Question: AES vs RSA This Lab will give you an idea as to how much processing time AES and RSA require to perform encryption and decryption.

 AES vs RSA This Lab will give you an idea as

AES vs RSA This Lab will give you an idea as to how much processing time AES and RSA require to perform encryption and decryption. You can use a programming language of your choice, but both AES and RSA implementations should be in the same language. First, familiarize yourself with the key generation, encryption and decryption functions For AES, choose key sizes of 128, 196 and 256 bits For RSA, choose key sizes of about 1024 bits, 2048 bits and 4096 bits. Then, using different keys each time, encrypt/decrypt a given plain text 100 times. Compute the average execution time for each time. Tabulate the average execution times for AES and RSA for different key sizes. Also, include the brute force complexity for each of them. Submit a report including your references for the implementations. List the type and speed of the processor, and the memory (RAM) of the machine you execute the code on. Summarize your observations on the execution times, key generation and strength of each of the above. Which choices would be choose for your use and why? Comment on the implementations and programming language ehoice. Include screenshots of your inputoutput and execution time results. AES vs RSA This Lab will give you an idea as to how much processing time AES and RSA require to perform encryption and decryption. You can use a programming language of your choice, but both AES and RSA implementations should be in the same language. First, familiarize yourself with the key generation, encryption and decryption functions For AES, choose key sizes of 128, 196 and 256 bits For RSA, choose key sizes of about 1024 bits, 2048 bits and 4096 bits. Then, using different keys each time, encrypt/decrypt a given plain text 100 times. Compute the average execution time for each time. Tabulate the average execution times for AES and RSA for different key sizes. Also, include the brute force complexity for each of them. Submit a report including your references for the implementations. List the type and speed of the processor, and the memory (RAM) of the machine you execute the code on. Summarize your observations on the execution times, key generation and strength of each of the above. Which choices would be choose for your use and why? Comment on the implementations and programming language ehoice. Include screenshots of your inputoutput and execution time results

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!