ADVANCED ENCRYPTION STANDARD (AES) IMPLEMENTATION EFFICIENCY USING JAVA AND NODE.JS PLATFORMS
Abstract
The rapid advancement of communication technologies, such as satellite networks, mobile, internet, and terrestrial communications, has created an urgent need to protect sensitive data from potential attacks. This is particularly crucial as photos transmitted through unreliable channels may contain sensitive or confidential information. This study evaluates the effectiveness of the Advanced Encryption Standard (AES) algorithm implemented in Java and Node.js, focusing on their performance in data encryption and decryption. The research employs AES in Cipher Block Chaining (CBC) mode, using 128-bit keys for Java and 256-bit keys for Node.js. It utilizes the Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE) to create an optimized runtime environment with advanced cryptographic libraries. The result indicate that Java's AES-128 implementation is more efficient than Node.js's AES-256, particularly in terms of speed and data processing capabilities as seen in figure 11 taking Java 2.00ns to encrypt and decrypt before the Node.js algorithm that couldn’t complete the process but remain at 0.75ns. Suggesting that specific use case and requirements should be considered when choosing between the two platforms for AES encryption. Java generally outperforms Node.js in efficiency, but Node.js provides essential cryptographic functions through its built-in 'crypto' module. Overall, the research underscores the advantages of using the AES algorithm across these platforms while demonstrating the varying performance characteristics between them.
References
Acharya, B., Panigrahy, S. K., Patra, S. K., & Panda, G. (2009). Image encryption using advanced hill cipher algorithm. International Journal of Recent Trends in Engineering, 1(1), 663-667.
Alenezi, M. N., Alabdulrazzaq, H., & Mohammad, N. Q. (2020). Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 12(2), 256-272.
Anwarul, S., & Agarwal, S. (2017). Image enciphering using modified AES with secure key transmission. In Communication and Computing Systems: Proceedings of the International Conference on Communication and Computing Systems (ICCCS 2016), Gurgaon, India, 9-11 September, 2016 (p. 137). CRC Press. DOI: https://doi.org/10.1201/9781315364094-26
Auyporn, W., &Vongpradhip, S. (2015). A robust image encryption method based on bit plane decomposition and multiple chaotic maps. Int. J. Signal Process. Syst, 3(1), DOI: https://doi.org/10.12720/ijsps.3.1.8-13
Bani, M. A., & Jantan, A. (2008). Image encryption using block-based transformation algorithm. IJCSNS International Journal of Computer Science and Network Security, 8(4), 191-197.
Goldberg, I., & Wagner, D. (1996). Randomness and the Netscape browser. Dr Dobb's Journal Software Tools for the Professional Programmer, 21(1), 66-71.
Gunnsteinsson, O. (2016). A search for a convenient data encryption algorithm-For an Internet of Things device 8-13.
Indrakanti, S. P., &Avadhani, P. S. (2011). Permutation based image encryption technique. International Journal of Computer Applications, 28(8), 45-47. DOI: https://doi.org/10.5120/3404-4748
Kumari, M., Gupta, S. & Sardana, P. (2017) A Survey of Image Encryption Algorithms. 3D Res 8, 37. https://doi.org/10.1007/s13319-017-0148-5 DOI: https://doi.org/10.1007/s13319-017-0148-5
Kumar, K., Ramkumar, K. R., & Kaur, A. (2020, June). A design implementation and comparative analysis of advanced encryption standard (AES) algorithm on FPGA. In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 182-185). IEEE. DOI: https://doi.org/10.1109/ICRITO48877.2020.9198033
Nag, A., Singh, J. P., Khan, S., Ghosh, S., Biswas, S., Sarkar, D., & Sarkar, P. P. (2011). Image encryption using affine transform and XOR operation. In 2011 International conference on signal processing, communication, computing and networking technologies (pp. 309-312). IEEE. DOI: https://doi.org/10.1109/ICSCCN.2011.6024565
Nita, S. L., & Mihailescu, M. I. (2022). Java Cryptography Architecture. In Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 (pp. 29- 46). Berkeley, CA: Apress. DOI: https://doi.org/10.1007/978-1-4842-8105-5_4
Node.js, Crypto | Node.js Documentation. Available: https://nodejs.org/api/cryptohtml # crypto. [Accessed 4 April 2021].
Seyed Mohammad Seyedzade, Reza Ebrahimi Atani and Sattar Mirzakuchaki, A Novel Image Encryption Algorithm Based on Hash Function 6th Iranian Conference on Machine Vision and Image Processing, 2010 DOI: https://doi.org/10.1109/IranianMVIP.2010.5941167
Wadi, S. M., & Zainal, N. (2014). High-definition image encryption algorithm based on AES modification. Wireless personal communications, 79, 811-829. DOI: https://doi.org/10.1007/s11277-014-1888-7
Zahid,M., Machhout,M., Khriji,L., Baganne,A., Tourkianalyze,R., (2017) Advanced encoding Standard (AES)
Zhang,Y., Liu,W., Cao, S., Zhai, Z., Nie,X., and Dai,W.,(2009). Secret writing & speed sensitivity
Copyright (c) 2024 FUDMA JOURNAL OF SCIENCES
This work is licensed under a Creative Commons Attribution 4.0 International License.
FUDMA Journal of Sciences