0% found this document useful (0 votes)
17 views8 pages

AnalysisandImplementationofAESandRSA CryptographyY3S1

The document analyzes and implements the Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) cryptographic algorithms, focusing on their design, performance, and real-world applications. It highlights AES as a symmetric key algorithm known for its speed and efficiency, while RSA is an asymmetric algorithm suitable for secure key exchange and digital signatures. The study includes performance comparisons, implementation details, and testing results, demonstrating that AES generally outperforms RSA in terms of speed and resource usage.

Uploaded by

Ayoub Lakssiri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views8 pages

AnalysisandImplementationofAESandRSA CryptographyY3S1

The document analyzes and implements the Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) cryptographic algorithms, focusing on their design, performance, and real-world applications. It highlights AES as a symmetric key algorithm known for its speed and efficiency, while RSA is an asymmetric algorithm suitable for secure key exchange and digital signatures. The study includes performance comparisons, implementation details, and testing results, demonstrating that AES generally outperforms RSA in terms of speed and resource usage.

Uploaded by

Ayoub Lakssiri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/387879632

Analysis and Implementation of AES and RSA

Article · January 2025

CITATIONS READS

0 220

4 authors:

Nethsara Disanayaka Dhanuka Nanayakkara


Sri Lanka Institute of Information Technology Sri Lanka Institute of Information Technology
1 PUBLICATION 0 CITATIONS 1 PUBLICATION 0 CITATIONS

SEE PROFILE SEE PROFILE

Ruwantha Harshamal Kosala Wijesinghe


Sri Lanka Institute of Information Technology Sri Lanka Institute of Information Technology
1 PUBLICATION 0 CITATIONS 1 PUBLICATION 0 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Dhanuka Nanayakkara on 10 January 2025.

The user has requested enhancement of the downloaded file.


Analysis and Implementation of AES and RSA
Disanayaka S. D. P. N. Harshamal J. G. A. R.
IT22148018 IT22052742
Computer System Engineering Computer System Engineering
Department Department
(Cyber Security) (Cyber Security)
Malabe, Sri Lanka Malabe, Sri Lanka
[email protected] [email protected]

Nanayakkara K. A. D. D. S. Wijesinghe R. P. D. K. N.
IT22365514 IT22123404
Computer System Engineering Computer System Engineering
Department Department
(Cyber Security) (Cyber Security)
Malabe, Sri Lanka Malabe, Sri Lanka
[email protected] [email protected]

Abstract— This report presents a comprehensive evaluation applications, with particular attention to real-world
of selected cryptographic algorithms, specifically focusing on deployment issues related to performance, security, and
the Advanced Encryption Standard (AES) as the symmetric key resource consumption.
algorithm and the Rivest-Shamir-Adleman (RSA) algorithm as
the asymmetric key algorithm. The study explores the design A. History and Background
principles, historical context, and practical applications of both AES was thus introduced to address certain limitations that
AES and RSA. We conduct in-depth research on their known were found in the previous symmetric key block cipher called
vulnerabilities and performance characteristics, followed by the DES, which, by then, had turned susceptible to brute-force
implementation of these algorithms using appropriate attacks. In 1997, National Institute of Standards and
programming languages. Initial testing focuses on encrypting Technology called for some solid replacement in the form of
and decrypting sample data while measuring fundamental
a competition-the Advanced Encryption Standard, or AES for
performance metrics. Comprehensive testing assesses algorithm
performance under varying conditions, including different key
short. They came up with an algorithm called Rijndael, written
sizes and input data types, allowing for detailed analysis of by Vincent Rijmen and Joan Daemen. In 2001, AES was
encryption time, CPU usage, and memory consumption. The officially adopted and approved to encrypt sensitive but
findings aim to provide valuable insights into the applicability unclassified U.S. federal information..
of AES and RSA in real-world scenarios, guiding future B. Key Features
decisions in security implementations.
AES is a symmetric block cipher, meaning it uses the same
Keywords— AES, RSA, Cryptography, Symmetric Key key for both encryption and decryption. The algorithm works
Algorithm, Asymmetric Key Algorithm, Encryption, Decryption, on a block size of 128 bits and supports key sizes of 128, 192,
Performance Analysis, Security Vulnerabilities, Algorithm and 256 bits, with varying numbers of encryption rounds
Implementation, Cryptographic Algorithms, Key Sizes, CPU depending on the key length. Specifically:
Usage, Memory Consumption.

