A Comparative Study of the Performance and Security Issues of AES and RSA
Cryptography
Abdullah Al Hasib and Abul Ahsan Md. Mahmudul Haque
Helsinki University of Technology
Telecommunication Software and Multimedia Laboratory
Finland
hasib iut@yahoo.com, ahaque@cc.hut.fi
Abstract
Security is always a major concern in the field of commu-
nication. Advanced Encryption Standard (AES) and Rivest-
Shamir-Adleman (RSA) algorithms are the two popular en-
cryption schemes that guarantee confidentiality and authen-
ticity over an insecure communication channel. There has
been trifling cryptanalytic progress against these two al-
gorithms since their advent. This paper presents the fun-
damental mathematics behind the AES and RSA algorithm
along with a brief description of some cryptographic prim-
itives that are commonly used in the field of communica-
tion security. It also includes several computational issues
as well as the analysis of AES and RSA security aspects
against different kinds of attacks including the countermea-
sures against these attacks.
1. Introduction
The fundamental necessity in security is to hide infor-
mation from irrelevant public or malicious attackers. This
requirement has given birth to different kinds of crypto-
graphic primitives including symmetric and asymmetric
cryptography, hash functions, digital signatures, message
authentication codes etc.
Symmetric cryptography: In symmetric encryption, a
key is shared between the sender and the receiver which is
kept secret from the intruder. Among the different kinds
of symmetric algorithms, Advanced Encryption Standard
(AES) is gaining popularity due to its better security and
efficiency than its predecessors [10]. It was defined in Fed-
eral Information Processing Standard (FIPS) 192, published
in November 2001 [9, 8].
As a symmetric cipher, AES shares a secret key to en-
crypt and decrypt any message and operates on 128 bit
fixed block. AES may be configured to use 3 different key-
lengths and the resulting algorithms are named AES-128,
AES-192 and AES-256 respectively to indicate the length
in bits of the key.
Asymmetric cryptography: Unlike the symmetric cryp-
tography, asymmetric cryptography uses a pair of keys to
encrypt and decrypt message. One of these two keys is
known as public key as it is distributed to others and the
other is called private key which is kept secret. Normally
public key is used to encrypt any message which can only
be decrypted by the corresponding private key. There are
essential properties that must be satisfied by the asymmet-
ric cryptography [15]
• The key generation process should be computationally
efficient.
• Sender should be able to compute the cipher text by
using the public key of the receiver for any message.
• The receiver should be able to decrypt the cipher easily
to plain text by using his own private key.
• It is impossible or at least impractical to compute the
private key from the corresponding public key.
• It is computationally infeasible to compute the plain
text form the public key and cipher text.
RSA is the most widely used asymmetric encryption sys-
tem which was invented by Ronald Rivest, Adi Shamir, and
Len Adleman in the year 1977 [4]. As a public key encryp-
tion standard, the private key is kept secret but the public
key is revealed to everybody in RSA. Since its innovation,
RSA is regarded as one of the most secure cryptosystems in
existence.
The purpose of this paper is to describe the basic en-
cryption and decryption method as well as to cover math-
ematical and security aspects of the two most widely used
encryption schemes.
Third 2008 International Conference on Convergence and Hybrid Information Technology
978-0-7695-3407-7/08 $25.00 © 2008 IEEE
DOI 10.1109/ICCIT.2008.179
505
Third 2008 International Conference on Convergence and Hybrid Information Technology
978-0-7695-3407-7/08 $25.00 © 2008 IEEE
DOI 10.1109/ICCIT.2008.179
505