ADVANCED ENCRYPTION STANDARD (AES) IMPLEMENTATION EFFICIENCY USING JAVA AND NODE.JS PLATFORMS
DOI:
https://doi.org/10.33003/fjs-2024-0806-2832Keywords:
Encryption, Decryption, Advanced Encryption Standard (AES), CryptographyAbstract
The rapid advancement of communication technologies, such as satellite networks, mobile, internet, and terrestrial communications, has created an urgent need to protect sensitive data from potential attacks. This is particularly crucial as photos transmitted through unreliable channels may contain sensitive or confidential information. This study evaluates the effectiveness of the Advanced Encryption Standard (AES) algorithm implemented in Java and Node.js, focusing on their performance in data encryption and decryption. The research employs AES in Cipher Block Chaining (CBC) mode, using 128-bit keys for Java and 256-bit keys for Node.js. It utilizes the Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE) to create an optimized runtime environment with advanced cryptographic libraries. The result indicate that Java's AES-128 implementation is more efficient than Node.js's AES-256, particularly in terms of speed and data processing capabilities as seen in figure 11 taking Java 2.00ns to encrypt and decrypt before the Node.js algorithm that couldn’t complete the process but remain at 0.75ns. Suggesting that specific use case and requirements should be considered when choosing between the two platforms for AES encryption. Java generally outperforms Node.js in efficiency, but Node.js provides essential cryptographic functions through its built-in 'crypto' module. Overall, the research underscores the advantages of using the AES algorithm across these platforms while demonstrating the varying performance characteristics between them.
References
Alenezi, M. N., Alabdulrazzaq, H., & Mohammad, N. Q. (2020). Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 12(2), 256-272.
Anwarul, S., & Agarwal, S. (2017). Image enciphering using modified AES with secure key transmission. In Communication and Computing Systems: Proceedings of the International Conference on Communication and Computing Systems (ICCCS 2016), Gurgaon, India, 9-11 September, 2016 (p. 137). CRC Press.
Auyporn, W., &Vongpradhip, S. (2015). A robust image encryption method based on bit plane decomposition and multiple chaotic maps. Int. J. Signal Process. Syst, 3(1),
Bani, M. A., & Jantan, A. (2008). Image encryption using block-based transformation algorithm. IJCSNS International Journal of Computer Science and Network Security, 8(4), 191-197.
Goldberg, I., & Wagner, D. (1996). Randomness and the Netscape browser. Dr Dobb's Journal Software Tools for the Professional Programmer, 21(1), 66-71.
Gunnsteinsson, O. (2016). A search for a convenient data encryption algorithm-For an Internet of Things device 8-13.
Indrakanti, S. P., &Avadhani, P. S. (2011). Permutation based image encryption technique. International Journal of Computer Applications, 28(8), 45-47.
Kumari, M., Gupta, S. & Sardana, P. (2017) A Survey of Image Encryption Algorithms. 3D Res 8, 37. https://doi.org/10.1007/s13319-017-0148-5
Kumar, K., Ramkumar, K. R., & Kaur, A. (2020, June). A design implementation and comparative analysis of advanced encryption standard (AES) algorithm on FPGA. In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 182-185). IEEE.
Nag, A., Singh, J. P., Khan, S., Ghosh, S., Biswas, S., Sarkar, D., & Sarkar, P. P. (2011). Image encryption using affine transform and XOR operation. In 2011 International conference on signal processing, communication, computing and networking technologies (pp. 309-312). IEEE.
Nita, S. L., & Mihailescu, M. I. (2022). Java Cryptography Architecture. In Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10 (pp. 29- 46). Berkeley, CA: Apress.
Node.js, Crypto | Node.js Documentation. Available: https://nodejs.org/api/cryptohtml # crypto. [Accessed 4 April 2021].
Seyed Mohammad Seyedzade, Reza Ebrahimi Atani and Sattar Mirzakuchaki, A Novel Image Encryption Algorithm Based on Hash Function 6th Iranian Conference on Machine Vision and Image Processing, 2010
Wadi, S. M., & Zainal, N. (2014). High-definition image encryption algorithm based on AES modification. Wireless personal communications, 79, 811-829.
Zahid,M., Machhout,M., Khriji,L., Baganne,A., Tourkianalyze,R., (2017) Advanced encoding Standard (AES)
Zhang,Y., Liu,W., Cao, S., Zhai, Z., Nie,X., and Dai,W.,(2009). Secret writing & speed sensitivity
Published
How to Cite
Issue
Section
FUDMA Journal of Sciences