Table 4. Comparative security analysis using the proposed method.

Size of data Time taken for encryption Time taken for decryption
10 6.11 6.16
30 12.22 12.63
50 15.53 15.66
70 26.00 23.11
90 30.11 23.65