Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : Journal of Soft Computing Exploration

A text security evaluation based on advanced encryption standard algorithm Bima, Aristides; Irawan, Candra; Laksana, Deddy Award Widya; Krismawan, Andi Danang; Isinkaye, Folasade Olubusola
Journal of Soft Computing Exploration Vol. 4 No. 4 (2023): December 2023
Publisher : SHM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52465/joscex.v4i4.274

Abstract

This research approach analysis and examines a number of advanced encryption standard (AES) performance factors, including as encryption and decryption speed, processing resource, consumption, and resilience, to cryptanalysis attacks. The study’s findings demonstrate that AES is successful in providing high-level data security, particularly when used in the CBC (Cipher Block Chaining) operating mode. Performance is dependent on the length of the key that is utilized. Increasing the level of security through the use of longer keys may result in an increase in the amount of time needed for encryption. The experimental results show that the highest results from the data are as follows the length of the encryption time is 0.00005317 seconds, the length of the decryption time is 0.00000882 seconds, the results of BER and CER are 0, the results of entropy are 7.44237, and the results of avalanche influence are 54.86%.