ADVANCED ENCRYPTION STANDARD (AES) IMPLEMENTATION EFFICIENCY USING JAVA AND NODE.JS PLATFORMS

  • Charles Okechukwu Ugwunna Wigwe University Isiokpo, River State, Nigeria.
  • P. E. Okimba Nnamdi Azikiwe Universirty Awka, Anambra State, Nigeria.
  • O. A. Alabi
  • E. E. Orji Nnamdi Azikiwe Universirty Awka, Anambra State, Nigeria.
  • E. O. Olowofeso Federal University of Agriculture Abeokuta. Ogun State
  • S. O. Ayomide Federal University of Agriculture Abeokuta. Ogun State
Keywords: Encryption, Decryption, Advanced Encryption Standard (AES), Cryptography

Abstract

The rapid advancement of communication technologies, such as satellite networks, mobile, internet, and terrestrial communications, has created an urgent need to protect sensitive data from potential attacks. This is particularly crucial as photos transmitted through unreliable channels may contain sensitive or confidential information. This study evaluates the effectiveness of the Advanced Encryption Standard (AES) algorithm implemented in Java and Node.js, focusing on their performance in data encryption and decryption. The research employs AES in Cipher Block Chaining (CBC) mode, using 128-bit keys for Java and 256-bit keys for Node.js. It utilizes the Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE) to create an optimized runtime environment with advanced cryptographic libraries. The result indicate that Java's AES-128 implementation is more efficient than Node.js's AES-256, particularly in terms of speed and data processing capabilities as seen in figure 11 taking Java 2.00ns to encrypt and decrypt before the Node.js algorithm that couldn’t complete the process but remain at 0.75ns. Suggesting that specific use case and requirements should be considered when choosing between the two platforms for AES encryption. Java generally outperforms Node.js in efficiency, but Node.js provides essential cryptographic functions through its built-in 'crypto' module. Overall, the research underscores the advantages of using the AES algorithm across these platforms while demonstrating the varying performance characteristics between them.

References

Acharya, B., Panigrahy, S. K., Patra, S. K., & Panda, G. (2009). Image encryption using advanced hill cipher algorithm. International Journal of Recent Trends in Engineering, 1(1), 663-667.

Alenezi, M. N., Alabdulrazzaq, H., & Mohammad, N. Q. (2020). Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 12(2), 256-272.

Anwarul, S., & Agarwal, S. (2017). Image enciphering using modified AES with secure key transmission. In Communication and Computing Systems: Proceedings of the International Conference on Communication and Computing Systems (ICCCS 2016), Gurgaon, India, 9-11 September, 2016 (p. 137). CRC Press. DOI: https://doi.org/10.1201/9781315364094-26

Auyporn, W., &Vongpradhip, S. (2015). A robust image encryption method based on bit plane decomposition and multiple chaotic maps. Int. J. Signal Process. Syst, 3(1), DOI: https://doi.org/10.12720/ijsps.3.1.8-13

Bani, M. A., & Jantan, A. (2008). Image encryption using block-based transformation algorithm. IJCSNS International Journal of Computer Science and Network Security, 8(4), 191-197.

Goldberg, I., & Wagner, D. (1996). Randomness and the Netscape browser. Dr Dobb's Journal Software Tools for the Professional Programmer, 21(1), 66-71.

Gunnsteinsson, O. (2016). A search for a convenient data encryption algorithm-For an Internet of Things device 8-13.

Indrakanti, S. P., &Avadhani, P. S. (2011). Permutation based image encryption technique. International Journal of Computer Applications, 28(8), 45-47. DOI: https://doi.org/10.5120/3404-4748

Kumari, M., Gupta, S. & Sardana, P. (2017) A Survey of Image Encryption Algorithms. 3D Res 8, 37. https://doi.org/10.1007/s13319-017-0148-5 DOI: https://doi.org/10.1007/s13319-017-0148-5

Kumar, K., Ramkumar, K. R., & Kaur, A. (2020, June). A design implementation and comparative analysis of advanced encryption standard (AES) algorithm on FPGA. In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 182-185). IEEE. DOI: https://doi.org/10.1109/ICRITO48877.2020.9198033

Nag, A., Singh, J. P., Khan, S., Ghosh, S., Biswas, S., Sarkar, D., & Sarkar, P. P. (2011). Image encryption using affine transform and XOR operation. In 2011 International conference on signal processing, communication, computing and networking technologies (pp. 309-312). IEEE. DOI: https://doi.org/10.1109/ICSCCN.2011.6024565

Nita, S. L., & Mihailescu, M. I. (2022). Java Cryptography Architecture. In Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 (pp. 29- 46). Berkeley, CA: Apress. DOI: https://doi.org/10.1007/978-1-4842-8105-5_4

Node.js, Crypto | Node.js Documentation. Available: https://nodejs.org/api/cryptohtml # crypto. [Accessed 4 April 2021].

Seyed Mohammad Seyedzade, Reza Ebrahimi Atani and Sattar Mirzakuchaki, A Novel Image Encryption Algorithm Based on Hash Function 6th Iranian Conference on Machine Vision and Image Processing, 2010 DOI: https://doi.org/10.1109/IranianMVIP.2010.5941167

Wadi, S. M., & Zainal, N. (2014). High-definition image encryption algorithm based on AES modification. Wireless personal communications, 79, 811-829. DOI: https://doi.org/10.1007/s11277-014-1888-7

Zahid,M., Machhout,M., Khriji,L., Baganne,A., Tourkianalyze,R., (2017) Advanced encoding Standard (AES)

Zhang,Y., Liu,W., Cao, S., Zhai, Z., Nie,X., and Dai,W.,(2009). Secret writing & speed sensitivity

Published
2024-12-31
How to Cite
UgwunnaC. O., OkimbaP. E., AlabiO. A., OrjiE. E., OlowofesoE. O., & AyomideS. O. (2024). ADVANCED ENCRYPTION STANDARD (AES) IMPLEMENTATION EFFICIENCY USING JAVA AND NODE.JS PLATFORMS. FUDMA JOURNAL OF SCIENCES, 8(6), 42 - 49. https://doi.org/10.33003/fjs-2024-0806-2832