OPTIMIZATION AND TESTING OF DATA ENCRYPTION ALGORITHMS

Authors

  • Sobirova Muslimaxon Farhodbek kizi Kokand University, Andijan Branch Computer Engineering, Group 24_05

Keywords:

data encryption, encryption algorithms, optimization, testing, cybersecurity, symmetric encryption, asymmetric encryption, performance evaluation.

Abstract

This study focuses on the optimization and testing of data encryption algorithms, which are critical for ensuring information security in computer systems and digital communications [1, 2, 10]. The research analyzes symmetric and asymmetric encryption methods, evaluates their performance, and proposes strategies for improving computational efficiency and robustness [3, 5, 6]. The results highlight the importance of selecting appropriate algorithms based on security requirements, processing speed, and resource consumption [4, 7, 8]. This work provides practical recommendations for software developers and cybersecurity specialists to enhance data protection and minimize vulnerabilities [2, 9, 10].

Downloads

Download data is not yet available.

References

OWASP Foundation. OWASP Mobile Top 10 Risks. OWASP, 2022. https://owasp.org

Smith, J. Data Encryption Techniques and Applications. New York: TechPress, 2018.

Kumar, R., Sharma, P. Performance Analysis of Symmetric and Asymmetric Encryption Algorithms. International Journal of Information Security, 2020, Vol. 15, Issue 2, pp. 45-58.

Lee, H. Optimization of Data Encryption Algorithms for High-Performance Systems. Journal of Cybersecurity, 2019, Vol. 7, Issue 3, pp. 112-125.

Chen, Y., Wang, L. Comparative Study of RSA and ECC in Mobile Applications. Cybersecurity Review, 2021, Vol. 9, Issue 1, pp. 34-50.

Patel, S. Techniques for Improving Encryption Algorithm Efficiency. Mobile Computing and Applications, 2020, Vol. 12, Issue 4, pp. 65-78.

Miller, D. Practical Implementation of Encryption Algorithms in Different Operating Systems. Journal of Information Technology, 2021, Vol. 18, Issue 2, pp. 89-102.

Alasmary, W., Alhaidari, F. Benchmarking and Testing of Encryption Algorithms. International Journal of Mobile Computing, 2020, Vol. 6, Issue 2, pp. 23-38.

Gupta, A., Singh, R. Security and Performance Trade-offs in Data Encryption. Information Security Journal, 2019, Vol. 28, Issue 1, pp. 55-67.

OWASP Foundation. Mobile Application Security Verification Standard (MASVS). OWASP, 2021. https://owasp.org

Downloads

Published

2026-01-29

How to Cite

Sobirova Muslimaxon Farhodbek kizi. (2026). OPTIMIZATION AND TESTING OF DATA ENCRYPTION ALGORITHMS. Journal of Applied Science and Social Science, 16(01), 855–858. Retrieved from https://www.internationaljournal.co.in/index.php/jasass/article/view/3120