Research Article
BibTex RIS Cite

Simetrik ve Asimetrik Şifreleme Algoritmalarının Performans Karşılaştırılması

Year 2023, , 891 - 900, 01.09.2023
https://doi.org/10.35234/fumbd.1296228

Abstract

İnternet tabanlı teknolojilerin her geçen gün artması, dünyadaki veri oluşumunu da sürekli artırmakta ve veri büyüklüğü genişledikçe kullanıcılar için bilginin güvenliği ve gizliliği risk taşımaktadır. Güvenli olmayan bir iletişim kanalı üzerinden veriler iletildiğinde tehlikeli durumların minimuma indirgenmesi veya tamamen önlenmesi için önerilen yöntemlerden biri kriptografik algoritmalardır. Temeli matematiksel ifadelere dayanan tekniklerin ve uygulamalarının birleşimini içeren tüm şifreleme algoritmaları; verilerin kullanılabilirliğini, gizliliğini ve bütünlüğünü korumayı amaçlamaktadır. Ancak başarımları; seçilen dosya türü, boyutu, karmaşıklığı, anahtar yapısı ve kullanılan bilgisayar platformu(yazılım ve donanım) gibi çeşitli faktörlere göre değişmektedir. Bu faktörler temelinde, üç farklı simetrik(AES, Blowfish, Cast-128) ve asimetrik(ECDH, El-Gamal, RSA) şifreleme algoritması kullanılarak bir uygulama yapılmıştır. “The Da Vinci Code” adlı içerikten üretilen 100 KB, 1, 5 ve 100 MB arasında değişen 4 adet çeşitli metinsel dosya boyutlarının karmaşıklığı; UTF-8 tablo yapısındaki birleşimleridir. Anahtar(gizli ve açık) sistemi; 32 karakterden(256 bit) oluşan mimaridir ve uygulama platformu; yazılım için, Windows, Python VS Code, donanım için, Intel I7-CPU, 16 GB RAM, 4 GB-GPU kullanılmıştır. Literatürde kabul edilen performans kriterleri; şifreleme ve şifre-çözmedeki hızı (s), bellek (MB) ve CPU (%) kullanım oranları temel alınarak başarımları değerlendirilmiştir. Böylece, simetrik ve asimetrik şifreleme algoritmalarının başarımları aynı veri setleri üzerinde karşılaştırılmıştır. Simetrik şifreleme algoritmalarının başarım sonuçlarının daha iyi olduğu gözlemlenmiştir.

