dc.contributor.author |
Rudwan, Mohammed Suleiman Mohammed |
|
dc.contributor.author |
Supervisor, Salah El-Dinn Deng AlJack |
|
dc.date.accessioned |
2016-08-18T06:53:23Z |
|
dc.date.available |
2016-08-18T06:53:23Z |
|
dc.date.issued |
2016-03-10 |
|
dc.identifier.citation |
Rudwan, Mohammed Suleiman Mohammed . Performance Analysis of Classical Encryption Algorithms in encrypting Database Transactions / Mohammed Suleiman Mohammed Rudwan ; Salah El-Dinn Deng AlJack .- khartoum :Sudan University of Science and Technology , college of Computer science , 2016 .- 53p. :ill. ;28cm .-M.Sc. |
en_US |
dc.identifier.uri |
http://repository.sustech.edu/handle/123456789/13938 |
|
dc.description |
Thesis |
en_US |
dc.description.abstract |
Database Transactions are pieces of information which holds operations that are performed on the database. They became a very critical issue that should be carefully stored and secured while they are under process, and during their existence in memory.
In this research, encryption was introduced as a solution for securing database transactions and text data that it holds in memory. The main objective is that to measure the performance for three algorithms: Simple Substitution, Caesar, and Periodic Permutation respectively. Performances are measured here in terms of time, memory usage and CPU consumption. Final results we had obtained defined clearly – in terms of time – that in large data processing, Caesar and periodic Permutation had the optimal performance while Caesar had recorded the best score than the other two in case of small data sizes. On the other hand, and in terms of memory usage, simple substitution algorithm had recorded the smallest size used to perform in small-sized data, but in large data, Caesar had won the competition over them. From CPU resource point of view, Simple Substitution had recorded the least efforts of CPU in small-sized data and the same in large-sized data, while Caeser had consumed largest CPU efforts in large as well as small sized data. All in all, this experiment can be based to enable Database Designers to decide which algorithm is the suitable one according to type of database transaction waiting for processing, as well as length of data that it consists of. |
en_US |
dc.description.sponsorship |
Sudan University of Science and Technology |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Sudan University of Science and Technology |
en_US |
dc.subject |
Computer science |
en_US |
dc.subject |
encrypting Database Transactions |
en_US |
dc.subject |
Encryption Algorithms |
en_US |
dc.subject |
Performance Analysis of Classical |
en_US |
dc.title |
Performance Analysis of Classical Encryption Algorithms in encrypting Database Transactions |
en_US |
dc.title.alternative |
تحليل أداء خوارزميات التشفير التقليدية في تشفير المعاملات على قواعد البيانات |
en_US |
dc.type |
Thesis |
en_US |