INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 9 NO. 5 2023
DOI: https://doi.org/10.56201/ijcsmt.v9.no5.2023.pg12.18


Assessing the Effectiveness of Java Encryption Methods for Image, Video, Audio, and Document Data Types

Auyo SG, Kamal SW, Yushau A, Ibrahim AA


Abstract


Confidential data is concealed through encryption, which turns it into an unintelligible format. This study aims to evaluate the efficiency of encryption techniques for Image, Video, Audio, and Document Data Types in Java. This study provides an efficiency comparison benchmarking evaluation to analyze three encryption algorithms i.e. Blowfish, Rivest Cipher2, and Triple Data Encryption Standard to choose the best in terms of size and time efficiency. By evaluating the time/size required by the algorithms to encrypt and decrypt the different data types in different data block sizes using an electronic codebook (ECB), benchmarking has been done using Java. In this study, Rivest Cipher2 (RC2) appears to be the best encryption/decryption algorithm in JAVA programming, outperforming the two most popular encryption algorithms, Blowfish, and Triple Data Encryption Standard (3DES), in benchmarking comparisons at various settings for each algorithm and different size of data blocks. The key factor that distinguishes RC2 as the best algorithm among the two is that it maintains lowest time efficiency followed by blowfish second 3DES with a slight difference and a difference of fewer milliseconds. 3DES is not a significantly worse algorithm, but it takes longer to complete than the other algorithms. Likewise all the three contender’s algorithms RC2, Blowfish and 3DES are very good in terms of size efficiency evaluation having maintaining average size.


keywords:

Blowfish, Graphical User Interface, Decrypt, Encrypt, Rivest Cipher, Triple Data Encryption


References:


[1] Hahn, D., Munir, A., & Behzadan, V. (2019). Security and privacy issues in intelligent
transportation systems: Classification and challenges. IEEE Intelligent Transportation Systems
Magazine, 13(1), 181-196.

[2] Katagiri, A., & Min, E. (2019). The credibility of public and private signals: A document-
based approach. American Political Science Review, 113(1), 156-172.


DOWNLOAD PDF

Back


Google Scholar logo
Crossref logo
ResearchGate logo
Open Access logo
Google logo