scholarly journals Performance comparison of asymmetric cryptography (case study-mail message)

2020 ◽  
Vol 4 (3) ◽  
pp. 105-111
Author(s):  
Zarni Sann ◽  
Thi Thi Soe ◽  
Kaythi Wyut Mhone Knin ◽  
Zin May Win

Data encryption is well known as essential for today’s technology. ElGamal encryption and RSA algorithmis made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mailsfrom mail server. This system is implemented to secure mail server system for local government’s important mailmessages. These algorithms consume a considerable amount of time and resources of memory, CPU time, andcomputation time to encrypt and decrypt data. This paper discuss the results comparison of these algorithms in termof encryption time, decryption time, and memory usage over variable file sizes. The results show that RSA does fasterencryption process in compare with ElGamal. However, ElGamal decryption process is quicker than RSA. This systemis also expressed comparison of storage Size between RSA and ElGamal. Both of these algorithms are cryptographicpublic-key algorithms but have roles in different techniques. This system is using C# programming language and SQLServer to store mail messages.

Author(s):  
Zarni Sann ◽  
Thi thi Soe ◽  
Kaythi Wyut Mhone Knin ◽  
Zin May Win

Encryption is a well known technology for protecting sensitive data. ElGamal encryption and RSA algorithm is made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mails from mail server. This system is implemented to secure mail server system for local government’s important mail messages. These algorithms consume a considerable amount of time and resources such as memory, CPU time, and computation time to encrypt and decrypt data. In this paper, the results are comparison of these algorithms in term of encryption time, decryption time, and memory usage over variable file sizes. After processing, it is proven that RSA performs a faster encryption process than ElGamal. However, ElGamal decryption process is faster than RSA. This system is also expressed comparison of storage Size between RSA and ElGamal. Both of these algorithms are cryptographic public-key algorithms but have functions in different ways. This system is using C# programming language and SQL Server to store mail messages.


Omega ◽  
2013 ◽  
Vol 41 (3) ◽  
pp. 536-552 ◽  
Author(s):  
Jiafu Tang ◽  
Wu Zhiqiao ◽  
C.K. Kwong ◽  
Xinggang Luo

2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Qingru Zou ◽  
Xiangming Yao ◽  
Peng Zhao ◽  
Fei Dou ◽  
Taoyuan Yang

Station inflow control (SIC) is an important and effective method for reducing recurrent congestion during peak hours in the Beijing, Shanghai, and Guangzhou subway systems. This work proposes a practical and efficient method for establishing a static SIC scheme in normal weekdays for large-scale subway networks. First, a traffic assignment model without capacity constraint is utilized to determine passenger flow distributions on the network. An internal relationship between station inflows and section flows is then constructed. Second, capacity bottlenecks are identified by considering the transport capacity of each section. Then, a feedback-based bottleneck elimination strategy is established to search target control stations and determine their control time and control strength. To validate the effectiveness of the proposed approach, a decision support system coded in the C# programming language was developed, and the Beijing subway was used as a case study. The results indicate that the proposed method and tool are capable of practical applications, and the generated SIC plan has better performance over the existing SIC plan. This study provides a practical and useful method for operation agencies to construct SIC schemes in the subway system.


2021 ◽  
Vol 2 (14) ◽  
pp. 118-130
Author(s):  
Liudmyla Hlynchuk ◽  
Tetiana Hryshanovych ◽  
Andrii Stupin

