%0 Journal Article %T Comparative Study of the Reliability and Complexity of Symmetrical and Asymmetrical Cryptosystems for the Protection of Academic Data in the Democratic Republic of Congo %A Mugaruka Buduge Gulain %A Jeremie Ndikumagenge %A Buhendwa Nyenyezi Justin %A Bulonza Masumbuko Alexis %A Katho Seba Jacques %J Journal of Information Security %P 299-307 %@ 2153-1242 %D 2024 %I Scientific Research Publishing %R 10.4236/jis.2024.153017 %X In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any modern company. A company’s operational and historical data contains strategic and operational knowledge of ever-increasing added value. The emergence of a new paradigm: big data. Today, the value of the data scattered throughout this mother of knowledge is calculated in billions of dollars, depending on its size, scope and area of intervention. With the rise of computer networks and distributed systems, the threats to these sensitive resources have steadily increased, jeopardizing the existence of the company itself by drying up production and losing the interest of customers and suppliers. These threats range from sabotage to bankruptcy. For several decades now, most companies have been using encryption algorithms to protect and secure their information systems against the threats and dangers posed by the inherent vulnerabilities of their infrastructure and the current economic climate. This vulnerability requires companies to make the right choice of algorithms to implement in their management systems. For this reason, the present work aims to carry out a comparative study of the reliability and effectiveness of symmetrical and asymmetrical cryptosystems, in order to identify one or more suitable for securing academic data in the DRC. The analysis of the robustness of commonly used symmetric and asymmetric cryptosystems will be the subject of simulations in this article. %K Comparative Study %K Cryptosystems %K Symmetric Encryption %K Asymmetric Encryption %U http://www.scirp.org/journal/PaperInformation.aspx?PaperID=133165