KnE Engineering

ISSN: 2518-6841

The latest conference proceedings on all fields of engineering.

Comparative Analysis of File Transfer Performance Between Java and.NET Using a Hybrid Encryption Protocol with AES and RSA

Published date:Dec 27 2018

Journal Title: KnE Engineering

Issue title: Ibero-American Symposium on Computer Programming jointly held with the International Congress on Technology Education

Pages:161–177

DOI: 10.18502/keg.v3i9.3653

Authors:
Abstract:

The purpose of the research project was to carry out the comparative analysis of the performance of a computer system using a hybrid encryption protocol (symmetric AES and asymmetric RSA) and the mechanism of sockets between the JAVA and.NET platforms, applied to the system of information backups for the Loja Technical Office of the Zonal Coordination 7 of the Identification and Certification of the Civil Registry. To determine the performance between both platforms, the analysis of each indicator obtained from the FURPS Model was done with a sample of 335 files distributed among 200 light, 100 medium and 35 heavy, for which the nonparametric analysis algorithm Mann–Whiney was used, obtaining as a result a significant difference in favor of C # in terms of response time, while for the consumption of resources (RAM and CPU) a significant difference was found in favor of Java.

 

Keywords: cryptography, AES, RSA, Java, C#

References:

[1] Aguirre, J. R. (2006). Libro Electrónico de Seguridad Informática y Criptografía Versión 4.1. Madrid: UPM.


[2] Al Hasib, A., & Mahmudul Haque, A. (2008). A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography. IEEE, 505-510.


[3] Al Hasib, A., & Mahmudul, A. (2008). A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography. IEEE Computer Society, 505-510.


[4] bouncycastle. (30 de Ago de 2018). https://www.bouncycastle.org/. Obtenido de https://www.bouncycastle.org/


[5] Díaz, J. C. (1995). Criptografía: historia de la escritura cifrada. Complutense.


[6] García Belmonte, R. (2016). Firma Digital Basada en Funciones HASH y un Algoritmo Criptográfico Híbrido. CIDETEC, pp. 19.


[7] Gómez, Á. (2011). Enciclopedia de la Seguridad Informática. México: Alfaomega.


[8] Layana Molina, S. (2017). Estudio Comparativo de la Eficiencia de los Algoritmos Criptográficos AES y RSA: Caso de Estudio de una Institución en la Ciudad de Guayaquil. UEES.


[9] Mahajan, P., & Sachdeva, A. (2013). A Study of Encryption Algorithms AES, DES and RSA for Security. Global Journal of Computer Science and Technology Network Web & Security.


[10] Medina, J. (2014). Pruebas de Rendimiento TIC. Murcia: SG6. Obtenido de https: //archive.org/details/PruebasDeRendimientoTic


[11] Menezes, A., Ooschot, P., & Vanstone, S. (1996). Handbook of Applied Cryptography. CRC Press, Inc.


[12] Padmavathi, B., & Ranjitha, K. (2013). A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique. International Journal of Science and Research (IJSR), pp. 170-174.


[13] Paredes, G. G. (2006). Introducción a la Criptografía. RU TIC, 55.


[14] Patil, P., Narayankar, P., Narayan, D., & Meena, S. (2016). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. ElSevier, pp. 617-624.


[15] Prajapati, P., Patel, N., Nacwan, R., Kachhiya, N., & Shah, P. (2014). Comparative Analysis of DES, AES, RSA Encryption Algorithms. SemanticSholar.


[16] Pressman, R. (2002). Ingeniería de Sofware: Un Enfoque Práctico (Quita Edición ed.). McGraw Hill.


[17] Ramakrishnan, K., Amnazjagam, M., Rajan, R., & Karthik, S. (2015). USA Patente n∘ US-8972940-B2.


[18] Soriano, M. (s.f.). Seguridad en redes y seguridad en la información. Obtenido de http://improvet.cvut.cz/project/download/C2ES/ Seguridad_de_Red_e_Informacion.pdf


[19] TIOBE. (02 de 02 de 2018). www.tiobe.com. Obtenido de https://www.tiobe.com/ tiobe-index/


[20] Vallejo, M. C. (24 de Nov de 2005). Firma Electrónica. Obtenido de https://www. derechoecuador.com/firma-electroacutenica


[21] Vidal-Silva, C., Madariaga, E., & Solis, R. (2017). Estudio Piloto de la Importancia del Rendimiento, Seguridad y Fiabilidad en el Proceso de Desarrollo de Software en Chile. Scielo, pp. 95-106. doi:http://dx.doi.org/10.4067/S0718- 07642017000300011.

Recommendations
TRENDS AND PROSPECTS IN GROWING SOCIOCULTURAL COMPLEXITY
P. Opolev, KNE ENGINEERING, 2018
THE TRANSFORMATION OF SCREEN CULTURE AS A PHENOMENON OF INFORMATION AGE
N. B. Kirillova, KNE ENGINEERING, 2018
MANUFACTURING AND CHARACTERIZATION OF EPOXY RESIN WITH FE3O4 AND SIO2 PARTICLES
J. Molina et al., KNE ENGINEERING, 2020
THE USE OF ANALYTICAL TOOLS IN THE CONDUCT OF INTERNAL CONTROL PROCEDURES
P. Leonov et al., KNE ENGINEERING, 2018
GENERAL SCHEME OF RISK – ORIENTED AUDIT STAGES
P. Leonov et al., KNE ENGINEERING, 2018
REDESIGN OF NORTH SUMATRA ORNAMENTS IN THE CATALOG WITH CIRCULAR COMPOSITION
Sofi Andriyanti et al., KNE ENGINEERING, 2024
MOBILE-AUGMENTED REALITY FOR IMPROVING STUDENT ENTREPRENEURIAL MINDSET BY BUSINESS MODEL CANVAS
Maria Ulfah Catur Afriasih et al., KNE ENGINEERING, 2024
DEVELOPMENT OF AN INTEGRATED DIGITAL BUSINESS PLATFORM AS A REALIZATION OF CUSTOMER RELATIONSHIP MANAGEMENT FOR POLIMEDIA STUDENT ENTREPRENEURSHIP
Tipri Rose Kartika et al., KNE ENGINEERING, 2024
ABSTRACT CREATURE ANIMATION VIDEO DESIGN FOR CONCENTRATION THERAPY OF CHILDREN WITH SPECIAL NEEDS
Rina Watye et al., KNE ENGINEERING, 2024
PHOTOCATALYTIC-BASED TITANIUM DIOXIDE AND ITS APPLICATION IN REDUCING ORGANIC POLLUTANT OF RIVER WATER
Fisca Dian Utami et al., KNE ENGINEERING, 2024
Powered by
Download
HTML
Cite
Share
statistics

439 Abstract Views

423 PDF Downloads