This research dedicated to the review, implementation and analysis of the symmetric encryption algorithm, namely - DES (Data Encryption Standard) that encrypts and decrypts text information. For this algorithm represented not only a verbal description, but also schemes of its execution and examples of implementation. Intermediate results and the results of information encryption / decryption in the implemented algorithm were verified using examples, so we can assume that the algorithm implemented correctly. Comparison of the execution time for the DES algorithm proposed implementation made for two utilities. One of them is OpenSSL, developed using assembler and the capabilities of the C programming language. The other utility developed using programming language Java. The comparison was made according to three criteria: full time from the utility execution start to its completion; the time spent by the process to execute the utility (downtime and time when the processor perform other tasks not accounted); the time taken by the operating system to run a utility, such as reading or writing the file. The analysis showed that the total execution time is not equal to the total amount of time spent by both the processor and the operating system to execute the utilities. This is due to the following: the total execution time is the real time spent on the execution of the utility; it can measure with a stopwatch. Whereas the time spent by the processor to execute the utility is measured somewhat differently: if two cores execute the same utility for 1 second, the total execution time will be 2 seconds, although in fact one second of time has passed. From the comparison follows the next conclusion: the time spent on encryption is less than the time spent on decryption. The execution time for different utilities is different: the time for OpenSSL utility turned out to be the best, because such an implementation is most adapted to the hardware. The utility in Java turned out to be the worst in terms of execution time. We propose the implementation of the DES algorithm of the nearest execution time to the fastest of the considered. Because a number of hacking possibilities have been found for the symmetric encryption standard DES, in particular due to the small number of possible keys, there is a risk of overriding them. Therefore, to increase crypto currency, other versions of this algorithm have been developed: double DES (2DES), triple DES (3DES), DESX, G-DES. In the future, it is planned to develop a utility based on our proposed implementation of the DES algorithm and to demonstrate the operation of its modifications.


2017 ◽  
Author(s):  
Ratnadewi Ratnadewi

Note: This preprint has been presented in the 10th International Conference Asosiasi Ahli dan Dosen RI (ADRI), Batam, 3-5 March 2017--- Cryptography is a method used to create secure communication by manipulating sent messages during the communication occurred so only intended party that can know the content of that messages. Some of the most commonly used cryptography methods to protect sent messages, especially in the form of text, are DES and 3DES cryptography method. This research will explain the DES and 3DES cryptography method and its use for stored data security in smart cards that working in the NFC-based communication system.Several things that will be explained in this research is the ways of working of DES and 3DES cryptography method in doing the protection process of a data and software engineering through the creation of application using C++ programming language to realize and test the performance of DES and 3DES cryptography method in encrypted data writing process to smart cards and decrypted data reading process from smart cards.The execution time of the entering and the reading process data using a smart card DES cryptography method is faster than using 3DES cryptography.


2022 ◽  
Vol 24 (2) ◽  
pp. 0-0

In last decade, there has been a growing awareness in E-Learning which is the most recent type of distance education, and becomes a highly significant model of educational technology. Today e-Learning studies indicate that there is an increasing use of this educational scheme for students, trainers and instructors which improve the learning capability of the students and trainee by depending on student-centered learning (SCL) scheme rather than using the traditional teacher or trainer centered teaching mechanism.However, students’ awareness for the advantage of using e-Learning has not been significantly investigated, especially in Iraq. The aim of this article is to inspect students’ awareness of the using of e-Learning at the Dohuk Polytechnic University. Participants involved in this study were 100 students studying the C++ programming language course during 2015-2016 and 2017-2018 academic years and 210 students studying computer application course during 2018-2019.


Author(s):  
Faried Effendy ◽  
Taufik ◽  
Bramantyo Adhilaksono

: Substantial research has been conducted to compare web servers or to compare databases, but very limited research combines the two. Node.js and Golang (Go) are popular platforms for both web and mobile application back-ends, whereas MySQL and Go are among the best open source databases with different characters. Using MySQL and MongoDB as databases, this study aims to compare the performance of Go and Node.js as web applications back-end regarding response time, CPU utilization, and memory usage. To simulate the actual web server workload, the flow of data traffic on the server follows the Poisson distribution. The result shows that the combination of Go and MySQL is superior in CPU utilization and memory usage, while the Node.js and MySQL combination is superior in response time.


Sign in / Sign up

Export Citation Format

Share Document