Performance of Symmetric and Asymmetric Encryption Techniques for Attribute Based Encryption

  • et al.
N/ACitations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The objective of this research article is to study performance of the the symmetric and asymmetric encryption based on the attributed encryption. In the current scenario, to protect the data in the distributed data base is the challenging task. Mainly to provide the privacy based on the specific parameter like attributed based encryption. In this algorithm dataset is provided to do the encryption for the selected sensitive attribute. Them for each symmetric and asymmetric encryption techniques encryption execution time and memory occupied after encryption is observed for ten different dataset. In the experiment and result analysis, each encryption techniques was discussed based on the comparion of encryption time and memory occupied after encryption. Result shows that RC2 encryption is less costlier as compare to AES, 3DES, Rijndael and RSA encryption. Result also indicates that 3DES and RC2 are almost need same encryption time and less costlier as compare to RSA, AES and Rijndael encryption and RSA encryption is more costlier as compare to AES, 3DES, Rijndael and RC2 encryption.

Cite

CITATION STYLE

APA

Vashi*, D., Bhadka, Dr. H. B., … Garg, Dr. S. (2019). Performance of Symmetric and Asymmetric Encryption Techniques for Attribute Based Encryption. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 176–182. https://doi.org/10.35940/ijrte.c6597.118419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free