2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE) 2018
DOI: 10.1109/icitisee.2018.8720983
|View full text |Cite
|
Sign up to set email alerts
|

Comparision Of AES 128, 192 And 256 Bit Algorithm For Encryption And Description File

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 0 publications
0
3
0
1
Order By: Relevance
“…En cuanto al tiempo de procesamiento AES-128 tiene un tiempo de procesamiento relativamente más rápido en comparación con los otros dos algoritmos. En cuanto al uso del CPU utilizado para el proceso de cifrado y descifrado de archivos, AES de 192 bits utiliza menos CPU que los otros dos algoritmos (Andriani et al, 2018).…”
Section: Encriptación Aes (Advanced Encryption Standards)unclassified
“…En cuanto al tiempo de procesamiento AES-128 tiene un tiempo de procesamiento relativamente más rápido en comparación con los otros dos algoritmos. En cuanto al uso del CPU utilizado para el proceso de cifrado y descifrado de archivos, AES de 192 bits utiliza menos CPU que los otros dos algoritmos (Andriani et al, 2018).…”
Section: Encriptación Aes (Advanced Encryption Standards)unclassified
“…This method will be symbolized in our research (AI AES OAMP) to be compared with a time (AES -192 bit) value mentioned in it. Ria Andriani, Stevi Ema Wijayanti, and Ferry Wahyu Wibowo [19] To determine how much time and CPU power is required to encrypt and decrypt a file, this search will compare the AES algorithm from AES-128 bit, AES-192 bit, and AES-256 bit. The study' s findings demonstrate that AES 128-bit processes information relatively more quickly than AES 192-bit and AES 256-bit.…”
Section: Related Workmentioning
confidence: 99%
“…The main objective of cryptography is to secure data communication from unauthorized access or data modification during the storage process (Vivi Wahdini et al, 2021). One proven effective cryptographic method is the Advanced Encryption Standard with a key length of 128 bits, commonly referred to as AES-128 (Andriani et al, 2018;M. Hidayat et al, 2023;Kaminsky et al, 2010).…”
Section: Introductionmentioning
confidence: 99%