Implementation and Evaluation of Data Protection in Databases Using Symmetric Encryption Algorithms

Authors

  • Venkatesh B
  • L Swathi
  • Naresh Tangudu
  • Satishkumar V E

DOI:

https://doi.org/10.52783/jns.v14.2558

Keywords:

Symmetric encryption algorithm, database security, data protection, performance analysis, AES, DES, Blowfish, RC4, ChaCha20

Abstract

In an era marked by rising cyber threats, ensuring database security and protecting sensitive information have become critical challenges. This study presents an experimental framework to evaluate the performance of various symmetric encryption algorithms—AES, DES, Blowfish, RC4, and ChaCha20—focusing on encryption and decryption efficiency and their impact on Data Manipulation Language (DML) operations, including insertion, selection, and update processes. A payment transaction system was simulated to replicate real-world conditions for assessing DML performance. Performance metrics such as encryption and decryption time were measured under different scenarios involving various database types, encryption key sizes, text lengths, and formats. Custom-developed Python scripts were used to implement the tests, and the results were analyzed using a Microsoft Power BI dashboard for detailed visualization. The findings highlight that RC4 demonstrated the fastest performance across all tested metrics, whereas DES exhibited the longest execution time. AES showed moderate performance compared to the other algorithms. These insights provide valuable guidance for researchers and practitioners on selecting encryption algorithms based on performance requirements, contributing to improved database security and operational efficiency.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

R. Verma and A. Kumar Sharma, “SIMULATION-BASED COMPARATIVE ANALYSIS OF SYMMETRIC ALGORITHMS,” International Journal of Advanced Research in Computer Science, vol. 11, no. 5, 2020, doi: 10.26483/ijarcs.v11i5.6655.

R. K. Muhammed et al., “Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption,” Kurdistan Journal of Applied Research, vol. 9, no. 1, pp. 52–65, May 2024, doi: 10.24017/science.2024.1.5.

D. A. F. Saraiva, V. R. Q. Leithardt, D. de Paula, A. S. Mendes, G. V. González, and P. Crocker, “PRISEC: Comparison of symmetric key algorithms for IoT devices,” Sensors (Switzerland), vol. 19, no. 19, Oct. 2019, doi: 10.3390/s19194312.

A. Salkanovic, S. Ljubic, L. Stankovic, and J. Lerga, “Analysis of Cryptography Algorithms Implemented in Android Mobile Application,” Information Technology and Control, vol. 50, no. 4, pp. 786–807, Dec. 2021, doi: 10.5755/j01.itc.50.4.29464.

Y. Mahamat, S. H. Othman, and S. H. Nkiama, “Comparative Study Of AES, Blowfish, CAST-128 And DES Encryption Algorithm,” 2016. [Online]. Available: www.iosrjen.org

I. Sumartono, A. Putera, U. Siahaan, and N. Mayasari, “An Overview of the RC4 Algorithm,” Article in IOSR Journal of Dental and Medical Sciences, vol. 18, no. 6, pp. 67–73, 2016, doi: 10.9790/0661-1806046773.

P. Nagar and N. B. Hulle, “Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher,” IOSR Journal of VLSI and Signal Processing (IOSR-JVSP, vol. 5, no. 1, pp. 2319–4197, 2015, doi: 10.9790/4200-05125456.

S. Barbero, D. Bazzanella, and E. Bellini, “Rotational Cryptanalysis on ChaCha Stream Cipher,” Symmetry (Basel), vol. 14, no. 6, Jun. 2022, doi: 10.3390/sym14061087.

M. H. Taha and J. M. Al-Tuwaijari, “Improvement of Chacha20 algorithm based on tent and Chebyshev chaotic maps,” Iraqi Journal of Science, vol. 62, no. 6, pp. 2029–2039, Jul. 2021, doi: 10.24996/ijs.2021.62.6.29.

K. Assa-Agyei and F. Olajide, “A Comparative Study of Twofish, Blowfish, and Advanced Encryption Standard for Secured Data Transmission,” 2023. [Online]. Available: www.ijacsa.thesai.org

B. A. Buhari, A. A. Obiniyi, K. Sunday, and S. Shehu, “Performance Evaluation of Symmetric Data Encryption Algorithms: AES and Blowfish,” Saudi Journal of Engineering and Technology, vol. 04, no. 10, pp. 407–414, Oct. 2019, doi: 10.36348/sjeat.2019.v04i10.002.

A. Boicea, F. Radulescu, C. O. Truica, and C. Costea, “Database Encryption Using Asymmetric Keys: A Case Study,” in Proceedings - 2017 21st International Conference on Control Systems and Computer, CSCS 2017, Institute of Electrical and Electronics Engineers Inc., Jul. 2017, pp. 317–323. doi: 10.1109/CSCS.2017.50.

