Table 4. Comparative security analysis using the proposed method.
Size of data
Time taken for encryption
Time taken for decryption
10
6.11
6.16
30
12.22
12.63
50
15.53
15.66
70
26.00
23.11
90
30.11
23.65