Comparative Performance Study on Symmetric and Asymmetric Encryption Algorithm: Comprehensive Report of a Comparative Study

Authors

  • Amel Abdyssalam A Alhaag Faculty of Information Technology, University of Az-Zawiya Author

DOI:

https://doi.org/10.65405/114fjq52

Keywords:

Symmetric encryption, Asymmetric encryption, Performance evaluation, AES, RSA, ECC, Cryptography

Abstract

The boom in the digital communication, e-commerce and cloud-based systems has highlighted the nature of cryptographic systems in the ensuring of security in information exchange. Symmetric and asymmetric encryption algorithms belong to the most studied cryptographic paradigms and the building blocks of the existing security systems. Although both types provide the same degree of confidentiality the performance features of the two types and their actual performance is very different. The present paper will provide a comparison of the two kinds of algorithms with a focus on the computational speed, memory requirement, scalability, and attack resistance. The experimental findings and literature have demonstrated that the symmetry algorithms such as Advanced Encryption Standard (AES) is more efficient and quick in its simultaneous performance and must be applied in the case of encrypting huge amounts of information. On the other hand, asymmetric algorithms, including the Rivest Shamir Adleman (RSA) and Elliptic Curve Cryptography (ECC) are computationally inefficient, yet offer advantages in distributing keys, as well as authentication. These findings are the reason why there is an ever-growing tendency to consider hybrid cryptosystems incorporating the strengths of both approaches to reach an equilibrium of performance and security (Stallings, 2017; Singh and Kumar, 2020).

Downloads

Download data is not yet available.

References

Al-Bassam, M. (2018). Blockchain-based decentralized cloud computing. IEEE Cloud Computing, 5(4), 36–42. https://doi.org/10.1109/MCC.2018.043221659

Bernstein, D. J., Buchmann, J., & Dahmen, E. (2009). Post-Quantum Cryptography. Springer.

Chen, L. K., Jordan, S., Liu, Y. K., Moody, D., Peralta, R., Perlner, R., & Smith-Tone, D. (2016). Report on post-quantum cryptography. National Institute of Standards and Technology.

Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES — The Advanced Encryption Standard. Springer Science & Business Media.

Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654. https://doi.org/10.1109/TIT.1976.1055638

Gueron, S. (2012). Intel Advanced Encryption Standard (AES) New Instructions Set. IEEE Security & Privacy, 7(1), 64–69.

Katz, J., & Lindell, Y. (2020). Introduction to Modern Cryptography (3rd ed.). CRC Press.

Kaur, A., & Gupta, R. (2019). Comparative analysis of RSA and ECC for resource-constrained devices. International Journal of Computer Applications, 178(39), 1–7.

Koblitz, N., & Menezes, A. (2015). The random oracle model: A twenty-year retrospective. Designs, Codes and Cryptography, 77(2-3), 587–610.

Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (2019). Handbook of Applied Cryptography. CRC Press.

Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3. Internet Engineering Task Force.

Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126. https://doi.org/10.1145/359340.359342

Singh, S., & Kumar, R. (2020). Performance analysis of symmetric and asymmetric cryptography algorithms for security. Journal of Computer Science, 16(5), 689–699.

Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson.

Stinson, D. R., & Paterson, M. B. (2019). Cryptography: Theory and Practice (4th ed.). CRC Press.

Downloads

Published

2026-01-12

How to Cite

Comparative Performance Study on Symmetric and Asymmetric Encryption Algorithm: Comprehensive Report of a Comparative Study. (2026). Comprehensive Journal of Science, 10(ملحق 38), 1242-1256. https://doi.org/10.65405/114fjq52