Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities
Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor vulnerabilities can make protocols an easy target for cyber attackers. Therefore, it is essential to investigate the threats and vulnerabilitie...
Saved in:
| Published in: | IEEE Communications surveys and tutorials p. 1 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
IEEE
2025
|
| Subjects: | |
| ISSN: | 2373-745X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor vulnerabilities can make protocols an easy target for cyber attackers. Therefore, it is essential to investigate the threats and vulnerabilities stemming from the cryptographic network protocols. Furthermore, it is necessary to comprehensively investigate the weaknesses of network protocols that use cryptographic primitives to inform users and developers about potential attack points. This comprehensive survey examines the relationship between encryption schemes and network protocols and presents an in-depth review of associated threats and vulnerabilities. Given that most cryptographic protocols operate in the Transport and Application layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack, our investigation primarily centers around encryption algorithms used by representative and notable cryptographic network protocols such as Transport Layer Security (TLS) and Secure Shell (SSH). Furthermore, we delve into the attackers' methods to exploit the already identified and existing vulnerabilities, seeking to understand the mechanisms employed to compromise these protocols. Through this survey, we aim to provide the readership with an in-depth understanding of the existing and new vulnerabilities associated with modern cryptographic protocols and provide valuable insights into securing them effectively. We also discuss the existing challenges and future research directions in this domain. |
|---|---|
| AbstractList | Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor vulnerabilities can make protocols an easy target for cyber attackers. Therefore, it is essential to investigate the threats and vulnerabilities stemming from the cryptographic network protocols. Furthermore, it is necessary to comprehensively investigate the weaknesses of network protocols that use cryptographic primitives to inform users and developers about potential attack points. This comprehensive survey examines the relationship between encryption schemes and network protocols and presents an in-depth review of associated threats and vulnerabilities. Given that most cryptographic protocols operate in the Transport and Application layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack, our investigation primarily centers around encryption algorithms used by representative and notable cryptographic network protocols such as Transport Layer Security (TLS) and Secure Shell (SSH). Furthermore, we delve into the attackers' methods to exploit the already identified and existing vulnerabilities, seeking to understand the mechanisms employed to compromise these protocols. Through this survey, we aim to provide the readership with an in-depth understanding of the existing and new vulnerabilities associated with modern cryptographic protocols and provide valuable insights into securing them effectively. We also discuss the existing challenges and future research directions in this domain. |
| Author | Hussain, Rasheed Son, Junggab Kang, Kyungtae Ahn, Jemin |
| Author_xml | – sequence: 1 givenname: Jemin orcidid: 0000-0002-8940-8146 surname: Ahn fullname: Ahn, Jemin organization: Department of Computer Science and Engineering, Hanyang University, Seoul, Republic of Korea – sequence: 2 givenname: Rasheed orcidid: 0000-0002-3771-7537 surname: Hussain fullname: Hussain, Rasheed organization: Smart Internet Lab and Bristol Digital Futures Institute, University of Bristol, UK – sequence: 3 givenname: Kyungtae orcidid: 0000-0002-6587-7044 surname: Kang fullname: Kang, Kyungtae organization: Department of Artificial Intelligence, Hanyang University, Ansan, Republic of Korea – sequence: 4 givenname: Junggab orcidid: 0000-0002-6206-083X surname: Son fullname: Son, Junggab organization: Department of Computer Science, University of Nevada, Las Vegas (UNLV), Las Vegas, USA |
