Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security
Abstract
There are many ways to ensure data security, one of the classic way but still effective is to use encryption. Encryption itself has two techniques or algorithms: symmetric-key (also called secret-key) and asymmetric-key encryption (also called public key). In this paper, we proposed an analysis of two algorithm of encryption: RSA and AES algorithm in term of securing digital data. The method used in this research are: RSA and AES analysis, then retrieving the result. The two algorithm is deeply and thoroughly analyzed to discover the effectiveness to secure the data. The Technological Readiness Level (TKT) is at level 6, which means demonstration of a model or prototype or the analysis result of a system or subsystem or a study in a relevant environment. The result concluded that the application of the AES encryption algorithm is more optimal than RSA encryption in digital data security. Because the encryption and decryption process of using the AES algorithm is faster, although the difference in testing time of the two encryption algorithms is not too significant. The entropy value of 4.96 in AES encryption is greater than that of RSA proving that the even distribution of characters in the chiper text code does not accumulate on certain characters so that it will be difficult to attack using frequency analysis.
References
Akhil, K. M., Kumar, M. P., & Pushpa, B. R. (2018). Enhanced cloud data security using AES algorithm. Proceedings of 2017 International Conference on Intelligent Computing and Control, I2C2 2017, 2018-Janua, 1–5. https://doi.org/10.1109/I2C2.2017.8321820
Amalarethinam, I. G., & Leena, H. M. (2017). Enhanced RSA Algorithm with Varying Key Sizes for Data Security in Cloud. Proceedings - 2nd World Congress on Computing and Communication Technologies, WCCCT 2017, 172–175. https://doi.org/10.1109/WCCCT.2016.50
Arab, A., Rostami, M. J., & Ghavami, B. (2019). An image encryption method based on chaos system and AES algorithm. Journal of Supercomputing, 75(10), 6663–6682. https://doi.org/10.1007/s11227-019-02878-7
Çavuşoğlu, Ü., Akgül, A., Zengin, A., & Pehlivan, I. (2017). The design and implementation of hybrid RSA algorithm using a novel chaos based RNG. Chaos, Solitons and Fractals, 104, 655–667. https://doi.org/10.1016/j.chaos.2017.09.025
Gong, L., Qiu, K., Deng, C., & Zhou, N. (2019). An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Optics and Lasers in Engineering, 121(March), 169–180. https://doi.org/10.1016/j.optlaseng.2019.03.006
Irfan, P. (2016). Aplikasi Enkripsi Citra Menggunakan Algoritma Kriptografi. Jurnal Matrik, 16(1), 96–104.
Lytvyn, V., Peleshchak, I., Peleshchak, R., & Vysotska, V. (2019). Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm. 2019 3rd International Conference on Advanced Information and Communications Technologies, AICT 2019 - Proceedings, 447–450. https://doi.org/10.1109/AIACT.2019.8847896
Mathur, S., Gupta, D., Goar, V., & Kuri, M. (2017). Analysis and design of enhanced RSA algorithm to improve the security. 3rd IEEE International Conference On , 3–7. https://doi.org/10.1109/CIACT.2017.7977330
Muhammad Abdullah, A., & Muhamad Abdullah, A. (2017). Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data Call for papers View project Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data View project Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt. https://www.researchgate.net/publication/317615794
Muhammad Fadlan, Haryansyah, & Rosmini. (2021). Pengamanan Data melalui Model Super Enkripsi Autokey Cipher dan Transposisi Kolom. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 5(6), 1113–1119. https://doi.org/10.29207/resti.v5i6.3566
Santhosh Kumar, B. J., Roshni, R. V. K., & Nair, A. (2018). Comparative study on AES and RSA algorithm for medical images. Proceedings of the 2017 IEEE International Conference on Communication and Signal Processing, ICCSP 2017, 2018-Janua, 501–504. https://doi.org/10.1109/ICCSP.2017.8286408
Simarmata, J., Limbong, T., Ginting, M. B. R., Damanik, R., Nasution, M. I. P., Hasugian, A. H., Mesran, M., Sembiring, A. S., Hutahaean, H. D., Taufik, I., Hasugian, P. M., Sihotang, H. T., Gea, A., Hutapea, M. I., Jaya, I. K., Hasibuan, D., Situmorang, A., Naibaho, J. F., Napitupulu, J., … Sinambela, M. (2018). Implementation of AES Algorithm for information security of web-based application. International Journal of Engineering and Technology(UAE), 7(3.4 Special Issue 4), 318–320.
Sunaringtyas, S. U., & Prayoga, D. S. (2021). Implementasi Penetration Testing Execution Standard Untuk Uji Penetrasi Pada. Edu Komputika Journal, 8(1), 48–56.
Xu, Y., Wu, S., Wang, M., & Zou, Y. (2020). Design and implementation of distributed RSA algorithm based on Hadoop. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1047–1053. https://doi.org/10.1007/s12652-018-1021-y
Yuan, Y., Yang, Y., Wu, L., & Zhang, X. (2018). A High Performance Encryption System Based on AES Algorithm with Novel Hardware Implementation. 2018 IEEE International Conference on Electron Devices and Solid State Circuits, EDSSC 2018, 4–5. https://doi.org/10.1109/EDSSC.2018.8487056