Comparative Performance Study on Symmetric and Asymmetric Encryption Algorithm: Comprehensive Report of a Comparative Study
DOI:
https://doi.org/10.65405/114fjq52Keywords:
Symmetric encryption, Asymmetric encryption, Performance evaluation, AES, RSA, ECC, CryptographyAbstract
The boom in the digital communication, e-commerce and cloud-based systems has highlighted the nature of cryptographic systems in the ensuring of security in information exchange. Symmetric and asymmetric encryption algorithms belong to the most studied cryptographic paradigms and the building blocks of the existing security systems. Although both types provide the same degree of confidentiality the performance features of the two types and their actual performance is very different. The present paper will provide a comparison of the two kinds of algorithms with a focus on the computational speed, memory requirement, scalability, and attack resistance. The experimental findings and literature have demonstrated that the symmetry algorithms such as Advanced Encryption Standard (AES) is more efficient and quick in its simultaneous performance and must be applied in the case of encrypting huge amounts of information. On the other hand, asymmetric algorithms, including the Rivest Shamir Adleman (RSA) and Elliptic Curve Cryptography (ECC) are computationally inefficient, yet offer advantages in distributing keys, as well as authentication. These findings are the reason why there is an ever-growing tendency to consider hybrid cryptosystems incorporating the strengths of both approaches to reach an equilibrium of performance and security (Stallings, 2017; Singh and Kumar, 2020).
Downloads
References
Al-Bassam, M. (2018). Blockchain-based decentralized cloud computing. IEEE Cloud Computing, 5(4), 36–42. https://doi.org/10.1109/MCC.2018.043221659
Bernstein, D. J., Buchmann, J., & Dahmen, E. (2009). Post-Quantum Cryptography. Springer.
Chen, L. K., Jordan, S., Liu, Y. K., Moody, D., Peralta, R., Perlner, R., & Smith-Tone, D. (2016). Report on post-quantum cryptography. National Institute of Standards and Technology.
Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES — The Advanced Encryption Standard. Springer Science & Business Media.
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654. https://doi.org/10.1109/TIT.1976.1055638
Gueron, S. (2012). Intel Advanced Encryption Standard (AES) New Instructions Set. IEEE Security & Privacy, 7(1), 64–69.
Katz, J., & Lindell, Y. (2020). Introduction to Modern Cryptography (3rd ed.). CRC Press.
Kaur, A., & Gupta, R. (2019). Comparative analysis of RSA and ECC for resource-constrained devices. International Journal of Computer Applications, 178(39), 1–7.
Koblitz, N., & Menezes, A. (2015). The random oracle model: A twenty-year retrospective. Designs, Codes and Cryptography, 77(2-3), 587–610.
Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (2019). Handbook of Applied Cryptography. CRC Press.
Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3. Internet Engineering Task Force.
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126. https://doi.org/10.1145/359340.359342
Singh, S., & Kumar, R. (2020). Performance analysis of symmetric and asymmetric cryptography algorithms for security. Journal of Computer Science, 16(5), 689–699.
Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson.
Stinson, D. R., & Paterson, M. B. (2019). Cryptography: Theory and Practice (4th ed.). CRC Press.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Comprehensive Journal of Science

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.