I. INTRODUCTION 128-bit key: 10 rounds


Cryptography forms the very basis of information security
and is very crucial in data protection within many 192-bit key: 12 rounds
applications, ranging from secure communications and 256-bit key: 14 rounds
financial transactions to data storage. For many years,
cryptographic algorithms have been developed to try and meet
these growing demands for secure data transmission in a This process consists of a sequence of substitution,
continuously emerging threat world. Among the leading permutation, and mixing operations on blocks of data. The
cryptographic algorithms are the Advanced Encryption most important thing is that AES was designed to be resistant
Standard, generally referred to as AES, and the Rivest- against not only exhaustive key search but also other forms of
Shamir-Adleman algorithm, generally referred to as RSA. cryptanalytic attacks, such as linear and differential
AES is principally fast and efficient. AES works fine for cryptanalysis.
the encryption of extensive volumes of data. RSA, in its turn, C. Common Use Cases
is an asymmetric algorithm. It is known to be good at secure
AES is widely used across multiple industries and
key exchange and signing, though much slower. In the given
applications, including:
report, AES and RSA are evaluated for performance and
security. The objectives are to identify the relative strengths Data Encryption - AES encrypts sensitive data in
and weaknesses, as well as their suitability for different industries such as banking, healthcare, and government. It is
also the encryption standard for securing communications C. Key Features
(e.g., VPNs, TLS). Asymmetric Encryption (Public/Private Key Pair)
Disk Encryption - Many file and disk encryption systems, • Public Key - It is called the public key because this key
including BitLocker and VeraCrypt, utilize AES to secure is used to encrypt data and is openly shared with
data at rest. anyone who wants to send a secure message. Only a
Wireless Security - AES is used in securing wireless corresponding private key assures decryption in an
communications, especially in protocols like WPA2 for Wi-Fi encryption process.
networks.
Messaging Apps - Secure messaging platforms like
Signal and WhatsApp employ AES for end-to-end encryption,
ensuring privacy of conversations.

II. OVERVIEW OF RSA CRYPTOGRAPHIC ALGORITHM


A. History and Background

Development

RSA was developed by Ron Rivest, Adi Shamir, and


Leonard Adleman in 1977 while they were working at MIT. • Private Key - This key remains secret with the owner
The algorithm is named after the initials of their last names. and is used to decrypt the data encrypted through a
public key. Although an attacker may have
Breakthrough compromised the public key, without access to the
private key, it is not possible to decrypt the message.
Before RSA, all encryption systems utilized symmetric • Security Basis - RSA derives its security from the
ciphers-that is, the same key is used for encryption by the hardness of the factorization problem of large
sending party and decryption by the receiving party. In RSA's composite numbers. It uses the product of two large
breakthrough, the use of asymmetric encryption allowed one prime numbers; and while multiplying these primes is
to publish an encryption key while keeping a different, computationally easy, the reverse operation-
separate key private for decryption. This was really
recovering the original primes from their product-is
fundamental in changing the game in cryptography as now
one could securely communicate with anyone, literally out of computationally infeasible, also called factoring.
the blue, without prior agreement over a secret key. Key Size:

B. Technical details • Standard Key Sizes - RSA typically uses key sizes of
1024, 2048, or 4096 bits, with larger sizes being more
Secure Data Transmission - The RSA algorithm involves secure but slower in terms of processing.
two main steps:
• Prime Number Generation - The process involves
Encryption - The plaintext message is converted into a selecting two large prime numbers (denoted as ppp and
numerical format and raised to the power of the public key qqq) and multiplying them to form the modulus
exponent eee, then reduced modulo nnn. The result is the n=p×qn = p \times qn=p×q. The difficulty in breaking
ciphertext. RSA lies in the challenge of factorizing this large
number nnn into its constituent primes.
Decryption - The ciphertext is raised to the power of the
private key exponent ddd and then reduced modulo nnn, • A graph within a graph is an “inset”, not an “insert”.
converting it back to the original plaintext message. The word alternatively is preferred to the word
“alternately” (unless you really mean something that
Mathematically, the process can be expressed as: alternates).

