RMIT University
Browse

Performance Analysis of Twofish Cryptography Algorithm in Big Data

conference contribution
posted on 2024-11-03, 13:30 authored by Rolou Maata, Ronald Cordova, Alrence HalibasAlrence Halibas
Information security in big data plays a vital role in today's modern era of computing. It has become significant issue due to the popularity of Internet, free access of internet and data, online businesses, and communication technologies that have been emerged tremendously, making them a potential computer security threats. In order to overcome these threats, modern data communication uses cryptography as a technique to secure big data transmission efficiently and effectively. This paper aims to demonstrate the process of encryption and decryption of different big datasets and compare its results in terms of message size and time. There are seven (7) different big data files that have been loaded in a Java Netbeans twosifh algorithm program that includes app store, interactions train, border crossing, PP users, PP recipes, raw recipes and raw interactions for simulation purposes. The main purpose of simulation is to record the accuracy and efficiency of big data files used. The results of the simulation were recorded, compared, and analyzed to create valuable contribution to information security.

History

Start page

56

End page

60

Total pages

5

Outlet

ACM International Conference Proceeding Series

Name of conference

9th International Conference on Software Information and Engineering (ICSIE)

Publisher

Association for Computing Machinery

Place published

United States

Start date

2020-11-11

End date

2020-11-13

Language

English

Copyright

© 2020 ACM.

Former Identifier

2006106229

Esploro creation date

2022-11-19

Usage metrics

    Scholarly Works

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC