AnalysisandImplementationofAESandRSA CryptographyY3S1
AnalysisandImplementationofAESandRSA CryptographyY3S1
net/publication/387879632
CITATIONS READS
0 220
4 authors:
All content following this page was uploaded by Dhanuka Nanayakkara on 10 January 2025.
Nanayakkara K. A. D. D. S. Wijesinghe R. P. D. K. N.
IT22365514 IT22123404
Computer System Engineering Computer System Engineering
Department Department
(Cyber Security) (Cyber Security)
Malabe, Sri Lanka Malabe, Sri Lanka
[email protected] [email protected]
Abstract— This report presents a comprehensive evaluation applications, with particular attention to real-world
of selected cryptographic algorithms, specifically focusing on deployment issues related to performance, security, and
the Advanced Encryption Standard (AES) as the symmetric key resource consumption.
algorithm and the Rivest-Shamir-Adleman (RSA) algorithm as
the asymmetric key algorithm. The study explores the design A. History and Background
principles, historical context, and practical applications of both AES was thus introduced to address certain limitations that
AES and RSA. We conduct in-depth research on their known were found in the previous symmetric key block cipher called
vulnerabilities and performance characteristics, followed by the DES, which, by then, had turned susceptible to brute-force
implementation of these algorithms using appropriate attacks. In 1997, National Institute of Standards and
programming languages. Initial testing focuses on encrypting Technology called for some solid replacement in the form of
and decrypting sample data while measuring fundamental
a competition-the Advanced Encryption Standard, or AES for
performance metrics. Comprehensive testing assesses algorithm
performance under varying conditions, including different key
short. They came up with an algorithm called Rijndael, written
sizes and input data types, allowing for detailed analysis of by Vincent Rijmen and Joan Daemen. In 2001, AES was
encryption time, CPU usage, and memory consumption. The officially adopted and approved to encrypt sensitive but
findings aim to provide valuable insights into the applicability unclassified U.S. federal information..
of AES and RSA in real-world scenarios, guiding future B. Key Features
decisions in security implementations.
AES is a symmetric block cipher, meaning it uses the same
Keywords— AES, RSA, Cryptography, Symmetric Key key for both encryption and decryption. The algorithm works
Algorithm, Asymmetric Key Algorithm, Encryption, Decryption, on a block size of 128 bits and supports key sizes of 128, 192,
Performance Analysis, Security Vulnerabilities, Algorithm and 256 bits, with varying numbers of encryption rounds
Implementation, Cryptographic Algorithms, Key Sizes, CPU depending on the key length. Specifically:
Usage, Memory Consumption.
Development
B. Technical details • Standard Key Sizes - RSA typically uses key sizes of
1024, 2048, or 4096 bits, with larger sizes being more
Secure Data Transmission - The RSA algorithm involves secure but slower in terms of processing.
two main steps:
• Prime Number Generation - The process involves
Encryption - The plaintext message is converted into a selecting two large prime numbers (denoted as ppp and
numerical format and raised to the power of the public key qqq) and multiplying them to form the modulus
exponent eee, then reduced modulo nnn. The result is the n=p×qn = p \times qn=p×q. The difficulty in breaking
ciphertext. RSA lies in the challenge of factorizing this large
number nnn into its constituent primes.
Decryption - The ciphertext is raised to the power of the
private key exponent ddd and then reduced modulo nnn, • A graph within a graph is an “inset”, not an “insert”.
converting it back to the original plaintext message. The word alternatively is preferred to the word
“alternately” (unless you really mean something that
Mathematically, the process can be expressed as: alternates).