SYMMETRIC AND HASHING CRYPTOGRAPHIC ALGORITHMS /
_cPAULINE IMADEGBE EZE; SUPERVISOR: ASSOC. PROF. DR. MARY AGOYI
264 _c2022
300 _a55 sheets;
_c31 cm.
_eIncludes CD
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
502 _aThesis (Msc) - Cyprus International University. Institute of Graduate Studies and Research Information Technologies Department
504 _aIncludes bibliography (sheets 52-55)
520 _aABSTRACT Information security is an important aspect of today's internet, and it is becoming more so by the day. As the network expands, more people become involved in communication from various perspectives, such as online data exchange, transactions, and payments. Concerns have been raised about secure payments and data transfer. By using authentication, integrity, confidentiality, and non-repudiation, cryptography helps to prevent unauthorized access to data. It is critical to select a cryptography algorithm that meets the needs of the user. The goal of this research is to analyze and compare the performance of symmetric key cryptography (AES-256 and Blowfish) and hash function cryptography (MD5 and SHA-512) and the combination of both functions using performance metrics such as execution time (encryption, decryption, and hashing time), CPU utilization, and memory usage. To extract features from the algorithms, the comparison was done using the JAVA Programming Language. Keywords: AES-256, Blowfish, Cryptography, Encryption Techniques, Hash Function Techniques, MD5, SHA-512
650 0 _aPuffers (Fish)
_vDissertations, Academic
650 0 _aCryptography
_vDissertations, Academic
700 1 _aAgoyi, Mary
_esupervisor
942 _2ddc
_cTS
999 _c289033
_d289033