D. Common Use Cases


Encryption: C=Memod nC = M^e \mod nC=Memodn Secure Data Transmission
RSA is extensively used in secure communication
Decryption: M=Cdmod nM = C^d \mod nM=Cdmodn protocols like SSL/TLS, which are the backbone of secure
websites and online transactions. It encrypts sensitive
information such as credit card numbers whenever a
Here, MMM is the plaintext, CCC is the ciphertext, nnn is the purchase is made online. Now, this encrypted data can
product of the two primes, eee is the public key exponent, and safely be sent over the internet without any threat of
ddd is the private key exponent. interception.
Digital Signatures
RSA also allows for digital signatures. In this, the sender key size. As observed, the time taken for encryption
signs something with his private key, while the receiver and decryption increases with the key size (AES-
then verifies the signature using the sender's public key. 128 being faster than AES-192 or AES-256),
This allows ensuring the integrity and authenticity of data. making AES-128 the most efficient in speed-
Email Encryption sensitive environments.
• Key Sizes - AES operates on block sizes of 128 bits,
Most email services make use of RSA to encrypt messages with key sizes of 128, 192, or 256 bits. Larger keys
so that no one other than the intended recipient can read provide greater security but require more rounds,
the content of the email. affecting the speed of encryption and decryption.
Cryptographic Protocols • Resource Usage - The FPGA implementation is
chosen for its efficiency in handling high-
RSA is part of many cryptographic protocols and
standards, including PGP-a standard for email encryption- throughput applications with relatively low resource
VPNs, and other network communications requiring usage in terms of CPU and memory. AES’s
secure key exchange. structure, particularly with the MixColumns and
SubBytes transformations, reduces the
computational complexity by utilizing bitwise
operations and XOR, making it computationally
III. IMPLEMENTATION AND TESTING
efficient.
A. Implementation of AES
D. Performance Comparison
The AES algorithm processes data in 128-bit blocks
The performance comparisons done for AES are basically
employing three key sizes of 128, 192, and 256 bits. The
related to speed and resource efficiency. Among them, AES-
Rijndael algorithm, upon which AES is based, involves
128 is the fastest due to the lesser number of rounds, hence
several rounds of transformation depending on the key length.
making it applicable to real-time encryption scenarios in file
AES-128 has 10 rounds of operation while AES-192 and
encryption and secured communications. However, AES-256
AES-256 have a round of operation of 12 and 14 respectively.
provides enhanced security at the cost of slower performance;
This is because of the application process this focuses on is
hence, it would be preferable in environments where security
the AES-128 implementation which is the most preferred
is a prime concern over speed.
because of the excellent compatibility with good security.
In summary, if implemented in hardware, AES-128 offers
a high-speed encryption solution along with outstanding
In this implementation, Verilog is employed for modelling
efficiency of resources, especially for applications that
the flow of the AES algorithm for synthesis on an FPGA
require low latency and high throughput.
platform. This hardware approach is chosen because of high-
throughput capability which is suitable for security
applications with real time encryption such as wireless and E. Implementation of RSA
mobile telephony. The implementation of the RSA algorithm for data encryption
B. Key Components in AES Implementation and decryption was executed using Python. The following
libraries were utilized to support the implementation;
• SubBytes Transformation - Every block byte is
substituted by a substitution table byte in such a way, • PyCrypto - This library is used for cryptographic
S-box is designed to introduce very effectively the functionalities, which include RSA encryption and
properties of non-linearity and strength in decryption processes.
cryptographic sense. • NumPy - Used in handling numerical operations,
hence useful in handling large integers that result
• ShiftRows Transformation - The rows in this state array from the nature of RSA.
undergo left circular shift about a variable number of • SoundFile - A Python library for reading and
offsets to provide diffusion over the block.
writing a wide variety of audio file formats used to
• MixColumns Transformation - Mixing in each column ensure that the speech data is in a correct format to
of the state matrix is carried out, where the four bytes be analyzed.
are combined to provide further diffusion. This
operation ensures that even a small change in plaintext The RSA algorithm was implemented following standard
or key affects many parts of the ciphertext. procedures for key generation, encryption, and decryption.
• AddRoundKey - The state matrix is XORed with the
round key, which is derived from the key schedule.
This step happens in every round to mix the key
material into the encryption process.
C. Testing Approach for AES
a) The AES algorithm is tested using encryption and
decryption on sample datasets to evaluate its performance
based on the following key aspects
• Encryption/Decryption Speed - The speed of
AES-128 is influenced by the number of rounds and
encryption and decryption speed, resource usage in terms of
CPU and memory. The result was matched against RSA to
show which cryptographic algorithm is more efficient for
various scenarios.