| BookMark | eNotjM1KAzEYAIMoWKsvIB7yAlvzs9nueitL_YFqhVbxVrLJlzaaJkuSVvv2CvU0MDBzgU598IDQNSUjSklz286fF8sRI0yMuGBVRcQJGjA-5sW4FB_n6CKlT0JKVjZkgNz0p3chWr_GU6_ioc82eDxx6z-XN9uEpdf4BfJ3iF_4NYYcVHDpDk9wG7Z9hA34ZPeAF7u4hwMOBi83EWQ-hu875yHKzjqbLaRLdGakS3D1zyF6u58u28diNn94aiezQtGa54JLJjrNtZL1WBlTUqN5aRQV0lRECug4MEKILBshCNMghG6U4LqhleJdZfgQ3Ry_FgBWfbRbGQ8rSmrW1BXhv5fgWs4 |
| CitedBy_id | crossref_primary_10_3390_computers14080321 crossref_primary_10_3390_computers14090357 crossref_primary_10_3390_inventions10040056 |
| ContentType | Journal Article |
| DBID | 97E ESBDL RIA RIE |
| DOI | 10.1109/COMST.2025.3526605 |
| DatabaseName | IEEE Xplore (IEEE) IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2373-745X |
| EndPage | 1 |
| ExternalDocumentID | 10829860 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Institute of Information & communications Technology Planning & Evaluation (IITP) grantid: RS-2024-00431388 – fundername: Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) grantid: No. RS2023-00261068; No.RS-2022-00155885 |
| GroupedDBID | 0R~ 29I 2WC 5GY 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACIWK AENEX AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 EBS ESBDL HZ~ IES IFIPE IPLJI JAVBF LAI O9- OCL P2P RIA RIE RNS |
| ID | FETCH-LOGICAL-c183t-3a25bd3dca87cff41fd34fc15af60a5eb3e2000a495502de55d9c53d916c3b6f3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 01:58:04 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c183t-3a25bd3dca87cff41fd34fc15af60a5eb3e2000a495502de55d9c53d916c3b6f3 |
| ORCID | 0000-0002-8940-8146 0000-0002-3771-7537 0000-0002-6587-7044 0000-0002-6206-083X |
| OpenAccessLink | https://ieeexplore.ieee.org/document/10829860 |
| PageCount | 1 |
| ParticipantIDs | ieee_primary_10829860 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-00-00 |
| PublicationDateYYYYMMDD | 2025-01-01 |
| PublicationDate_xml | – year: 2025 text: 2025-00-00 |
| PublicationDecade | 2020 |
| PublicationTitle | IEEE Communications surveys and tutorials |
| PublicationTitleAbbrev | COMST |
| PublicationYear | 2025 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0042490 |
| Score | 2.4974253 |
| Snippet | Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Ciphers Cryptographic Network Protocols Cryptography Encryption Encryption Algorithms HTTP HyperText Transport Protocol Secure (HTTPS) Internet of Things Protocols Secure Shell (SSH) Security Software algorithms Surveys Transport Layer Security (TLS) Tutorials Vulnerabilities |
| Title | Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities |
| URI | https://ieeexplore.ieee.org/document/10829860 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LSsNAFB20uNCFz4pvZuE2NZPJZDLuSrG4sRZapbsyTyvURNKk0L93Hq1048JduBACc7kz90zOOReAe4SFjSMeOfOoKDW2pATnFqVwzCRiCos0DJugg0E-mbDhWqzutTBaa08-0x336P_lq1I27qrMVniesDyzCH2X0iyItTbbbmpxRLxRxcTsoff6Mhpb_JeQjrOAz9x8uq35Kf746B_988PH4HDdJ8JuSOwJ2NHFKTjYcg88A_Nf_hx8KmS18sUPu_MPG6tnXwvICwUHgeYNh1VZlzbpi0fYhW4TqPQscNfhqKmWegVLA8cz10KGF9-buTOk9txZi6bb4K3_NO49R-vhCZG0VVpHmCdEKKwkz6k0JkVG4dRIRLjJYk4shtZOpcMtQCJxojQhikmClW0XJRaZweegVZSFvgBQUCaoUsQwilJilJAJ4QQJd9BhktJL0HZLNv0O_hjTzWpd_RG_BvsuL-Ei4wa06qrRt2BPLuvPRXXns_oD6qymMw |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8NAEF2kCurBb_HbPXhNTbK7SdZbKS0V21holN7KflqhJpImhf57d5NWevHgLQyEwA6zO2_z3hsAHjzETdxjjjWPcrA2JcUZMyiFISo8KhHH9bCJMI6j8ZgOV2L1SgujlKrIZ6ppH6t_-TITpb0qMxUe-TQKDELfJhj7bi3XWm-82CAJd62Lcelj-3UwSgwC9EnTmsAHdkLdxgSV6gDpHv7z00fgYNUpwlad2mOwpdITsL_hH3gKZr8MOthJRb6syh-2Zh8mVky_5pClEsY10RsO86zITNrnT7AF7TaQq2nNXoejMl-oJcw0TKa2iaxffC9n1pK6Ys8aPH0G3rqdpN1zVuMTHGHqtHAQ8wmXSAoWhUJr7GmJsBYeYTpwGTEoWlmdDjMQibi-VIRIKgiSpmEUiAcanYNGmqXqAkAeUh5KSTQNPUy05MInjHjcHnWI4PASnNklm3zXDhmT9Wpd_RG_B7u9ZNCf9J_jl2uwZ3NUX2vcgEaRl-oW7IhF8TnP76oM_wC7Mal6 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Exploring+Encryption+Algorithms+and+Network+Protocols%3A+A+Comprehensive+Survey+of+Threats+and+Vulnerabilities&rft.jtitle=IEEE+Communications+surveys+and+tutorials&rft.au=Ahn%2C+Jemin&rft.au=Hussain%2C+Rasheed&rft.au=Kang%2C+Kyungtae&rft.au=Son%2C+Junggab&rft.date=2025&rft.pub=IEEE&rft.eissn=2373-745X&rft.spage=1&rft.epage=1&rft_id=info:doi/10.1109%2FCOMST.2025.3526605&rft.externalDocID=10829860 |