Comparative Analysis of Performance of the Encryption and Decryption Times of Cryptography

Authors

  • Made Yoga Mahardika Faculty of Communication and Information Technology, Universitas Nasional, Jakarta, Indonesia
  • Agung Triayudi Faculty of Communication and Information Technology, Universitas Nasional, Jakarta, Indonesia

DOI:

https://doi.org/10.58905/saga.v2i3.359

Keywords:

Cryptography, Decryption, ECC, Encryption, RSA

Abstract

 Cryptography is the study of mathematical techniques to maintain information security, including the encryption process to protect data and decryption to return it to a readable form. The Rivest Shamir Adleman (RSA) algorithm and Elliptic Curve Cryptography (ECC) are two asymmetric key algorithms that are often used. RSA relies on large number factorization for security, while ECC uses elliptic curves that require more complex computation but are more efficient in resource usage. This study aims to compare the performance of the two algorithms in terms of encryption and decryption time, and analyze efficiency based on various key sizes and data amounts. The research method includes measuring encryption and decryption time with different data inputs using RSA and ECC at various key sizes. Experiments were conducted with data inputs of 128-bit to 512-bit and testing was conducted to measure the speed of each algorithm in the same situation. The results showed that RSA was faster in the encryption process than decryption, while ECC had a faster decryption time than encryption. However, the overall processing time for ECC is longer than RSA, especially when the key size is increased. These results provide insight into the advantages and disadvantages of each algorithm, which can be used as a basis for consideration in selecting algorithms for security applications that require high efficiency.

References

H. Mukhtar, Kriptografi untuk Keamanan Data, 1st ed. Yogyakarta: Deepublish, 2018.

Dr. M. Gobi, R. Sridevi, and R. Rahini priyadharshini, “A Comparative Study on the Performance and the Security of RSA and ECC Algorithm,” International Journal Of Advanced Networking and Applications (IJANA), pp. 168–171, Mar. 2015.

J. Simarmata, Sriadhi, and R. Rahim, Kriptografi Teknik Keamanan Data dan Informasi, 1st ed. Yogyakarta: CV. ANDI OFFSET, 2019.

Monika, T. Tomar, V. Kumar, and Y. Kumar, “IMPLEMENTATION OF ELLIPTIC - CURVE CRYPTOGRAPHY,” International Journal of Electrical Engineering and Technology (IJEET), vol. 11, no. 2, pp. 178–189, Apr. 2020, Accessed: Jun. 08, 2024. [Online]. Available: http://iaeme.com/Home/journal/IJEET

K. Sujatha, A. Arjuna Rao, P. V. Nageswara Rao, and L. V. Rajesh, “Renowned Information Security Algorithms: A Comparative Study,” International Journal of Engineering Research & Technology (IJERT), vol. 5, no. 2, pp. 216–224, Feb. 2016, Accessed: Jun. 30, 2024. [Online]. Available: http://www.ijert.org

M. Wameedh Abdulnabi, R. A. Muhajjar, and M. Al-Zubaidie, “Elliptic Curve Implementation and its Applications: A Review,” Iraqi Journal of Intelligent Computing and Informatics (IJICI), vol. 2, no. 2, pp. 90–100, Dec. 2023.

N. J. Gbètoho Saho and E. C. Ezin, “Comparative Study on the Performance of Elliptic Curve Cryptography Algorithms with Cryptography through RSA Algorithm,” Proceedings of CARI 2020, Aug. 2020, Accessed: Jun. 30, 2024. [Online]. Available: https://hal.science/hal-02926106

D. M. Mani and N. P H, “A Comparison Between RSA And ECC In Wireless Sensor Networks,” International Journal of Engineering Research & Technology (IJERT), vol. 2, no. 3, pp. 1–5, Mar. 2013, Accessed: Jul. 03, 2024. [Online]. Available: www.ijert.org

Dr. M. Kaur Bhatia, R. S. Rajpurohit, Gulafshan, and B. Joseph, “A Study of Cryptographic Algorithms,” International Journal for Research in Applied Science & Engineering Technology (IJRASET), vol. 10, no. 12, pp. 170–181, Dec. 2022, Accessed: Jul. 03, 2024. [Online]. Available: https://doi.org/10.22214/ijraset.2022.47848

Ms. R. S. Satpute, Prof. R. S. Mangrulkar, and Prof. A. N. Thakare, “Performance Analysis of Wireless Sensor Networks using Elliptical Curves Cryptography,” International Journal of Engineering Research & Technology (IJERT), vol. 3, no. 7, pp. 773–780, Jul. 2014, Accessed: Jul. 03, 2024. [Online]. Available: www.ijert.org

J. Bao, “Research on the Security of Elliptic Curve Cryptography,” Advances in Economics, Business and Management Research, vol. 215, pp. 984–988, 2022.

E. Setyaningsih, Kriptografi dan Implementasinya menggunakan MATLAB, 1st ed. Yogyakarta: CV. ANDI OFFSET, 2020.

R. Munir, Kriptografi, 2nd ed. Bandung: Informatika Bandung, 2019.

S. K. Verma and Dr. D. B. Ojha, “A Discussion on Elliptic Curve Cryptography and Its Applications,” IJCSI International Journal of Computer Science Issues, vol. 9, no. 1, pp. 74–77, Jan. 2012, Accessed: Jul. 03, 2024. [Online]. Available: www.IJCSI.org

M. Rafeek Khan et al., “Analysis of Elliptic Curve Cryptography & RSA,” Journal of ICT Standardization, vol. 11, pp. 355–378, Nov. 2023.

Y. Yan, “The Overview of Elliptic Curve Cryptography (ECC),” J Phys Conf Ser, pp. 1–8, 2022.

Dr. B.S Dhaliwal and V. Soi, “Wireless Sensor Networks using Elliptical Curves Cryptography: Performance Analysis,” International Journal of Research in Engineering and Applied Sciences (IJREAS), vol. 6, no. 6, pp. 284–291, Jun. 2016, Accessed: Jun. 30, 2024. [Online]. Available: http://www.euroasiapub.org

A. Karki, “A Comparative Analysis of Public Key Cryptography,” International Journal of Modern Computer Science (IJMCS), vol. 4, no. 6, pp. 30–35, Dec. 2016, Accessed: Jun. 30, 2024. [Online]. Available: http://ijmcs.info

Gururaja. H.S, M. Seetha, A. K. Koundinya, Shashank. A.M, and Prashanth. C.A, “Comparative Study and Performance Analysis of Encryption in RSA, ECC and Goldwasser- Micali Cryptosystems,” International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 3, no. 1, pp. 111–118, Jan. 2014, Accessed: Jul. 04, 2024. [Online]. Available: www.ijaiem.org

B. K. Alese, Philemon E. D., and S. O. Falaki, “Comparative Analysis of Public-Key Encryption Schemes,” Int J Eng Technol, vol. 2, no. 9, pp. 1552–1568, 2012.

Downloads

Published

18-01-2025

Issue

Section

Articles