Please use this identifier to cite or link to this item: https://repository.sustech.edu/handle/123456789/13938
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRudwan, Mohammed Suleiman Mohammed-
dc.contributor.authorSupervisor, Salah El-Dinn Deng AlJack-
dc.date.accessioned2016-08-18T06:53:23Z-
dc.date.available2016-08-18T06:53:23Z-
dc.date.issued2016-03-10-
dc.identifier.citationRudwan, Mohammed Suleiman Mohammed . Performance Analysis of Classical Encryption Algorithms in encrypting Database Transactions / Mohammed Suleiman Mohammed Rudwan ; Salah El-Dinn Deng AlJack .- khartoum :Sudan University of Science and Technology , college of Computer science , 2016 .- 53p. :ill. ;28cm .-M.Sc.en_US
dc.identifier.urihttp://repository.sustech.edu/handle/123456789/13938-
dc.descriptionThesisen_US
dc.description.abstractDatabase Transactions are pieces of information which holds operations that are performed on the database. They became a very critical issue that should be carefully stored and secured while they are under process, and during their existence in memory. In this research, encryption was introduced as a solution for securing database transactions and text data that it holds in memory. The main objective is that to measure the performance for three algorithms: Simple Substitution, Caesar, and Periodic Permutation respectively. Performances are measured here in terms of time, memory usage and CPU consumption. Final results we had obtained defined clearly – in terms of time – that in large data processing, Caesar and periodic Permutation had the optimal performance while Caesar had recorded the best score than the other two in case of small data sizes. On the other hand, and in terms of memory usage, simple substitution algorithm had recorded the smallest size used to perform in small-sized data, but in large data, Caesar had won the competition over them. From CPU resource point of view, Simple Substitution had recorded the least efforts of CPU in small-sized data and the same in large-sized data, while Caeser had consumed largest CPU efforts in large as well as small sized data. All in all, this experiment can be based to enable Database Designers to decide which algorithm is the suitable one according to type of database transaction waiting for processing, as well as length of data that it consists of.en_US
dc.description.sponsorshipSudan University of Science and Technologyen_US
dc.language.isoenen_US
dc.publisherSudan University of Science and Technologyen_US
dc.subjectComputer scienceen_US
dc.subjectencrypting Database Transactionsen_US
dc.subjectEncryption Algorithmsen_US
dc.subjectPerformance Analysis of Classicalen_US
dc.titlePerformance Analysis of Classical Encryption Algorithms in encrypting Database Transactionsen_US
dc.title.alternativeتحليل أداء خوارزميات التشفير التقليدية في تشفير المعاملات على قواعد البياناتen_US
dc.typeThesisen_US
Appears in Collections:Masters Dissertations : Computer Science and Information Technology

Files in This Item:
File Description SizeFormat 
Performance Analysis of... .pdfResearch1.09 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.