Theoretical and Natural Science

- The Open Access Proceedings Series for Conferences


Theoretical and Natural Science

Vol. 25, 20 December 2023


Open Access | Article

A comparative Analysis of AES and RSA algorithms and their integrated application

Zehao Tuo * 1
1 Beijing Foreign Language Academy

* Author to whom correspondence should be addressed.

Theoretical and Natural Science, Vol. 25, 28-35
Published 20 December 2023. © 2023 The Author(s). Published by EWA Publishing
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Citation Zehao Tuo. A comparative Analysis of AES and RSA algorithms and their integrated application. TNS (2023) Vol. 25: 28-35. DOI: 10.54254/2753-8818/25/20240893.

Abstract

Cryptography holds a significant place in the realm of information technology, safeguarding sensitive information from unauthorized access. This discourse centers on two prevalent cryptographic algorithms: AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman). While AES falls under the category of symmetric cryptography, RSA is a part of asymmetric cryptography. The paper’s objective lies in furnishing readers with an insightful exploration of both algorithms, delving into their respective strengths and weaknesses. A comprehensive examination reveals the intricate details of their operation, highlighting the security aspects and potential vulnerabilities. Understanding the fundamental distinctions and the operational mechanics of AES and RSA contributes to an enhanced perception of their application in diverse cryptographic contexts. Beyond this, the paper delves into the synergistic utilization of AES and RSA, presenting an innovative approach to reinforcing information security. This integration leverages the unique advantages of both algorithms, mitigating their individual limitations and bolstering the security framework. In essence, a balanced perspective on AES and RSA, along with their collaborative application, furnishes a robust foundation for informed cryptographic choices, fortifying the safeguarding of sensitive data against emerging security threats.

Keywords

AES, RSA, Hybrid Algorithm

References

1. Sahin, M. E. (2023). Memristive chaotic system-based hybrid image encryption application with AES and RSA algorithms. Physica Scripta, 98(7), 075216.

2. Hamza, A., & Kumar, B. (2020, December). A review paper on DES, AES, RSA encryption standards. In 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART) (pp. 333-338). IEEE.

3. Fatima, S., Rehman, T., Fatima, M., Khan, S., & Ali, M. A. (2022). Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing. Engineering Proceedings, 20(1), 14.

4. Clavijo, A. M., Chacón, J. A., & Montiel, G. A. C. HYBRID ENCRYPTION PROTOTYPE COMBINING AES AND RSA ENCRYPTION METHODS. Libro de memorias.

5. Ping, H. (2022). Network information security data protection based on data encryption technology. Wireless Personal Communications, 126(3), 2719-2729.

6. Zhang, Q. (2021, January). An overview and analysis of hybrid encryption: the combination of symmetric encryption and asymmetric encryption. In 2021 2nd international conference on computing and data science (CDS) (pp. 616-622). IEEE.

7. Taneja, P., & Kalta, S. A Comparative Analysis of Cryptographic Algorithms: AES & RSA and Hybrid Algorithm for Encryption and Decryption.

8. Lu, Z., & Mohamed, H. (2021). A complex encryption system design implemented by AES. Journal of Information Security, 12(2), 177-187.

9. Zou, L., Ni, M., Huang, Y., Shi, W., & Li, X. (2020). Hybrid encryption algorithm based on AES and RSA in file encryption. In Frontier Computing: Theory, Technologies and Applications (FC 2019) 8 (pp. 541-551). Springer Singapore.

10. Fatima, S., Rehman, T., Fatima, M., Khan, S., & Ali, M. A. (2022). Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing. Eng. Proc. 2022, 20, 14.

Data Availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Authors who publish this series agree to the following terms:

1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.

2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.

3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open Access Instruction).

Volume Title
Proceedings of the 3rd International Conference on Computing Innovation and Applied Physics
ISBN (Print)
978-1-83558-233-6
ISBN (Online)
978-1-83558-234-3
Published Date
20 December 2023
Series
Theoretical and Natural Science
ISSN (Print)
2753-8818
ISSN (Online)
2753-8826
DOI
10.54254/2753-8818/25/20240893
Copyright
20 December 2023
Open Access
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

Copyright © 2023 EWA Publishing. Unless Otherwise Stated