H. Speed Comparison between AES and RSA


AES works on a symmetric key, and RSA works on an
asymmetric key. Therefore, AES is way faster compared to
RSA. As far as taking time during encryption and decryption
of data, AES takes less time for most types of files and their
sizes. For example, the encryption of a student database using
AES-256 and RSA algorithms for cloud computing showed
that AES was a little faster because of its symmetric
functionality.
In fact, it emerged that AES was very efficient in the
encryption of larger files, especially when optimized versions
of the Advanced Encryption Standard algorithm were used.
1. Key Generation - Generation of RSA keys, Optimized AES returned very low encryption times when
including a public key used for encryption and a compared to conventional AES. For instance, encryption of a
private key used for decryption. 10MB MP4 file using optimized AES took approximately
2. Encryption - Data was converted into bytes and 0.0302 seconds compared to 0.0450 seconds returned by
encrypted with the help of a public key. conventional AES.
3. Decryption - The encrypted data was further
decrypted using the private key. Then the output was
converted to audio format to play the output. I. CPU and Memory Resource Usage
When comparing the CPU and memory usage in the
processes of encryption and decryption, it could be identified
F. Testing Approaches of RSA that, under all conditions, AES utilized fewer resources than
To evaluate the performance of the RSA algorithm, a RSA. The optimized AES framework, which contained
series of tests were conducted with various sample audio additional techniques for shrinking and encoding layers,
files, focusing on the following aspects showed further reductions in both CPU and memory usages.
It uses about 23.86 MB on average for a 2500KB JPG file
1. Encryption/Decryption Speed encryption, for example, in AES. Whereas in RSA, because
The time taken to encrypt and decrypt the sample audio files of the high computational complexity, the usage will be
was measured. Different key sizes were tested, including higher.
1024, 2048, and 4096 bits, to observe how these sizes The decrypted performance also tended to follow similar
impacted the speed of operations. trends. AES completed the tasks faster and used fewer
resources than RSA. This advantage is of utmost importance
2. Key Sizes (for both AES and RSA) in real-time applications, where efficiency in resource usage
For the RSA implementation, key sizes of 1024, 2048, and is paramount.
4096 bits were evaluated. In comparison, AES key sizes of
128, 192, and 256 bits were used. This provided a broader J. Performance Comparison of AES and RSA
context for understanding performance relative to another Results from the tests conducted show that AES is faster
common encryption standard. and more efficient in resource utilization compared to RSA
during encryption and decryption operations involving large
3. Resource Usage datasets. This concludes that AES is more suitable for
CPU usage and memory consumption were tracked for applications in rapid data encryption, such as cloud storage
encryption and decryption. Performance metrics- such as the and data transmission. In contrast, RSA would be better used
number of utilized CPU cycles and the quantum of memory with secure key exchanges instead of bulk data encryption.
allocated-have been tracked using profiling tools. Further optimization resulted in the rise in AES
performance in frameworks, which were highly applicable in
4. Performance Comparison of AES and RSA cloud environments owing to their scalability and efficiency.
RSA was compared with AES with respect to speed in
encryption, resource usage, and efficiency in the process.
IV. PERFORMANCE EVALUATION
This will help in knowing whether either or both have a bias
toward any particular aspect. A. Detailed Results of the Performance Tests
1. Speed Comparison for RSA with Different Key
G. AES Performance Evaluation Sizes and Data Sizes
Performance evaluation of AES has been conducted The study conducted by Patil and Shrinivas (2023)
against different key sizes, differently sized data for provides a comprehensive analysis of the encryption
and decryption speeds of the RSA algorithm using
various key sizes. The results demonstrate that as the • Slower Performance - Tests show
