Comparative Analysis of File Transfer Performance Between Java and.NET Using a Hybrid Encryption Protocol with AES and RSA

Abstract

The purpose of the research project was to carry out the comparative analysis of the performance of a computer system using a hybrid encryption protocol (symmetric AES and asymmetric RSA) and the mechanism of sockets between the JAVA and.NET platforms, applied to the system of information backups for the Loja Technical Office of the Zonal Coordination 7 of the Identification and Certification of the Civil Registry. To determine the performance between both platforms, the analysis of each indicator obtained from the FURPS Model was done with a sample of 335 files distributed among 200 light, 100 medium and 35 heavy, for which the nonparametric analysis algorithm Mann–Whiney was used, obtaining as a result a significant difference in favor of C # in terms of response time, while for the consumption of resources (RAM and CPU) a significant difference was found in favor of Java.


 


Keywords: cryptography, AES, RSA, Java, C#

References
[1] Aguirre, J. R. (2006). Libro Electrónico de Seguridad Informática y Criptografía Versión 4.1. Madrid: UPM.


[2] Al Hasib, A., & Mahmudul Haque, A. (2008). A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography. IEEE, 505-510.


[3] Al Hasib, A., & Mahmudul, A. (2008). A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography. IEEE Computer Society, 505-510.


[4] bouncycastle. (30 de Ago de 2018). https://www.bouncycastle.org/. Obtenido de https://www.bouncycastle.org/


[5] Díaz, J. C. (1995). Criptografía: historia de la escritura cifrada. Complutense.


[6] García Belmonte, R. (2016). Firma Digital Basada en Funciones HASH y un Algoritmo Criptográfico Híbrido. CIDETEC, pp. 19.


[7] Gómez, Á. (2011). Enciclopedia de la Seguridad Informática. México: Alfaomega.


[8] Layana Molina, S. (2017). Estudio Comparativo de la Eficiencia de los Algoritmos Criptográficos AES y RSA: Caso de Estudio de una Institución en la Ciudad de Guayaquil. UEES.


[9] Mahajan, P., & Sachdeva, A. (2013). A Study of Encryption Algorithms AES, DES and RSA for Security. Global Journal of Computer Science and Technology Network Web & Security.


[10] Medina, J. (2014). Pruebas de Rendimiento TIC. Murcia: SG6. Obtenido de https: //archive.org/details/PruebasDeRendimientoTic


[11] Menezes, A., Ooschot, P., & Vanstone, S. (1996). Handbook of Applied Cryptography. CRC Press, Inc.


[12] Padmavathi, B., & Ranjitha, K. (2013). A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique. International Journal of Science and Research (IJSR), pp. 170-174.


[13] Paredes, G. G. (2006). Introducción a la Criptografía. RU TIC, 55.


[14] Patil, P., Narayankar, P., Narayan, D., & Meena, S. (2016). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. ElSevier, pp. 617-624.


[15] Prajapati, P., Patel, N., Nacwan, R., Kachhiya, N., & Shah, P. (2014). Comparative Analysis of DES, AES, RSA Encryption Algorithms. SemanticSholar.


[16] Pressman, R. (2002). Ingeniería de Sofware: Un Enfoque Práctico (Quita Edición ed.). McGraw Hill.


[17] Ramakrishnan, K., Amnazjagam, M., Rajan, R., & Karthik, S. (2015). USA Patente n∘ US-8972940-B2.


[18] Soriano, M. (s.f.). Seguridad en redes y seguridad en la información. Obtenido de http://improvet.cvut.cz/project/download/C2ES/ Seguridad_de_Red_e_Informacion.pdf


[19] TIOBE. (02 de 02 de 2018). www.tiobe.com. Obtenido de https://www.tiobe.com/ tiobe-index/


[20] Vallejo, M. C. (24 de Nov de 2005). Firma Electrónica. Obtenido de https://www. derechoecuador.com/firma-electroacutenica


[21] Vidal-Silva, C., Madariaga, E., & Solis, R. (2017). Estudio Piloto de la Importancia del Rendimiento, Seguridad y Fiabilidad en el Proceso de Desarrollo de Software en Chile. Scielo, pp. 95-106. doi:http://dx.doi.org/10.4067/S0718- 07642017000300011.