Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities

Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor vulnerabilities can make protocols an easy target for cyber attackers. Therefore, it is essential to investigate the threats and vulnerabilitie...

Full description

Saved in:
Bibliographic Details
Published in:IEEE Communications surveys and tutorials p. 1
Main Authors: Ahn, Jemin, Hussain, Rasheed, Kang, Kyungtae, Son, Junggab
Format: Journal Article
Language:English
Published: IEEE 2025
Subjects:
ISSN:2373-745X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor vulnerabilities can make protocols an easy target for cyber attackers. Therefore, it is essential to investigate the threats and vulnerabilities stemming from the cryptographic network protocols. Furthermore, it is necessary to comprehensively investigate the weaknesses of network protocols that use cryptographic primitives to inform users and developers about potential attack points. This comprehensive survey examines the relationship between encryption schemes and network protocols and presents an in-depth review of associated threats and vulnerabilities. Given that most cryptographic protocols operate in the Transport and Application layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack, our investigation primarily centers around encryption algorithms used by representative and notable cryptographic network protocols such as Transport Layer Security (TLS) and Secure Shell (SSH). Furthermore, we delve into the attackers' methods to exploit the already identified and existing vulnerabilities, seeking to understand the mechanisms employed to compromise these protocols. Through this survey, we aim to provide the readership with an in-depth understanding of the existing and new vulnerabilities associated with modern cryptographic protocols and provide valuable insights into securing them effectively. We also discuss the existing challenges and future research directions in this domain.
AbstractList Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor vulnerabilities can make protocols an easy target for cyber attackers. Therefore, it is essential to investigate the threats and vulnerabilities stemming from the cryptographic network protocols. Furthermore, it is necessary to comprehensively investigate the weaknesses of network protocols that use cryptographic primitives to inform users and developers about potential attack points. This comprehensive survey examines the relationship between encryption schemes and network protocols and presents an in-depth review of associated threats and vulnerabilities. Given that most cryptographic protocols operate in the Transport and Application layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack, our investigation primarily centers around encryption algorithms used by representative and notable cryptographic network protocols such as Transport Layer Security (TLS) and Secure Shell (SSH). Furthermore, we delve into the attackers' methods to exploit the already identified and existing vulnerabilities, seeking to understand the mechanisms employed to compromise these protocols. Through this survey, we aim to provide the readership with an in-depth understanding of the existing and new vulnerabilities associated with modern cryptographic protocols and provide valuable insights into securing them effectively. We also discuss the existing challenges and future research directions in this domain.
Author Hussain, Rasheed
Son, Junggab
Kang, Kyungtae
Ahn, Jemin
Author_xml – sequence: 1
  givenname: Jemin
  orcidid: 0000-0002-8940-8146
  surname: Ahn
  fullname: Ahn, Jemin
  organization: Department of Computer Science and Engineering, Hanyang University, Seoul, Republic of Korea
– sequence: 2
  givenname: Rasheed
  orcidid: 0000-0002-3771-7537
  surname: Hussain
  fullname: Hussain, Rasheed
  organization: Smart Internet Lab and Bristol Digital Futures Institute, University of Bristol, UK
– sequence: 3
  givenname: Kyungtae
  orcidid: 0000-0002-6587-7044
  surname: Kang
  fullname: Kang, Kyungtae
  organization: Department of Artificial Intelligence, Hanyang University, Ansan, Republic of Korea
– sequence: 4
  givenname: Junggab
  orcidid: 0000-0002-6206-083X