key size increases, the time required for both evidence that generally RSA tends to
encryption and decryption also increases be slower compared to symmetric
significantly. For instance, algorithms. With increased key
sizes, it is less applicable for large
a. RSA (1024-bit)
data encryption and real-time
i. Encryption speed: ~1-2 ms applications.
ii. Decryption speed: ~10-20 ms • Higher Resource Usage - Since this
algorithm is computationally
b. RSA (2048-bit)
intensive in nature, it is bound to use
i. Encryption speed: ~3-5 ms more CPU and memory. This could
pose a problem for resource-
ii. Decryption speed: ~30-50 ms constrained environments.
c. RSA (4096-bit)
i. Encryption speed: ~10-20 ms
V. SECURITY ANALYSIS OF AES
ii. Decryption speed: ~100-200 ms AES (Advanced Encryption Standard) is a widely used
These results indicate that RSA symmetric key encryption algorithm. However, like all
becomes less efficient with larger cryptographic algorithms, AES is not immune to
key sizes, which may limit its vulnerabilities, particularly when analyzed under specific
practicality in scenarios requiring attack vectors such as side-channel attacks.
rapid processing.
2. Resource Usage
A. Known Vulnerabilities of AES
RSA algorithm’s resource utilization was investigated in
terms of CPU and memory consumption using encryption and One major vulnerability of AES lies in side-channel
decryption techniques. The results are as follows, attacks, which exploit the physical implementation of the
algorithm rather than weaknesses in the algorithm itself.
a. CPU Usage - The usage increased with the Side-channel attacks on AES include cache-based attacks and
increase in key size, showing higher
timing attacks.
computational overhead.
While cache-based attacks would exploit the way data is
b. Memory Usage - Memory consumption fetched and stored in the CPU cache during encryption
was monitored and reported, showing that processes, access-driven attacks observe which parts of the
larger keys also required more memory cache are accessed by the AES process. Time-driven attacks
resources. look at changes in execution time to gather information about
the key of the encryption. Such an attack will be able to
succeed in several AES implementations, including AES-128
and AES-256, even with larger key sizes.
While conceptually more secure because of its key size,
AES-256 has also been shown to only marginally increase the
difficulty of such attacks. Research has shown, for instance,
that in specific cache-based attacks, AES-256 takes about 6
to 7 times more effort to compromise than AES-128. This is
because the focus of an attack would lie in the last round key,
which can be deduced by analyzing the cache behavior.
B. Security Considerations for AES
In real-world contexts, AES is preferred for its balance
between performance and security. In fact, AES finds
3. Analysis of the Advantages and Disadvantages of widespread applications in cases where fast encryption is
RSA Based on Test Results required, such as data encryption for storage and
communications security. In any case, the discussed
a. Advantages
vulnerabilities underpin the need to employ good practices in
• Strong Security - RSA provides secure implementation, including the adoption of
excellent security over the countermeasures like masking or constant-time algorithms
distribution of keys. These are that mitigate the possibilities of side-channel attacks.
generally trusted everywhere for
secure communications.
VI. SECURITY ANALYSIS OF RSA
• Asymmetric Nature - Since the
public/private key setup doesn't A. Known Vulnerabilities of RSA
require sharing secret keys, it's safer.
1. Key Length Vulnerabilities
b. Disadvantages
• RSA’s security highly depends on the size of the should be used, together with strong padding
key it uses. With increased computation power, schemes such as Optimal Asymmetric
smaller lengths of keys, such as 1024-bit keys, Encryption Padding (OAEP).
will also emerge to become quite vulnerable to
brute-force attack. According to the findings of 2. Data Integrity and Digital Signatures
Bhardwaj et al. (2015), at least 2048-bit keys • RSA is effective in creating digital signatures
must be used in order to avoid this risk. that give assurance of integrity and authenticity
• As quantum computing develops, RSA whose of data. Every message signed by a private key
