000 02647nam a22003017a 4500
003 KOHA
005 20230714100526.0
008 230714d2023 cy |o||| m||| 00| 0 eng d
040 _aCY-NiCIU
_beng
_cCY-NiCIU
_erda
041 _aeng
090 _aYL 2876
_bA33 2023
100 1 _aAbaka, Sylvester Sunday
245 1 0 _aDATA PROTECTION & EVALUATION OF ENCRYPTION ALGORITHMS /
_cSYLVESTER SUNDAY ABAKA; SUPERVISOR: DR. DOKUN IWALEWA OLUWAJANA
264 _c2023
300 _aix, 76 sheets:
_bphotos;
_c31 cm.
_eIncludes CD
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
502 _aThesis (MSc) - Cyprus International University. Institute of Graduate Studies and Research Information Technologies Department
504 _aIncludes bibliography (sheets 54-62)
520 _aABSTRACT The unprotected electronic document may be subjected to a data breach, in which private or sensitive information is stolen, altered, copied, communicated, viewed, or used without authorization. This study on Data Protection & Evaluation of Encryption Algorithms compares four encryption algorithms by performance evaluation method to know the algorithm that encrypts and decrypts files faster in different size of the data blocks to determine their performance. The study also evaluate the four most common encryption algorithms like Rivest Cipher4 (RC4) Algorithms, Rivest Cpher2 Algorithm (RC2), Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES). These encryption algorithms were analyzed using different data block sizes ranging from 1MB to 3MB with the help of a simulation comparison technique to know which among those algorithms encrypt/decrypt documents faster in terms of performance. Simulation results is given by demonstrating the effectiveness of each algorithm and recommendation is given for the fastest in data protection before exposing it online. A cryptography software prototype that will further showcase sequence, class, storyboard and use case diagram will be provided. The four Encryption Algorithms were analyzed and Advanced Encryption Standard (AES) was discovered to encrypt/decrypt faster in and was chosen for the prototype. Keywords: Algorithm, Cryptography, Data Protection, Encryption, Evaluation,
650 0 _aAlgorithms
_vDissertations, Academic
650 0 _aCryptography
_vDissertations, Academic
650 0 _aData protection
_vDissertations, Academic
650 0 _aEvaluation
_vDissertations, Academic
700 1 _aOluwajana, Dokun Iwalewa
_esupervisor
942 _2ddc
_cTS
999 _c290593
_d290593