Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing †
Abstract
:1. Introduction
2. Literature Review
2.1. Security of the Cloud
2.2. Asymmetric Algorithms
2.3. Symmetric Algorithms
3. Comparative Analysis
3.1. Advance Encryption Standard (AES)
3.1.1. Key Generation Process of AES Algorithm
- First row is not shifted;
- One (byte) position shifts to the left-hand side in the second row;
- Two places shift to the left in the third row;
- Three places shift to the left in the fourth row;
- Finally, a new matrix is generated with a similar 16 bytes but they move with respect to each other.
3.1.2. AES Merits and De-Merits
- AES is faster in comparison with other algorithms;
- Due to its extra fast speed, it becomes extremely difficult to hack or access the data.
- A high amount of excessive and complex algebra is being used;
- The deployment and implementation of its software carries some difficulties.
3.2. RSA Algorithm
3.2.1. Key Generation Process of RSA Algorithm
- Assign two random large prime numbers, m and n, and calculate p = m * n;
- Compute the golden ratio of p, ȹ (p) = (m − 1)(n − 1);
- Choose integer e such that the greatest common divisor of (ȹ (p), e) = 1 and 1 < e < ϕ (n);
- Compute d = e−1 mod (ϕ (n));
- The public key is found from (e, p) and the private key is found from (d, p);
3.2.2. Rsa Merits and De-Merits
- It provides a safe, secure and protected transfer of data;
- It makes it difficult for hackers/crackers to crack the file.
- Time required by RSA is greater and makes the process slow when large data are used.
3.3. Time Complexity Analysis
3.4. Experimental Analysis
4. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Harfoushi, O.; Obiedat, R. Security in Cloud Computing Using Hash Algorithm: A Neural Cloud Data Security Model. Mod. Appl. Sci. 2018, 12, 143–150. [Google Scholar] [CrossRef]
- Alharabi, M.F.; Aldosari, F.; Alharbi, N.F. Review of Some Cryptographic Algorithms In Cloud Computing. Int. J. Comput. Sci. Netw. Secur. 2021, 21, 41–50. [Google Scholar]
- Emmanuel, A.; Aderemi, O.; Marion, A.; Emmanuel, A. A Note on Time and Space Complexity of RSA and ElGamal Cryptographic Algorithms. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 143–147. [Google Scholar] [CrossRef]
- Singhal, S.; Singhal, N. Comparitive Analysis of AES and RSA Algorithms. Int. J. Sci. Eng. Res. 2016, 7, 149–151. [Google Scholar]
- Alabi, O.; Thompson, A.; Alese, B.K.; Gabriel, A.J. Cloud Application Security using Hybrid Encryption. In Communications on Applied Electronics (CAE); Foundation of Computer Science FCS: New York, NY, USA, 2020. [Google Scholar]
- Manoj, T.; Manoria, M.; Mishra, B. Analysis and Implementation of AES and RSA for cloud. Int. J. Appl. Eng. Res. 2019, 25, 3918–3923. [Google Scholar]
- Chouhan, T. Enhancement of Cloud Computing Security with Secure Data Storage using AES. Int. J. Innov. Res. Sci. Technol. 2016, 2, 18–21. [Google Scholar]
- Monisha, K.R. Secure cloud computing using AES and RSA algorithms. Int. J. Adv. Comput. Sci. Cloud Comput. 2015, 3, 77–82. [Google Scholar]
- Priya, C.; Kannan, M.; Vaishnavi, S. A comparative analysis of DES, AES and RSA crypt algorithms for network security in cloud computing. J. Emerg. Technol. Innov. Res. 2019, 6, 574–582. [Google Scholar]
- Kanika, T.; Yadav, S.K.; Singh, M. Cloud data security and various security algorithms. J. Phys. Conf. Ser. 1998, 2021, 012023. [Google Scholar]
- Inaam ul haq, M. Analytical comparison of RSA and AES using windows azure for cloud computing environment. Sci. Int. 2016, 28, 2339–2344. [Google Scholar]
- Thakkar, B.; Thankachan, B. A Survey for Comparative Analysis of various Cryptographic Algorithms used to Secure Data on Cloud. Int. J. Eng. Res. Technol. 2020, 9, 753–756. [Google Scholar]
- Semwal, P.; Sharma, M.K. Comparative Study of Different Cryptographic Algorithms for Data Security in Cloud Computing. Int. J. Emerg. Technol. 2017, 8, 746–750. [Google Scholar]
FACTORS | AES | RSA |
---|---|---|
Key length | 128, 192, 248 bits | Depends on bits in modulus m = p * q |
Rounds | 10–128 bits, 12–192 bits, 14–256 bits | 1 |
Block size | 128 | Minimum 512 bits |
Cypher | Symmetric cipher | Asymmetric cipher |
Speed | Fast | Slow |
Security | Highly secure | Least secure |
Power | Low | High |
Resource | Consumes more with big data | Very high |
Cryptanalysis | Strong against attacks | Brute force attacks hard to accomplish |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Fatima, S.; Rehman, T.; Fatima, M.; Khan, S.; Ali, M.A. Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing. Eng. Proc. 2022, 20, 14. https://doi.org/10.3390/engproc2022020014
Fatima S, Rehman T, Fatima M, Khan S, Ali MA. Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing. Engineering Proceedings. 2022; 20(1):14. https://doi.org/10.3390/engproc2022020014
Chicago/Turabian StyleFatima, Sana, Tanazzah Rehman, Muskan Fatima, Shahmeer Khan, and Mir Arshan Ali. 2022. "Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing" Engineering Proceedings 20, no. 1: 14. https://doi.org/10.3390/engproc2022020014