Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
21 views15 pages

Symmetric vs Asymmetric Encryption Study

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views15 pages

Symmetric vs Asymmetric Encryption Study

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Department of Computer

Science & Engineering

Progress Report-II
Synopsis
On

Project Title: A comparative study of


symmetric and asymmetric encryption
algorithms for instant text messaging

Submitted BY
Sankalp Jha (178)
Sanskriti Dantre (180)
Shreyansh Tiwari (196)
Tanishq Purohit (213)
Submitted to
Associated Professor

Dr. Deepak
Gupta

Index
• Abstract of the project
• Introduction
• Objectives / Aim of the project
• Methodology
• Results
• Future Works
• References (Books, internet
sources etc.)
Abstract

This report examines the


performance and efficiency of
symmetric and asymmetric
encryption algorithms in instant
text messaging applications.
The study compares the speed,
resource usage, and practical
integration of Advanced
Encryption Standard (AES) and
Rivest-Shamir-Adleman (RSA) to
determine their suitability for
real-time communication.
Introduction

With the increasing reliance on


instant messaging, ensuring the
security and efficiency of these
communications is critical.
Symmetric and asymmetric
encryption are two primary
approaches used to secure
data.
This report focuses on their
performance and efficiency
in instant text messaging.
Objectives

To evaluate the encryption and


decryption speed of AES and
RSA. To assess the resource
usage of both algorithms. To
determine the practical
integration of these algorithms
in instant messaging
applications.
Methodology
Selection of Algorithms

• Symmetric Encryption:
Advanced Encryption
Standard (AES)

• Asymmetric Encryption:
Rivest-Shamir-Adleman (RSA)
Criteria for Comparison
Criteria for Comparison

• Performance: Speed of
encryption and decryption.

• Resource Usage: CPU


and memory consumption.

• Practical Integration: Ease


of implementation and user
impact.
Tools and Environment

• Programming Language:
Python

• Libraries: PyCryptodome
for AES and RSA

• Environment:
Standard desktop
computer
Experimental Setup

• Encryption and Decryption


Speed: Measured with
varying text sizes.

• Resource Usage:
Monitored CPU and memory
during operations.

• Integration: Tested within


a mock instant messaging
app.
Results
• AES: Faster encryption and
decryption, especially with larger
texts.
• RSA: Slower due to complex
key operations.
• AES: Lower CPU and
memory usage.
• RSA: Higher resource
consumption. Practical
• AES: Easy to implement
but requires secure key
sharing.
• RSA: Simplifies key exchange but
less efficient for ongoing
encryption.
Conclusion

AES is more suitable for instant


messaging due to its efficiency.
However, combining AES for
message encryption with RSA for
key exchange can provide
enhanced security and practical
performance.
Future Work

Future research could


explore:

• The impact of combining


symmetric and asymmetric
encryption in hybrid
models.
• Evaluation of other
symmetric and asymmetric
algorithms.
• Performance in real-
world applications with
varying network
conditions.
References

• Menezes, A. J., van Oorschot,


P. C., & Vanstone, S. A. (1996).
Handbook of Applied
Cryptography.

• Stallings, W. (2017).
Cryptography and Network
Security: Principles and
Practice.

• PyCryptodome
Documentation. (n.d.). Retrieved
from PyCryptodome Official Site.

You might also like