INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 10 NO. 5 2024
DOI: 10.56201/ijcsmt.v10.no5.2024.pg81.89


Utilising Simulation Technique to Examine the Security of Various Key Sizes on Rijandael, FPA, and RC4 Algorithms in VB.NET

SG Auyo, A Yushau, MH Faskari, AS Yabo, AA Ibrahim, ZS Zakari, SS Chiroma AI Marafa


Abstract


A breach of the unprotected electronic data might result in sensitive or confidential information being taken, changed, copied, sent, viewed, or used without authority. This study focuses on having security testing of Rijindael, Rivest Cipher4 and Format Preserving Algorithms in VB.Net Using simulation Comparison Techniques by comparing three (3) encryption algorithms by simulation method to know the most secured algorithm in VB.Net of different minimum and maximum key sizes to determine the security. The study also evaluate the three most common encryption algorithms like Rijandael, Rivest Cipher4 and Format Preserving Encryption Algorithm. A simulation comparison were conducted for those three (3) encryption algorithms at different settings for each algorithm such as minimum and maximum key size change to know which among those algorithms performs cryptography in the most secured way. Results from simulation analysis showed that Rivest Cipher4 (RC4) is the best algorithm in terms of security among the other compared contenders using the higher key size and lower key size as it maintain an average time for each key size both (Min & Max) followed by Rijandael and format preserving algorithm. This study therefore recommend the adoption of Rivest Cipher4 (RC4) in VB.Net in terms of secured cryptography.


keywords:

Electronic Code Book, Format Preserving, Performance, Rijandael, Rivest Cipher,


References:


Alenezi, M. N., Alabdulrazzaq, H., & Mohammad, N. Q. (2020). Symmetric encryption
algorithms: Review and evaluation study. International Journal of Communication
Networks and Information Security, 12(2), 256-272.
Balaraju, J. (2021). Design and analysis of secure hadoop clusters using DNA cryptography.
Genc, T. S., & Raju, Y. D. S. (2020). Implementation of Data Security with Wallace Tree
Approach Using Elliptical Curve Cryptography on FPGA. Turkish Journal of Computer
and Mathematics Education (TURCOMAT), 12(6), 1546-1553.
Hughes-Lartey, K., Li, M., Botchey, F. E., & Qin, Z. (2021). Human factor, a critical weak
point
in
the
information
security
of
an
organization's
Internet
of
things. Heliyon, 7(3), e06522.
Kaydos, W. (2020). Operational performance measurement: increasing total productivity.
CRC press.
Krombholz, K. (2021). On the Usability of Authenticity Checks for Hardware Security Tokens.
In 30th {USENIX} Security Symposium ({USENIX} Security 21).
Li, D., Cai, Z., Deng, L., Yao, X., & Wang, H. H. (2019). The Information Security Model of
Blockchain Is Based on Intrusion Sensing In The IoT Environment. Cluster Computing,
22(1), 451-468.
Li, D., Deng, L., Lee, M., & Wang, H. (2019). IoT Data Feature Extraction And Intrusion
Detection System For Smart Cities Based on Deep Migration Learning. International
Journal of Information Management, 49, 533-545.
Li, J., Greenwood, D., & Kassem, M. (2019). Blockchain in the Built Environment and
Construction Industry: A Systematic Review, Conceptual Models and Practical Use
Cases. Automation in Construction, 102, 288-307.
Liang, Y., He, F., & Li, H. (2019). An Asymmetric and Optimized Encryption Method to
Protect the Confidentiality of the 3D Mesh Model. Advanced Engineering Informatics,
42, 100963.
Liestyowati, D. (2020, March). Public key cryptography. In Journal of Physics: Conference
Series (Vol. 1477, No. 5, p. 052062). IOP Publishing.
Logunleko, K. B., Adeniji, O. D., & Logunleko, A. M. (2020). A comparative study of
symmetric cryptography mechanism on DES AES and EB64 for information
security. Int. J. Sci. Res. in Computer Science and Engineering, 8(1).
Makeri, Y. A. (2020). Integrated Cryptographical Access Control Over Network Project. Acta
Informatica Malaysia (AIM), 4(1), 19-21.
Michalas, A. (2019, April). The Lord of the Shares: Combining Attribute-Based Encryption
and Searchable Encryption for Flexible Data Sharing. In Proceedings of the 34th
ACM/SIGAPP Symposium on Applied Computing (pp. 146-155).
Mohammed, S. J., & Taha, D. B. (2022, March). Performance Evaluation of RSA, ElGamal,
and Paillier Partial Homomorphic Encryption Algorithms. In 2022 International
Conference on Computer Science and Software Engineering (CSASE) (pp. 89-94).
IEEE.
Rouhani, S., & Deters, R. (2019). Security, performance, and applications of smart contracts:
A systematic survey. IEEE Access, 7, 50759-50779.
Syed, N. F., Shah, S. W., Trujillo-Rasua, R., & Doss, R. (2022). Traceability in supply chains:
A Cyber security analysis. Computers & Security, 112, 102536.
Zeebaree, S. R., Zebari, R. R., Jacksi, K., & Hasan, D. A. (2019). Security Approaches For
Integrated Enterprise Systems Performance: A Review. Int. J. Sci. Technol.
Res, 8(12).


DOWNLOAD PDF

Back