Encryption models using RSA and AES algorithms

Authors

  • ALaeddin ALahmad ALali Aleppo University
  • Dr. Raghad Haidarey Aleppo University

Keywords:

RSA, AES, encryption, decryption, data protection, encryption model

Abstract

The process of data protection with a standard execution time is the main goal of researchers in the field of data protection using encryption mechanisms or algorithms. Based on this concept, four models for textual data protection have been proposed. These models depend on the RSA and AES algorithms with the addition of XOR operations either with a fixed text block, which is the block The first is m1 or mi-1 variable dynamic text block, and these models gave a higher degree of protection than RSA and AES algorithms by calculating the entropy rate for each of them, where the results show increasing entropy value for four models. Their  entropy values are higher than entropy values for RSA and AES algorithms. So that improve their increasing in protection data degree when those models are used and the average execution time is calculated to perform Encryption and decryption of these models to implement the encryption and to implement the decryption, it is shown that times of encryption and decryption for four models are least than times of RSA algorithm and close to times of AES, which improve that proposed models have fast execution speed. The results show that the first model is the fastest, while the fourth model is the highest degree protection.

Downloads

Download data is not yet available.

Downloads

Published

2024-03-19

How to Cite

Encryption models using RSA and AES algorithms. (2024). Damascus University Journal for Engineering Sciences, 40(1). https://journal.damascusuniversity.edu.sy/index.php/engj/article/view/5053