  surname: Son
  fullname: Son, Junggab
  organization: Department of Computer Science, University of Nevada, Las Vegas (UNLV), Las Vegas, USA
BookMark eNotjM1KAzEYAIMoWKsvIB7yAlvzs9nueitL_YFqhVbxVrLJlzaaJkuSVvv2CvU0MDBzgU598IDQNSUjSklz286fF8sRI0yMuGBVRcQJGjA-5sW4FB_n6CKlT0JKVjZkgNz0p3chWr_GU6_ioc82eDxx6z-XN9uEpdf4BfJ3iF_4NYYcVHDpDk9wG7Z9hA34ZPeAF7u4hwMOBi83EWQ-hu875yHKzjqbLaRLdGakS3D1zyF6u58u28diNn94aiezQtGa54JLJjrNtZL1WBlTUqN5aRQV0lRECug4MEKILBshCNMghG6U4LqhleJdZfgQ3Ry_FgBWfbRbGQ8rSmrW1BXhv5fgWs4
CitedBy_id crossref_primary_10_3390_computers14080321
crossref_primary_10_3390_computers14090357
crossref_primary_10_3390_inventions10040056
ContentType Journal Article
DBID 97E
ESBDL
RIA
RIE
DOI 10.1109/COMST.2025.3526605
DatabaseName IEEE Xplore (IEEE)
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2373-745X
EndPage 1
ExternalDocumentID 10829860
Genre orig-research
GrantInformation_xml – fundername: Institute of Information & communications Technology Planning & Evaluation (IITP)
  grantid: RS-2024-00431388
– fundername: Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT)
  grantid: No. RS2023-00261068; No.RS-2022-00155885
GroupedDBID 0R~
29I
2WC
5GY
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACIWK
AENEX
AGQYO
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
AZLTO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
EBS
ESBDL
HZ~
IES
IFIPE
IPLJI
JAVBF
LAI
O9-
OCL
P2P
RIA
RIE
RNS
ID FETCH-LOGICAL-c183t-3a25bd3dca87cff41fd34fc15af60a5eb3e2000a495502de55d9c53d916c3b6f3
IEDL.DBID RIE
IngestDate Wed Aug 27 01:58:04 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c183t-3a25bd3dca87cff41fd34fc15af60a5eb3e2000a495502de55d9c53d916c3b6f3
ORCID 0000-0002-8940-8146
0000-0002-3771-7537
0000-0002-6587-7044
0000-0002-6206-083X
OpenAccessLink https://ieeexplore.ieee.org/document/10829860
PageCount 1
ParticipantIDs ieee_primary_10829860
PublicationCentury 2000
PublicationDate 2025-00-00
PublicationDateYYYYMMDD 2025-01-01
PublicationDate_xml – year: 2025
  text: 2025-00-00
PublicationDecade 2020
PublicationTitle IEEE Communications surveys and tutorials
PublicationTitleAbbrev COMST
PublicationYear 2025
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0042490
Score 2.4974253
Snippet Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Ciphers
Cryptographic Network Protocols
Cryptography
Encryption
Encryption Algorithms
HTTP
HyperText Transport Protocol Secure (HTTPS)
Internet of Things
Protocols
Secure Shell (SSH)
Security
Software algorithms
Surveys
Transport Layer Security (TLS)
Tutorials
Vulnerabilities
Title Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities
URI https://ieeexplore.ieee.org/document/10829860
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LSsNAFB20uNCFz4pvZuE2NZPJZDLuSrG4sRZapbsyTyvURNKk0L93Hq1048JduBACc7kz90zOOReAe4SFjSMeOfOoKDW2pATnFqVwzCRiCos0DJugg0E-mbDhWqzutTBaa08-0x336P_lq1I27qrMVniesDyzCH2X0iyItTbbbmpxRLxRxcTsoff6Mhpb_JeQjrOAz9x8uq35Kf746B_988PH4HDdJ8JuSOwJ2NHFKTjYcg88A_Nf_hx8KmS18sUPu_MPG6tnXwvICwUHgeYNh1VZlzbpi0fYhW4TqPQscNfhqKmWegVLA8cz10KGF9-buTOk9txZi6bb4K3_NO49R-vhCZG0VVpHmCdEKKwkz6k0JkVG4dRIRLjJYk4shtZOpcMtQCJxojQhikmClW0XJRaZweegVZSFvgBQUCaoUsQwilJilJAJ4QQJd9BhktJL0HZLNv0O_hjTzWpd_RG_BvsuL-Ei4wa06qrRt2BPLuvPRXXns_oD6qymMw
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8NAEF2kCurBb_HbPXhNTbK7SdZbKS0V21holN7KflqhJpImhf57d5NWevHgLQyEwA6zO2_z3hsAHjzETdxjjjWPcrA2JcUZMyiFISo8KhHH9bCJMI6j8ZgOV2L1SgujlKrIZ6ppH6t_-TITpb0qMxUe-TQKDELfJhj7bi3XWm-82CAJd62Lcelj-3UwSgwC9EnTmsAHdkLdxgSV6gDpHv7z00fgYNUpwlad2mOwpdITsL_hH3gKZr8MOthJRb6syh-2Zh8mVky_5pClEsY10RsO86zITNrnT7AF7TaQq2nNXoejMl-oJcw0TKa2iaxffC9n1pK6Ys8aPH0G3rqdpN1zVuMTHGHqtHAQ8wmXSAoWhUJr7GmJsBYeYTpwGTEoWlmdDjMQibi-VIRIKgiSpmEUiAcanYNGmqXqAkAeUh5KSTQNPUy05MInjHjcHnWI4PASnNklm3zXDhmT9Wpd_RG_B7u9ZNCf9J_jl2uwZ3NUX2vcgEaRl-oW7IhF8TnP76oM_wC7Mal6
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Exploring+Encryption+Algorithms+and+Network+Protocols%3A+A+Comprehensive+Survey+of+Threats+and+Vulnerabilities&rft.jtitle=IEEE+Communications+surveys+and+tutorials&rft.au=Ahn%2C+Jemin&rft.au=Hussain%2C+Rasheed&rft.au=Kang%2C+Kyungtae&rft.au=Son%2C+Junggab&rft.date=2025&rft.pub=IEEE&rft.eissn=2373-745X&rft.spage=1&rft.epage=1&rft_id=info:doi/10.1109%2FCOMST.2025.3526605&rft.externalDocID=10829860