Comparative Analysis Between Advanced Encryption Standard and Fully Homomorphic Encryption Algorithm to Secure Data in Financial Technology Applications

Nurdin Nurdin

Abstract


This research discusses the comparison between two encryption algorithms, namely Advanced Encryption Standard (AES) and Fully Homomorphic Encryption (FHE), in the context of data security in Financial Technology (Fintech) applications. The main aim of this research is to analyze the speed and efficiency of the two algorithms to provide information and motivation to Fintech Application business actors to determine the right algorithm for securing data. The research results show that AES is faster and more efficient in terms of encryption and decryption compared to FHE. For encryption, the AES algorithm is 1,100 times faster than the FHE algorithm. For decryption, the AES algorithm is 581 times faster than the FHE algorithm. For arithmetic processing, AES is 132 times faster than FHE. CPU consumption for AES encryption is 35.93% lower CPU usage than FHE. In AES decryption 10.31% lower than FHE for CPU usage. In the arithmetic process AES is 9.33% lower in usage than FHE. For memory usage in the FHE encryption process, it has an advantage, namely 2.3 times lower than AES for memory usage. During decryption, AES memory usage is superior with memory consumption 54 times lower than FHE. For the arithmetic process, AES uses 4.3 times lower memory than FHE. Overall AES provides speed and low resource consumption, this makes AES very suitable for use in Fintech applications that require speed and efficiency. Even though FHE has advantages in memory usage during encryption alone, this is not enough because it takes a long time to carry out the encryption process. This research suggests that further research will attempt to make the FHE algorithm more efficient and faster in processing data, this is considering the potential of FHE which is able to process encrypted data

Keywords


Advanced Encryption Standard (AES), Fully Homomorphic Encryption (FHE), data security, Fintech, encryption, decryption

References


C. M. Annur, “Ada 366 Anggota Asosiasi Fintech di Indonesia hingga 2022, Begini Trennya,” 2023, Accessed: Jan. 18, 2024. [Online]. Available: https://databoks.katadata.co.id/datapublish/2023/08/01/ada-366-anggota-asosiasi-fintech-di-indonesia-hingga-2022-begini-trennya

OWASP, “A02:2021 – Cryptographic Failures,” 2021, Accessed: Mar. 07, 2024. [Online]. Available: https://owasp.org/Top10/A02_2021-Cryptographic_Failures/

L. Devi and Thangamuthu, “Cyber Security - Data Privacy and Data Security,” Cyber Security, no. 2021, pp. 15–20, 2021.

A. Calder and S. Watkins, “IT Governance, An International Guide to Data Security and ISO27001/ISO270002,” 2020.

E. S. Marsiani, I. Setiadi, and A. Cahyo, “Implementasi Sistem Keamanan Aes 256-Bit Gcm Guna Mengamankan Data Pribadi,” 2021.

Nurdin, R. Ratnadewi, and N. K. Dian R, “Sms Encryption Application Using 3Des (Triple Data Encryption Standard) Algorithm Based on Android,” IOP Conf. Series: Journal of Physics: Conf. Series 1363 (2019) 012074, 2019.

N. Nurdin, B. Bustami, M. Hutomi, M. Elveny and R. Syah, “Implementation of the BFS algorithm and web scraping techniques for online shop detection in Indonesia,” Journal of Theoretical and Applied Information Technology., vol. 99, no. 12, pp. 2878-2889, 2021.

M. Azhari, J. Perwitosari, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” Jurnal Pendidikan Sains dan Komputer, vol. 2, no. 1, pp. 2809–476, 2022, doi: 10.47709/jpsk.v2i1.1390.

G. Golovko and M. Tolochyn, “Practical Application of The Aes Encryption Method,” Control, Navigation and Communication Systems, vol. 4, no. 2022, 2022.

T. Hidayat and R. Mahardiko, “A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing,” International Journal of Artificial Intelligence Research, vol. 4, no. 1, Apr. 2020, doi: 10.29099/ijair.v4i1.154.

M. M. S. Altaee and M. Alanezi, “Enhancing cloud computing security by paillier homomorphic encryption,” International Journal of Electrical and Computer Engineering, vol. 11, no. 2, pp. 1771–1779, Apr. 2021, doi: 10.11591/ijece.v11i2.pp1771-1779.

G. Ramtri and C. Patel, “Secure Banking Transactions Using RSA and Two Fish Algorithms,” in International Conference on Emerging Trends in Information Technology and Engineering, ic-ETITE 2020, Institute of Electrical and Electronics Engineers Inc., Feb. 2020. doi: 10.1109/ic-ETITE47903.2020.236.

R. Ganeshan, K. Giri, K. Reddy, A. V. S. Manikanta, and P. V Sai Lasya, “AES Algorithm for Advanced Security In Online Banking,” International Journal Of Scientific & Technology Research, vol. 9, no. Issue 04, APRIL 2020, 2020, [Online]. Available: www.ijstr.org

S. S. Muna, N. Nurdin, and T. Taufiq, “Comparative Analysis of State Universities on Website Performance in Aceh Using the PIECES Method,” Journal Of Informatics And Telecommunication Engineering, vol. 7, no. 1, pp. 71–83, Jul. 2023, doi: 10.31289/jite.v7i1.9167.

M. N. Rashid, L. H. Abed, and W. K. Awad, “Financial information security using hybrid encryption technique on multi-cloud architecture,” Bulletin of Electrical Engineering and Informatics, vol. 11, no. 6, pp. 3450–3461, Dec. 2022, doi: 10.11591/eei.v11i6.3967.

T. Hidayat and R. Mahardiko, “Data Encryption Algorithm Aes By Using Blockchain Technology: A Review,”Jurnal Dokumentasi Dan Informasi, vol. 42, no. 1, p. 19, Nov. 2021, doi: 10.14203/j.baca.v42i1.643.

U. Wahyuningsih et al., “Analisis Proses Enkripsi Algoritma Kriptografi Modern Advanced Encryption Standard (Aes),” Adijaya Jurnal Multidisiplin, vol. 01, no. 2023, pp. 380–387, 2023, [Online]. Available: https://e-journal.naureendigition.com/index.php/mj

I. Iliashenko and V. Zucca, “Faster homomorphic comparison operations for BGV and BFV. Pro-ceedings on Privacy Enhancing Technologies,” no. 3, 2021, doi: 10.2478/popets-2021-0046ï.

I. Putu, A. Eka Pratama, I. Made, and S. Raharja, “Node.js Performance Benchmarking and Analysis at Virtualbox, Docker, and Podman Environment Using Node-Bench Method,” 2023. [Online]. Available: www.joiv.org/index.php/joiv

T. Kim, Y. Oh, and H. Kim, “Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption,” Security and Communication Networks, vol. 2020, 2020, doi: 10.1155/2020/4195852.




DOI: http://dx.doi.org/10.24014/coreit.v10i2.30809

Refbacks

  • There are currently no refbacks.




Creative Commons License  site stats  
Jurnal CoreIT by http://ejournal.uin-suska.ac.id/index.php/coreit/ is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.