Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


March Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the March 2023 Edition of the journal. The last date of research paper submission is February 15, 2023.

Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel

Kazeem B. Adedeji, John O. Famoriji Published in Communications

International Journal of Applied Information Systems
Year of Publication: 2014
© 2013 by IJAIS Journal
Download full text
  1. Kazeem B Adedeji and John O Famoriji. Article: Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel. International Journal of Applied Information Systems 7(8):6-10, September 2014. BibTeX

    	author = "Kazeem B. Adedeji and John O. Famoriji",
    	title = "Article: Investigating the Effects of varying the Key Size on the Performance of AES Algorithm for Encryption of Data over a Communication Channel",
    	journal = "International Journal of Applied Information Systems",
    	year = 2014,
    	volume = 7,
    	number = 8,
    	pages = "6-10",
    	month = "September",
    	note = "Published by Foundation of Computer Science, New York, USA"


Key size of an algorithm is an important aspect of cryptographic technique as high key bits is considered more secure than low key bits. Different research work has been conducted to have secure and reliable protection techniques for transmitting data over a communication networks. This paper shows the effects of varying the key size on Advanced Encryption Standard (AES) algorithm for encryption of data. AES algorithm with key sizes of 128 bits, 192 bits and 256 bits were considered. The performance of the system were examined based on the encryption and decryption time, throughput, average data rate and the central processing units (CPU) power consumption. Consequently, AES with key size of 128 bits has a lower encryption time, higher throughput and low CPU power consumption than AES with 192 bits and 256 bits keys.


  1. A. R. Choudhar and A. Sekelsky," Securing IPv6 network infrastructure: A new security model", IEEE International conference on Technologies for Homeland Security, 2013.
  2. A. Naser, H. Fatemeh, and K. Riza, "Developing a new hybrid cipher using AES, RC4 and SERPENT for encryption and Decryption", International Journal of Computer Applications Vol. 69, No. 8, 2013.
  3. S. William, 2005 "Cryptography and Network Security", 4th Edition, Prentice-Hall Inc. , pp. 58-309.
  4. V. S. Janakiraman, R. Ganesan, and M. Gobi M, "Hybrid Cryptographic Algorithm for Robust Network Security", ICGST-CNIR, Vol. 7, 2007.
  5. A. Himani and S. Marisha, "Implementation and analysis of various Symmetric Cryptosystems", Indian Journal of Science and Technology, Vol. 13, 2012, pp. 1173-1176.
  6. Parliamentary Office of Science & Technology Post note, 2006 "Data Encryption", No. 270, p 2
  7. K. M. Anand, and S. Karthikeyan, "Investigating the efficiency of Blowfish and Rejindael (AES) Algorithms", International Journal of Computer netweorks and Information Security, Vol. 2, 2012, pp. 22-28.
  8. G. A. Marin, Network Security basics, IEEE Security and Privacy, 1(3), 2005, p 68. .
  9. M. Edney, "Real 802. 11 Security: Wi-Fi Protected Access and 802. 11i", Addison Wesley Inc. , New York, 2003, p. 7
  10. Prasithsangaree, P. and Krishnamurthy, P. (2003) "Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs", IEEE GLOBECOM, pp. 1445-1449.
  11. Lenstra A. K. and Verheul E. R, " Selecting Cryptographic Key sizes", Journal of Cryptography, vol. 14 No. 4, pp. 255-293, 2001.
  12. M. Serge, and E. T. Stafford, "Cryptanalysis of Rc4 like Ciphers". In Proceedings, Workshop in Selected Areas of Cryptography, SAC '98. 1998.
  13. R. P. Jignesh, S. B. Rajesh, and K. Vikas, "Hybrid Security Algorithm for Data Transmission using AES-DES", International Journal of Applied Information Systems, Vol. 2, 2012, USA, pp. 15-19.
  14. Eric C. (2007), "Advanced Encryption Standard", Backshore Communications, United States.
  15. K. Aman, J. Sudesh, and M. Sunil, "Comparative Analysis between DES and RSA Algorithm", International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, 2012, pp. 386-389.


AES, Average data rate, CPU power consumption, Cryptography, Encryption, Key, Throughput.