COMPARATIVE ANALYSIS OF MODERN CRYPTOGRAPHIC CIPHERS AND THE AES ALGORITHM

Автор(и)

  • Gennadii Golovko
  • Oleksandr Rudenko

DOI:

https://doi.org/10.26906/SUNZ.2026.1.058

Ключові слова:

cryptography, functions, cypher, aes, operator, algorithm

Анотація

The growing intensity of cybersecurity threats has made information protection a critical issue in the modern digital landscape. Cryptographic algorithms serve as a fundamental mechanism for maintaining data confidentiality and integrity across information systems. The Advanced Encryption Standard (AES) continues to be one of the most trusted and extensively deployed encryption algorithms; however, a range of modern cryptographic alternatives has emerged, offering different performance and security characteristics. This paper presents a comparative analysis of both symmetric and asymmetric ciphers based on key criteria such as security level, computational efficiency, and resistance to cryptographic attacks. The strengths and weaknesses of each algorithm are examined, along with their suitability for various application environments. Particular emphasis is placed on the practical use of AES and competing ciphers in sectors including finance, telecommunications, and healthcare. The results of the comparison provide guidance for selecting appropriate cryptographic solutions for safeguarding sensitive data and contribute to a broader understanding of the effectiveness of contemporary cryptographic technologies.

Завантажити

Дані для завантаження поки недоступні.

Посилання

1. Sovin Ya., Khoma V. Comparison of AEAD algorithms for embedded systems of the Internet of Things. Lviv Polytechnic, 2019. ena.lpnu.ua. DOI: https://doi.org/10.23939/csn2019.01.076

2. Comparative study of the implementation of block ciphers for devices with limited resources (review). News of Higher Education Institutions. Radioelectronics, 2023. radio.kpi.ua DOI: https://doi.org/10.20535/S0021347023050011

3. Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption. arXiv, 2024. arxiv.org DOI: https://doi.org/10.48550/arXiv.2407.16274

4. Alanazi, H. et al. New Comparative Study Between DES, 3DES and AES Within Nine Factors. arXiv, 2010. DOI: https://doi.org/10.48550/arXiv.1003.4085

5. Shevchuk, Y. Analytical Approach to Evaluating the Effectiveness of Cryptographic Methods in Modern Information Security Systems. Futurity Proceedings, 2023. DOI: https://doi.org/10.5281/zenodo.15095109

6. Golovko G., Rudenko O., Batrachenko. A., Ryzymenko R, Organization of information protection at the "Drive Petrol" enterprise using a cryptographic algorithm AES. DOI: https://doi.org/10.26906/SUNZ.20 24.1.050

7. G. Golovko, D. Iievliev Enhanced authorization for secure management of sensitive data in hybrid applications Системи управління навігації та зв’язку 2 (72) 2023. – С .98-100. – Doi: https://doi.org/10.26906/SUNZ.2023.2.098

8. G. Golovko, M. Kalynovych Specifics of implementation of the on asymmetric encryption Algorithm elliptic curves Системи управління навігації та зв’язку 1 (71) 2023. – С .84-90. – Doi: https://doi.org/10.26906/SUNZ.2022.4.066

9. G. Golovko, M. Tolochyn Using the AES encryption method in practice Системи управління навігації та зв’язку 4 (70) 2022. – С. 71-74. – Doi: https://doi.org/10.26906/SUNZ.2022.4.071

Опубліковано

2026-02-13

Номер

Розділ

Інформаційні технології