key length is less than 4096 bits could be more will ensure that in case of tampering with the
vulnerable to attacks such as Shor's algorithm, data, it would be detected through verification
which can factor large numbers efficiently. using the corresponding public key.
• It makes RSA popular in such cases where
2. Mathematical Attacks verification and authentication are needed, such
• RSA depends on the difficulty of factoring as software distribution, financial transactions,
extremely large composite numbers. However, and legal documents.
with enhanced algorithms like the General
Number Field Sieve, the capability to perform 3. Performance Trade-offs
factorization has risen sufficiently that the • RSA is computationally intensive and thus
security of RSA, with key sizes that are hardly suited for large data volumes that need
considered weak, is breached. to encrypt. Therefore, in practice, symmetric
algorithms such as AES are more applicable for
3. Implementation Flaws bulk data encryption.
• Side-Channel Attacks - RSA is vulnerable to • It is desirable that RSA be used to encrypt only
side-channel attacks like timing attacks or small pieces of data, such as symmetric keys,
power analysis attacks, which can reveal that could subsequently be used by much faster
information about the private key based on the encryption algorithms for bulk data encryption.
physical characteristics of the cryptographic .
operation.
VII. REAL-WORLD APPLICATIONS (AES)
Generally, AES is considered one of the most efficient and
4. Vulnerability to Chosen Ciphertext Attacks
secured encryption algorithms. Many real-life applications
(CCA) have utilized it because it is effective in accomplishing data
• Poor implementation or lack of good padding encryption and decryption while ensuring its security
schemes, such as PKCS#1 v1.5, may make attribute.
RSA vulnerable to Chosen Cyphertext Attacks
(CCA). The attackers might have decrypted the
A. Secure Voice Communication
intercepted ciphertext owing to the weakness of
One of the prominent application examples of AES in
the padding method. action is real-time secured voice communication systems.
Basically, it is often implemented using FPGA (Field
Proper implementation techniques, such as blinding, can Programmable Gate Arrays). In such scenarios, AES provides
reduce the risk of these attacks by randomizing the decryption encryption to the voice data before it is wirelessly transmitted.
process A design in one such study employed a 128-bit AES algorithm
for encrypting voice signals, thus offering high security during
transmission. It was designed to keep the quality of voice
B. Security Considerations for RSA excellent over the transmission of RF modules, hence
protecting sensitive communication against interception.
1. Secure Key Exchange
• RSA is used for secure key exchanges in many
applications because its asymmetric nature B. File Encryption
allows the determination of symmetric keys AES is normally used for file encryption at personal and
enterprise levels. Many different file encryption utilities and
without an actual sensitive information
software use AES to protect sensitive information like
exchange. It finds its perfect application in financial or other personal information in a way that
establishing secure channels of communication. unauthorized users cannot read the encrypted data.
• In order to make such key exchanges more
secure, large key sizes of at least 2048 bits
C. Secure Communication Protocols ACKNOWLEDGMENT
AES secures very important communication protocols We would like to express our sincere gratitude to Sri
such as SSL/TLS used in data protection sent over the internet. Lanka Institute of Information Technology and IT Department
This makes these protocols very critical since most web for providing us with the necessary resources and guidance to
communications, online transactions, and VPNs depend on complete this research. Our deepest appreciation goes to our
this protocol for confidentiality of data and none thereof lecturer, Mr. Kavinga Abeywardena, for their invaluable
intercepts data during transmission. insights, continuous support, and encouragement throughout
the study. We are also grateful to our peers and colleagues for
their constructive feedback and assistance during the research
