Theoretical and Natural Science
- The Open Access Proceedings Series for Conferences
Vol. 25, 20 December 2023
* Author to whom correspondence should be addressed.
Cryptography holds a significant place in the realm of information technology, safeguarding sensitive information from unauthorized access. This discourse centers on two prevalent cryptographic algorithms: AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman). While AES falls under the category of symmetric cryptography, RSA is a part of asymmetric cryptography. The paper’s objective lies in furnishing readers with an insightful exploration of both algorithms, delving into their respective strengths and weaknesses. A comprehensive examination reveals the intricate details of their operation, highlighting the security aspects and potential vulnerabilities. Understanding the fundamental distinctions and the operational mechanics of AES and RSA contributes to an enhanced perception of their application in diverse cryptographic contexts. Beyond this, the paper delves into the synergistic utilization of AES and RSA, presenting an innovative approach to reinforcing information security. This integration leverages the unique advantages of both algorithms, mitigating their individual limitations and bolstering the security framework. In essence, a balanced perspective on AES and RSA, along with their collaborative application, furnishes a robust foundation for informed cryptographic choices, fortifying the safeguarding of sensitive data against emerging security threats.
AES, RSA, Hybrid Algorithm
1. Sahin, M. E. (2023). Memristive chaotic system-based hybrid image encryption application with AES and RSA algorithms. Physica Scripta, 98(7), 075216.
2. Hamza, A., & Kumar, B. (2020, December). A review paper on DES, AES, RSA encryption standards. In 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART) (pp. 333-338). IEEE.
3. Fatima, S., Rehman, T., Fatima, M., Khan, S., & Ali, M. A. (2022). Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing. Engineering Proceedings, 20(1), 14.
4. Clavijo, A. M., Chacón, J. A., & Montiel, G. A. C. HYBRID ENCRYPTION PROTOTYPE COMBINING AES AND RSA ENCRYPTION METHODS. Libro de memorias.
5. Ping, H. (2022). Network information security data protection based on data encryption technology. Wireless Personal Communications, 126(3), 2719-2729.
6. Zhang, Q. (2021, January). An overview and analysis of hybrid encryption: the combination of symmetric encryption and asymmetric encryption. In 2021 2nd international conference on computing and data science (CDS) (pp. 616-622). IEEE.
7. Taneja, P., & Kalta, S. A Comparative Analysis of Cryptographic Algorithms: AES & RSA and Hybrid Algorithm for Encryption and Decryption.
8. Lu, Z., & Mohamed, H. (2021). A complex encryption system design implemented by AES. Journal of Information Security, 12(2), 177-187.
9. Zou, L., Ni, M., Huang, Y., Shi, W., & Li, X. (2020). Hybrid encryption algorithm based on AES and RSA in file encryption. In Frontier Computing: Theory, Technologies and Applications (FC 2019) 8 (pp. 541-551). Springer Singapore.
10. Fatima, S., Rehman, T., Fatima, M., Khan, S., & Ali, M. A. (2022). Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing. Eng. Proc. 2022, 20, 14.
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open Access Instruction).