Research Article
[Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites
Table 7
A comparison analysis between the proposed method and the previous works.
| Papers | Randomness | Speed | CPU utilization | Application | Complexity | Throughput | Avalanche effect |
| [35] | Not specified | Increased | Not specified | Internet banking, account passwords, email account password | (((28)4)16)16 | Not specified | Not specified | [36] | Not specified | Increased | Not specified | Not specified | (((28)4)16)18 | Not specified | Not specified | [37] | Not specified | Decreased | Not specified | Not specified | ((28)16)10 | Not specified | Not specified | [38] | Decreased | Decreased | Enhanced | Text and images | ((28)16)10 | Decreased | Reduced | [39] | Decreased | Decreased | Enhanced | Text and images | (((28)16)4)10 | Decreased | Increased | [40] | Not specified | Increased | Enhanced | Text and images | (((28)16)4)10 | Decreased | Not specified | [41] | Not specified | Decreased | Not specified | Text, image, and video | (((28)16)4)5 | Not specified | Not specified | [42] | Not specified | Decreased | Not specified | Text | ((28)16)14 | Increased | Not specified | The proposed method | Increased | Decreased | Enhanced | Encrypting purchase order in e-commerce systems | (((28)4)16)6 + ((28)16)L + (28)n)L | Increased | Increased |
|
|