D. Disk and Storage Encryption process. Lastly, we extend our heartfelt thanks to our families
AES is used in full-disk encryption applications such as for their unwavering support and understanding during the
BitLocker and FileVault. These programs lock an entire drive course of this project.
and make its contents inaccessible to unauthorized users if the
drive becomes lost or otherwise compromised. Because a
great amount of data is being encrypted with these utilities, REFERENCES
AES also handles those situations quite efficiently.
[1] Tyagi, M., Manoria, M., & Mishra, B. (2019). Analysis and
Implementation of AES and RSA for cloud. International Journal of
Applied Engineering Research, 14(20), 3918.
VIII. REAL-WORLD APPLICATIONS(RSA) https://doi.org/10.37622/ijaer/14.20.2019.3918-393
A. Secure Web Communication (SSL/TLS) [2] Camenisch, J., & Lysyanskaya, A. (2001). An Efficient System for
Non-transferable Anonymous Credentials with Optional Anonymity
RSA plays a huge role in the SSL/TLS protocols that Revocation. In Lecture notes in computer science (pp. 93–118).
secure data transfer over the internet. It acts during the https://doi.org/10.1007/3-540-44987-6_7
handshake, where symmetric keys are exchanged between the [3] Kaminsky, A., Kurdziel, M., & Radziszowski, S. (2010). An overview
server and client in such a way that they become secret. For of cryptanalysis research for the advanced encryption standard. An
instance, finding applications in online banking, e-commerce Overview of Cryptanalysis Research for the Advanced Encryption
Standard. https://doi.org/10.1109/milcom.2010.5680130
websites, and many other services relying on secure
[4] Heron, S. (2009). Advanced Encryption Standard (AES). Network
transmission of data for sensitive information provided by the Security, 2009(12), 8–12. https://doi.org/10.1016/s1353-
users. 4858(10)70006-4
B. Digital Signatures [5] Scripcariu, L., Diaconu, F., Matasaru, P. D., & Gafencu, L. (2018).
AES Vulnerabilities Study. AES Vulnerabilities Study.
RSA is one of the common algorithms in generating digital https://doi.org/10.1109/ecai.2018.8678930
signatures that assure the authenticity of messages or [6] Mondal, S., & Sharma, R. K. (2019). Application of Advanced
documents. Digital Signatures from RSA normally find their Encryption Standard on Real Time Secured Voice Communication
application within financial industries to verify authentic using FPGA. Application of Advanced Encryption Standard on Real
Time Secured Voice Communication Using FPGA, 1–6.
transactions, assure security in communication, and protect https://doi.org/10.1109/icccnt45670.2019.8944857
sensitive information against tampering during transmission.
[7] Smid, M. E. (2021). Development of the advanced Encryption
Standard. Journal of Research of the National Institute of Standards
and Technology, 126. https://doi.org/10.6028/jres.126.024
C. Email Encryption
[8] Pitchaiah, M. (2012). Implementation of Advanced Encryption
E-mail encryption systems like PGP and S/MIME use Standard Algorithm. Implementation of Advanced Encryption
RSA to provide security for e-mail messages. It encrypts the Standard Algorithm.
symmetric keys used to protect message content that ensures https://www.ijser.org/researchpaper/Implementation-of-Advanced-
Encryption-Standard-Algorithm.pdf
messages are decrypted by targeted recipients only.
[9] Assa-Agyei, K., Olajide, F., & Alade, T. (2023). Optimizing the
performance of the advanced encryption Standard techniques for
secured data transmission. International Journal of Computer
D. Cryptographic Hardware Devices Applications, 185(21), 31–36. https://doi.org/10.5120/ijca2023922941
RSA is used to manage cryptographic keys and perform [10] Karanam, M., S, S. R., Chakilam, A., & Banothu, S. (2023).
Performance evaluation of cryptographic security algorithms on cloud.
some encryption operations securely with the help of E3S Web of Conferences, 391, 01015.
Hardware Security Modules and secure tokens. Moreover, https://doi.org/10.1051/e3sconf/202339101015
such devices become indispensable in sensitive data [11] Daemen, J., & Rijmen, V. (2020). The design of Rijndael. In
protection and assurance of secure key management in Information security and cryptography. https://doi.org/10.1007/978-3-
environments like data centers and enterprise networks. 662-60769-5

View publication stats

You might also like