OPTIMIZATION AND TESTING OF DATA ENCRYPTION ALGORITHMS
Keywords:
data encryption, encryption algorithms, optimization, testing, cybersecurity, symmetric encryption, asymmetric encryption, performance evaluation.Abstract
This study focuses on the optimization and testing of data encryption algorithms, which are critical for ensuring information security in computer systems and digital communications [1, 2, 10]. The research analyzes symmetric and asymmetric encryption methods, evaluates their performance, and proposes strategies for improving computational efficiency and robustness [3, 5, 6]. The results highlight the importance of selecting appropriate algorithms based on security requirements, processing speed, and resource consumption [4, 7, 8]. This work provides practical recommendations for software developers and cybersecurity specialists to enhance data protection and minimize vulnerabilities [2, 9, 10].
Downloads
References
OWASP Foundation. OWASP Mobile Top 10 Risks. OWASP, 2022. https://owasp.org
Smith, J. Data Encryption Techniques and Applications. New York: TechPress, 2018.
Kumar, R., Sharma, P. Performance Analysis of Symmetric and Asymmetric Encryption Algorithms. International Journal of Information Security, 2020, Vol. 15, Issue 2, pp. 45-58.
Lee, H. Optimization of Data Encryption Algorithms for High-Performance Systems. Journal of Cybersecurity, 2019, Vol. 7, Issue 3, pp. 112-125.
Chen, Y., Wang, L. Comparative Study of RSA and ECC in Mobile Applications. Cybersecurity Review, 2021, Vol. 9, Issue 1, pp. 34-50.
Patel, S. Techniques for Improving Encryption Algorithm Efficiency. Mobile Computing and Applications, 2020, Vol. 12, Issue 4, pp. 65-78.
Miller, D. Practical Implementation of Encryption Algorithms in Different Operating Systems. Journal of Information Technology, 2021, Vol. 18, Issue 2, pp. 89-102.
Alasmary, W., Alhaidari, F. Benchmarking and Testing of Encryption Algorithms. International Journal of Mobile Computing, 2020, Vol. 6, Issue 2, pp. 23-38.
Gupta, A., Singh, R. Security and Performance Trade-offs in Data Encryption. Information Security Journal, 2019, Vol. 28, Issue 1, pp. 55-67.
OWASP Foundation. Mobile Application Security Verification Standard (MASVS). OWASP, 2021. https://owasp.org
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
All content published in the Journal of Applied Science and Social Science (JASSS) is protected by copyright. Authors retain the copyright to their work, and grant JASSS the right to publish the work under a Creative Commons Attribution License (CC BY). This license allows others to distribute, remix, adapt, and build upon the work, even commercially, as long as they credit the author(s) for the original creation.