SUST Repository

Performance Analysis of Classical Encryption Algorithms in encrypting Database Transactions

Show simple item record

dc.contributor.author Rudwan, Mohammed Suleiman Mohammed
dc.contributor.author Supervisor, Salah El-Dinn Deng AlJack
dc.date.accessioned 2016-08-18T06:53:23Z
dc.date.available 2016-08-18T06:53:23Z
dc.date.issued 2016-03-10
dc.identifier.citation Rudwan, Mohammed Suleiman Mohammed . Performance Analysis of Classical Encryption Algorithms in encrypting Database Transactions / Mohammed Suleiman Mohammed Rudwan ; Salah El-Dinn Deng AlJack .- khartoum :Sudan University of Science and Technology , college of Computer science , 2016 .- 53p. :ill. ;28cm .-M.Sc. en_US
dc.identifier.uri http://repository.sustech.edu/handle/123456789/13938
dc.description Thesis en_US
dc.description.abstract Database Transactions are pieces of information which holds operations that are performed on the database. They became a very critical issue that should be carefully stored and secured while they are under process, and during their existence in memory. In this research, encryption was introduced as a solution for securing database transactions and text data that it holds in memory. The main objective is that to measure the performance for three algorithms: Simple Substitution, Caesar, and Periodic Permutation respectively. Performances are measured here in terms of time, memory usage and CPU consumption. Final results we had obtained defined clearly – in terms of time – that in large data processing, Caesar and periodic Permutation had the optimal performance while Caesar had recorded the best score than the other two in case of small data sizes. On the other hand, and in terms of memory usage, simple substitution algorithm had recorded the smallest size used to perform in small-sized data, but in large data, Caesar had won the competition over them. From CPU resource point of view, Simple Substitution had recorded the least efforts of CPU in small-sized data and the same in large-sized data, while Caeser had consumed largest CPU efforts in large as well as small sized data. All in all, this experiment can be based to enable Database Designers to decide which algorithm is the suitable one according to type of database transaction waiting for processing, as well as length of data that it consists of. en_US
dc.description.sponsorship Sudan University of Science and Technology en_US
dc.language.iso en en_US
dc.publisher Sudan University of Science and Technology en_US
dc.subject Computer science en_US
dc.subject encrypting Database Transactions en_US
dc.subject Encryption Algorithms en_US
dc.subject Performance Analysis of Classical en_US
dc.title Performance Analysis of Classical Encryption Algorithms in encrypting Database Transactions en_US
dc.title.alternative تحليل أداء خوارزميات التشفير التقليدية في تشفير المعاملات على قواعد البيانات en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Share

Search SUST


Browse

My Account