Symmetric and Asymmetric Cryptography: Basic Principles of DES, AES, RSA, and Elliptic Curve Encryption in Information Security

Authors

  • Nia Novianti

    Politeknik Hasan Abdi, Deli Serdang, Indonesia
    Author
  • Syurahbil

    Politeknik Hasan Abdi, Deli Serdang, Indonesia
    Author
  • Rani Robetty

    Universitas Deztron Indonesia
    Author

Keywords:

Symmetric Cryptography, , Asymmetric Cryptography, Information Security,

Abstract

In the digital era, information security has become a critical priority for organizations and individuals. Cryptography serves as the foundation of modern security systems by providing confidentiality, integrity, and authentication mechanisms. This research comprehensively examines the fundamental principles and implementation of symmetric cryptography (DES and AES) and asymmetric cryptography (RSA and Elliptic Curve). The study analyzes the mathematical foundations, encryption mechanisms, security strengths, and practical applications of each algorithm. DES, despite being deprecated due to its 56-bit key vulnerability, remains relevant for understanding block cipher evolution. AES has emerged as the global standard with robust 128, 192, and 256-bit key options. RSA provides secure public-key infrastructure through factorization complexity, while Elliptic Curve Cryptography offers equivalent security with significantly smaller key sizes, making it ideal for resource-constrained environments. The research employs comparative analysis methodology to evaluate algorithm performance, security levels, and implementation efficiency. Results demonstrate that hybrid cryptosystems combining symmetric and asymmetric approaches provide optimal security-performance balance. The findings provide practical guidance for security architects in selecting appropriate cryptographic solutions based on specific requirements, computational resources, and threat models.

 

Keywords: Symmetric Cryptography, Asymmetric Cryptography, DES, AES, RSA, Elliptic Curve, Information Security, Encryption Algorithms

Downloads

Published

2026-02-04

How to Cite

Symmetric and Asymmetric Cryptography: Basic Principles of DES, AES, RSA, and Elliptic Curve Encryption in Information Security. (2026). JIRAN : Journal of Southeast Asia Studies, 7(2), 36-46. https://jiran.unaim-wamena.ac.id/jiran/article/view/14