References

  • Şatir E, Kendirli O. A symmetric dna encryption process with a biotechnical hardware. Journal of King Saud University – Science 2022; 34(3): 1-10.
  • Alenezi MN, Alabdulrazzaq H & Mohammad NQ. Symmetric encryption algorithms: review and evaluation study. International Journal of Communication Networks and Information Security 2020; 12(2): 256-272.
  • Kaya A, Türkoğlu İ. Evaluation of symmetric cryptography algorithms in terms of performance analysis. Cukurova 10th Internatıonal Scıentıfıc Researches Conference; 2-4 April 2023; Adana-Türkiye. pp. 4048-462.
  • Kaya A, Türkoğlu İ. Evaluation of asymmetric cryptography algorithms in terms of performance analysis. 4. International Cappadocia Scientific Research Congress; 16-17 April 2023; Nevşehir- Türkiye. pp. 1056-1070.
  • Sood R, Kaur H. A literature review on rsa, des and aes encryption algorithms. In Vikram Dhiman & Pooja Dhand (eds.), Emerging Trends in Engineering and Management 2023; 57–63.
  • Olutola A, Olumuyiwa M. Comparative analysis of encryption algorithms. European Journal of Tech. 2023;7(1): 1 -9.
  • Luo Z, Shen K, Hu R, Yang Y & Deng R. Optimization of aes-128 encryption algorithm for security layer in zig bee networking of internet of things. Computational Intelligence and Neuroscience 2022; 1-11.
  • Thirupalu U, Reddy EK. Performance analysis of cryptographic algorithms in the information security. International Journal of Engineering Research & Technology (IJERT) 2019; 8(2):63-69.
  • Abood OG, Guirguis SK. A survey on cryptography algorithms. International Journal of Scientific and Research Publications 2018; 8(7): 410–415.
  • Dixit P, Gupta AK, Trivedi MC, Yadav VK. Traditional and hybrid encryption techniques: a survey. In Networking Communication and Data Knowledge Engineering 2018; 4: 239–248.
  • Mushtaq MF, Jamel S, Disina AH, Pindar ZA, Shakir NSA, Deris MM. A survey on the cryptographic encryption algorithms. (IJACSA) International Journal of Advanced Computer Science and Applications 2017; 8(11): 333-344.
  • Brown D. The Da Vinci Code. ABD; Random House, 2003.
  • Basu S, Karuppiah M, Nasipuri M, Halder AK, Radhakrishnan N. Bio-inspired cryptosystem with dna cryptography and neural networks. Journal Of Systems Architecture 2019; 94: 27-31.
  • Kerckhoffs A. La cryptographie militaire. Journal Des Sciences Militaires 1883; 9: 5–38.
  • Shannon CE. Communication theory of secrecy system. Bell Syst. Tech. J. 1949; 28: 656–715.
  • Indrasena RM, Siva KAP, Subba RK. A secured cryptographic system based on dna and a hybrid key generation approach. Biosystems 2020; 197: 1-10.
  • Rahman G, Wen CC. Omega network pseudorandom key generation based on dna cryptography. Applied Sciences 2022; 12(16): 1-19.
  • Erişim Tarihi:10.07.2023, https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences
  • Kodaz H, Botsalı FM. Simetrik ve asimetrik şifreleme algoritmalarının karşılaştırılması. Selçuk-Teknik Dergisi 2010; 9(1): 10-23.
  • Panhwar MA, Khuhro SA, Panhwar G, Ali K. Saca: a study of symmetric and asymmetric cryptographic algorithms. IJCSNS International Journal of Computer Science and Network Security 2019; 19(1): 48-55.
  • Al-Shabi MA. A survey on symmetric and asymmetric cryptography algorithms in information security. International Journal of Scientific and Research Publications 2019; 9(3): 576-589.
  • Krishnamurthy GN, Ramaswamy V. Encryption quality analysis and security evaluation of cast-128 algorithm and its modified version using digital images. International Journal of Network Security & Its Applications 2009; 1(1):28-33.
  • Li J, Luo Y, Wang E, Gao W. Design and implementation of real-time image acquisition chip based on triple-hybrid encryption system. Electronics 2022; 11(18): 1-29.
  • ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985; 31 (4): 469-472.
  • Erişim Tarihi:17.04.2023, https://en.wikipedia.org/wiki/ElGamal_encryption
  • Erişim Tarihi:10.04.2023, https://www.educba.com/elgamal-encryption/
  • Imran OA, Yousif SF, Hameed LS, Al-Din Abed WN, Hammid AT. Implementation of el-gamal algorithm for speech signals encryption and decryption. Procedia Computer Science 2020; 167: 1028–1037.
  • Rani S, Kaur H. Technical review on symmetric and asymmetric cryptography algorithms. International Journal of Advanced Research in Computer Science 2017; 8(4): 182-186.
  • Erişim Tarihi:10.04.2023, https://www.ques10.com/p/33937/el-gamal-cryptography-algorithm/
  • Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21 (2): 120–126.
  • Erişim Tarihi:10.04.2023, https://en.wikipedia.org/wiki/RSA_(cryptosystem)
  • Erişim Tarihi:18.04.2023, https://www.geeksforgeeks.org/rsa-algorithm-cryptography/
  • Al-Juaid N, Gutub A. Combining rsa and audio steganography on personal computers for enhancing security. SN Appl. Sci. 2019; 1(830): 1-11.

Performance Comparison of Symmetric and Asymmetric Encryption Algorithms

Year 2023, , 891 - 900, 01.09.2023
https://doi.org/10.35234/fumbd.1296228

Abstract

The increasing use of Internet-based technologies is constantly increasing the formation of data in the world, and as the size of data expands, the security and privacy of information for users carries risks. When data is transmitted over an unsecured communication channel, one of the recommended methods for minimizing or completely preventing dangerous situations are cryptographic algorithms. All encryption algorithms, the basis of which includes the combination of techniques and their application based on mathematical expressions; aims to protect the availability, confidentiality and integrity of data. However, their achievements; The file type chosen varies according to various factors such as size, complexity, key structure and the computer platform (software and hardware) used. On the basis of these factors, an application was made using three different symmetric (AES, Blowfish, Cast-128) and asymmetric (ECDH, El-Gamal, RSA) encryption algorithms. the complexity of the 4 various textual file sizes ranging from 100 KB, 1, 5 and 100 MB generated from the content called "The Da Vinci Code"; UTF-8 are combinations in a table structure. Key (hidden and public) system; It is the architecture consisting of 32 characters (256 bits) and the application platform; For software, Windows, Python VS Code, for hardware, Intel I7-CPU, 16 GB RAM, 4 GB-GPU are used. Performance criteria accepted in the literature; performance in encryption and decryption was evaluated based on speed (s), memory (MB), and CPU (%) utilization rates. Thus, the performances of symmetric and asymmetric encryption algorithms are compared on the same data sets. It has been observed that symmetric encryption algorithms have better performance results.