A. M. Abbas, A. M. S. Rahma, and N. F. Hassan, “Comparative study on encrypted database techniques,” Journal of Al-Qadisiyah for Computer Science and Mathematics, vol. 12, no. 3, Nov. 2020, doi: 10.29304/jqcm.2020.12.3.710.

J. R. Sekhar and G. Sivaranjani, “Database Encryption Using TSFS Algorithm,” 2018.

T. Hirano, Y. Kawai, and Y. Koseki, “DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems,” in 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021, Institute of Electrical and Electronics Engineers Inc., Jan. 2021. doi: 10.1109/DSC49826.2021.9346255.

C. Krähenbühl and A. Perrig, “Searchable symmetric encryption,” in Trends in Data Protection and Encryption Technologies, Springer Nature, 2023, pp. 71–75. doi: 10.1007/978-3-031-33386-6_14.

T. S. Patel, S. Kolachina, D. P. Patel, and P. S. Shrivastav, “Comparative evaluation of different methods of ‘Homomorphic Encryption’ and ‘Traditional Encryption’ on a dataset with current problems and developments.”

C. Ho, K. Pak, S. Pak, M. Pak, and C. Hwang, “A Study on Improving the Performance of Encrypted Database Retrieval Using External Indexing System of B+ Tree Structure,” in Procedia Computer Science, Elsevier B.V., 2018, pp. 706–714. doi: 10.1016/j.procs.2019.06.110.

R. E. J. Paje, A. M. Sison, and R. P. Medina, “Multidimensional key RC6 algorithm,” in ACM International Conference Proceeding Series, Association for Computing Machinery, Jan. 2019, pp. 33–38. doi: 10.1145/3309074.3309095.

J. W. . Bos and Martijn. Stam, Computational cryptography: algorithmic aspects of cryptology. Cambridge University Press, 2021.

D. I. George Amalarethinam, J. Sai Geetha, and K. Mani, “Analysis and enhancement of speed in public key cryptography using Message Encoding Algorithm,” Indian J Sci Technol, vol. 8, no. 16,

A. Kumar, P. Pranav, S. Dutta, and S. Chakraborty, “Analysis of the empirical complexity of Advanced Encryption Standards-128 statistically,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 27, no. 6, pp. 1887–1903, Sep. 2024, doi: 10.47974/JDMSC-1854.

L. Tang, J.-N. Liu, D. Feng, and W. Tong, “An adaptive cryptographic accelerator for network storage security on dynamically reconfigurable platform,” in Eighth International Symposium on Optical Storage and 2008 International Workshop on Information Data Storage, SPIE, Dec. 2008, p. 71251B. doi: 10.1117/12.823322.

E. Ozturk, Y. Doroz, E. Savas, and B. Sunar, “A custom accelerator for homomorphic encryption applications,” IEEE Transactions on Computers, vol. 66, no. 1, pp. 3–16, Jan. 2017, doi: 10.1109/TC.2016.2574340.

Omolara Patricia Olaiya, Temitayo Oluwadamilola Adesoga, Azeez Adekunle Adebayo, Fehintola Moyosore Sotomi, Oluwaseun Aaron Adigun, and Paschal M Ezeliora, “Encryption techniques for financial data security in fintech applications,” International Journal of Science and Research Archive, vol. 12, no. 1, pp. 2942–2949, Jun. 2024, doi: 10.30574/ijsra.2024.12.1.1210.

H. Li, Y. Yang, Y. Dai, S. Yu, and Y. Xiang, “Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data,” IEEE Transactions on Cloud Computing, vol. 8, no. 2, pp. 484–494, Apr. 2020, doi: 10.1109/TCC.2017.2769645.

C. H. Lin, J. X. Wu, P. Y. Chen, C. M. Li, N. S. Pai, and C. L. Kuo, “Symmetric Cryptography with a Chaotic Map and a Multilayer Machine Learning Network for Physiological Signal Infosecurity: Case Study in Electrocardiogram,” IEEE Access, vol. 9, pp. 26451–26467, 2021, doi: 10.1109/ACCESS.2021.3057586.

F. Gao, “Data encryption algorithm for e-commerce platform based on blockchain technology,” Discrete and Continuous Dynamical Systems - Series S, vol. 12, no. 4–5, pp. 1457–1470, Aug. 2019, doi: 10.3934/dcdss.2019100.

H. Zhang, “Application of Information Encryption Technology in Computer Network Communication Security,” Wirel Commun Mob Comput, vol. 2022, 2022, doi: 10.1155/2022/9354441.

Downloads

Published

2025-03-24

How to Cite

1.
B V, Swathi L, Tangudu N, V E S. Implementation and Evaluation of Data Protection in Databases Using Symmetric Encryption Algorithms. J Neonatal Surg [Internet]. 2025Mar.24 [cited 2025Oct.11];14(8S):440-59. Available from: https://jneonatalsurg.com/index.php/jns/article/view/2558

Similar Articles

You may also start an advanced similarity search for this article.