Please use this identifier to cite or link to this item:
https://repository.sustech.edu/handle/123456789/13938
Title: | Performance Analysis of Classical Encryption Algorithms in encrypting Database Transactions |
Other Titles: | تحليل أداء خوارزميات التشفير التقليدية في تشفير المعاملات على قواعد البيانات |
Authors: | Rudwan, Mohammed Suleiman Mohammed Supervisor, Salah El-Dinn Deng AlJack |
Keywords: | Computer science encrypting Database Transactions Encryption Algorithms Performance Analysis of Classical |
Issue Date: | 10-Mar-2016 |
Publisher: | Sudan University of Science and Technology |
Citation: | Rudwan, Mohammed Suleiman Mohammed . Performance Analysis of Classical Encryption Algorithms in encrypting Database Transactions / Mohammed Suleiman Mohammed Rudwan ; Salah El-Dinn Deng AlJack .- khartoum :Sudan University of Science and Technology , college of Computer science , 2016 .- 53p. :ill. ;28cm .-M.Sc. |
Abstract: | Database Transactions are pieces of information which holds operations that are performed on the database. They became a very critical issue that should be carefully stored and secured while they are under process, and during their existence in memory. In this research, encryption was introduced as a solution for securing database transactions and text data that it holds in memory. The main objective is that to measure the performance for three algorithms: Simple Substitution, Caesar, and Periodic Permutation respectively. Performances are measured here in terms of time, memory usage and CPU consumption. Final results we had obtained defined clearly – in terms of time – that in large data processing, Caesar and periodic Permutation had the optimal performance while Caesar had recorded the best score than the other two in case of small data sizes. On the other hand, and in terms of memory usage, simple substitution algorithm had recorded the smallest size used to perform in small-sized data, but in large data, Caesar had won the competition over them. From CPU resource point of view, Simple Substitution had recorded the least efforts of CPU in small-sized data and the same in large-sized data, while Caeser had consumed largest CPU efforts in large as well as small sized data. All in all, this experiment can be based to enable Database Designers to decide which algorithm is the suitable one according to type of database transaction waiting for processing, as well as length of data that it consists of. |
Description: | Thesis |
URI: | http://repository.sustech.edu/handle/123456789/13938 |
Appears in Collections: | Masters Dissertations : Computer Science and Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Performance Analysis of... .pdf | Research | 1.09 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.