References

  • Şatir E, Kendirli O. A symmetric dna encryption process with a biotechnical hardware. Journal of King Saud University – Science 2022; 34(3): 1-10.
  • Alenezi MN, Alabdulrazzaq H & Mohammad NQ. Symmetric encryption algorithms: review and evaluation study. International Journal of Communication Networks and Information Security 2020; 12(2): 256-272.
  • Kaya A, Türkoğlu İ. Evaluation of symmetric cryptography algorithms in terms of performance analysis. Cukurova 10th Internatıonal Scıentıfıc Researches Conference; 2-4 April 2023; Adana-Türkiye. pp. 4048-462.
  • Kaya A, Türkoğlu İ. Evaluation of asymmetric cryptography algorithms in terms of performance analysis. 4. International Cappadocia Scientific Research Congress; 16-17 April 2023; Nevşehir- Türkiye. pp. 1056-1070.
  • Sood R, Kaur H. A literature review on rsa, des and aes encryption algorithms. In Vikram Dhiman & Pooja Dhand (eds.), Emerging Trends in Engineering and Management 2023; 57–63.
  • Olutola A, Olumuyiwa M. Comparative analysis of encryption algorithms. European Journal of Tech. 2023;7(1): 1 -9.
  • Luo Z, Shen K, Hu R, Yang Y & Deng R. Optimization of aes-128 encryption algorithm for security layer in zig bee networking of internet of things. Computational Intelligence and Neuroscience 2022; 1-11.
  • Thirupalu U, Reddy EK. Performance analysis of cryptographic algorithms in the information security. International Journal of Engineering Research & Technology (IJERT) 2019; 8(2):63-69.
  • Abood OG, Guirguis SK. A survey on cryptography algorithms. International Journal of Scientific and Research Publications 2018; 8(7): 410–415.
  • Dixit P, Gupta AK, Trivedi MC, Yadav VK. Traditional and hybrid encryption techniques: a survey. In Networking Communication and Data Knowledge Engineering 2018; 4: 239–248.
  • Mushtaq MF, Jamel S, Disina AH, Pindar ZA, Shakir NSA, Deris MM. A survey on the cryptographic encryption algorithms. (IJACSA) International Journal of Advanced Computer Science and Applications 2017; 8(11): 333-344.
  • Brown D. The Da Vinci Code. ABD; Random House, 2003.
  • Basu S, Karuppiah M, Nasipuri M, Halder AK, Radhakrishnan N. Bio-inspired cryptosystem with dna cryptography and neural networks. Journal Of Systems Architecture 2019; 94: 27-31.
  • Kerckhoffs A. La cryptographie militaire. Journal Des Sciences Militaires 1883; 9: 5–38.
  • Shannon CE. Communication theory of secrecy system. Bell Syst. Tech. J. 1949; 28: 656–715.
  • Indrasena RM, Siva KAP, Subba RK. A secured cryptographic system based on dna and a hybrid key generation approach. Biosystems 2020; 197: 1-10.
  • Rahman G, Wen CC. Omega network pseudorandom key generation based on dna cryptography. Applied Sciences 2022; 12(16): 1-19.
  • Erişim Tarihi:10.07.2023, https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences
  • Kodaz H, Botsalı FM. Simetrik ve asimetrik şifreleme algoritmalarının karşılaştırılması. Selçuk-Teknik Dergisi 2010; 9(1): 10-23.
  • Panhwar MA, Khuhro SA, Panhwar G, Ali K. Saca: a study of symmetric and asymmetric cryptographic algorithms. IJCSNS International Journal of Computer Science and Network Security 2019; 19(1): 48-55.
  • Al-Shabi MA. A survey on symmetric and asymmetric cryptography algorithms in information security. International Journal of Scientific and Research Publications 2019; 9(3): 576-589.
  • Krishnamurthy GN, Ramaswamy V. Encryption quality analysis and security evaluation of cast-128 algorithm and its modified version using digital images. International Journal of Network Security & Its Applications 2009; 1(1):28-33.
  • Li J, Luo Y, Wang E, Gao W. Design and implementation of real-time image acquisition chip based on triple-hybrid encryption system. Electronics 2022; 11(18): 1-29.
  • ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985; 31 (4): 469-472.
  • Erişim Tarihi:17.04.2023, https://en.wikipedia.org/wiki/ElGamal_encryption
  • Erişim Tarihi:10.04.2023, https://www.educba.com/elgamal-encryption/
  • Imran OA, Yousif SF, Hameed LS, Al-Din Abed WN, Hammid AT. Implementation of el-gamal algorithm for speech signals encryption and decryption. Procedia Computer Science 2020; 167: 1028–1037.
  • Rani S, Kaur H. Technical review on symmetric and asymmetric cryptography algorithms. International Journal of Advanced Research in Computer Science 2017; 8(4): 182-186.
  • Erişim Tarihi:10.04.2023, https://www.ques10.com/p/33937/el-gamal-cryptography-algorithm/
  • Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21 (2): 120–126.
  • Erişim Tarihi:10.04.2023, https://en.wikipedia.org/wiki/RSA_(cryptosystem)
  • Erişim Tarihi:18.04.2023, https://www.geeksforgeeks.org/rsa-algorithm-cryptography/
  • Al-Juaid N, Gutub A. Combining rsa and audio steganography on personal computers for enhancing security. SN Appl. Sci. 2019; 1(830): 1-11.
There are 33 citations in total.

