An analysis of lowest energy consumption (CPU time) through running several cryptography algorithms with different video formats

One persistent obstacle has been verified to be one of the main problems with the main developments in the electronics and technology fields, called: Data Security. The data should be encrypted in order to be quickly and securely linked via the electronic information transfer over the network. The p...

Full description

Saved in:
Bibliographic Details
Main Authors: Jamil Alsayaydeh, Jamil Abedalrahim, Mohammad Alshannaq, Osama Saleh, Mohammad Nawafleh, Mohammad Mahmoud, Mohammad Nawafleh, Odai Yassin, Baharon, Mohd Rizuan, Baharudin, Zikri Abadi, Zainon, Maslan, Aziz, Azwan
Format: Article
Language:en
Published: Asian Research Publishing Network (ARPN) 2023
Online Access:http://eprints.utem.edu.my/id/eprint/27325/2/0224727122023613.PDF
http://eprints.utem.edu.my/id/eprint/27325/
http://www.arpnjournals.org/jeas/research_papers/rp_2023/jeas_0823_9290.pdf
https://www.scopus.com/record/display.uri?eid=2-s2.0-85177420291&origin=resultslist
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:One persistent obstacle has been verified to be one of the main problems with the main developments in the electronics and technology fields, called: Data Security. The data should be encrypted in order to be quickly and securely linked via the electronic information transfer over the network. The procedure of transforming plain text to ciphered-text is called encryption, where cannot be changed or understood simply by undesirable individuals. It may similarly be described as the science that utilizes mathematics in decryption and encryption data processes. In this article, we consider different significant algorithms utilized for data decryption and encryption in whole areas, for making a comparative study for most vital algorithms. This paper focuses on various current cryptography algorithms types. This paper also analyses the algorithm's security and parameters that define the cryptosystem efficiency.