Details

Primary Language Turkish
Subjects Information Security and Cryptology, Cryptography
Journal Section MBD
Authors

Alev Kaya 0000-0002-3544-5267

İbrahim Türkoğlu 0000-0003-4938-4167

Publication Date September 1, 2023
Submission Date May 12, 2023
Published in Issue Year 2023

Cite

APA Kaya, A., & Türkoğlu, İ. (2023). Simetrik ve Asimetrik Şifreleme Algoritmalarının Performans Karşılaştırılması. Fırat Üniversitesi Mühendislik Bilimleri Dergisi, 35(2), 891-900. https://doi.org/10.35234/fumbd.1296228
AMA Kaya A, Türkoğlu İ. Simetrik ve Asimetrik Şifreleme Algoritmalarının Performans Karşılaştırılması. Fırat Üniversitesi Mühendislik Bilimleri Dergisi. September 2023;35(2):891-900. doi:10.35234/fumbd.1296228
Chicago Kaya, Alev, and İbrahim Türkoğlu. “Simetrik Ve Asimetrik Şifreleme Algoritmalarının Performans Karşılaştırılması”. Fırat Üniversitesi Mühendislik Bilimleri Dergisi 35, no. 2 (September 2023): 891-900. https://doi.org/10.35234/fumbd.1296228.
EndNote Kaya A, Türkoğlu İ (September 1, 2023) Simetrik ve Asimetrik Şifreleme Algoritmalarının Performans Karşılaştırılması. Fırat Üniversitesi Mühendislik Bilimleri Dergisi 35 2 891–900.
IEEE A. Kaya and İ. Türkoğlu, “Simetrik ve Asimetrik Şifreleme Algoritmalarının Performans Karşılaştırılması”, Fırat Üniversitesi Mühendislik Bilimleri Dergisi, vol. 35, no. 2, pp. 891–900, 2023, doi: 10.35234/fumbd.1296228.
ISNAD Kaya, Alev - Türkoğlu, İbrahim. “Simetrik Ve Asimetrik Şifreleme Algoritmalarının Performans Karşılaştırılması”. Fırat Üniversitesi Mühendislik Bilimleri Dergisi 35/2 (September 2023), 891-900. https://doi.org/10.35234/fumbd.1296228.
JAMA Kaya A, Türkoğlu İ. Simetrik ve Asimetrik Şifreleme Algoritmalarının Performans Karşılaştırılması. Fırat Üniversitesi Mühendislik Bilimleri Dergisi. 2023;35:891–900.
MLA Kaya, Alev and İbrahim Türkoğlu. “Simetrik Ve Asimetrik Şifreleme Algoritmalarının Performans Karşılaştırılması”. Fırat Üniversitesi Mühendislik Bilimleri Dergisi, vol. 35, no. 2, 2023, pp. 891-00, doi:10.35234/fumbd.1296228.
Vancouver Kaya A, Türkoğlu İ. Simetrik ve Asimetrik Şifreleme Algoritmalarının Performans Karşılaştırılması. Fırat Üniversitesi Mühendislik Bilimleri Dergisi. 2023;35(2):891-900.