Critical Analysis of Cryptographic Algorithms
Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via...
Gespeichert in:
| Veröffentlicht in: | 2020 8th International Symposium on Digital Forensics and Security (ISDFS) S. 1 - 7 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
IEEE
01.06.2020
|
| Schlagworte: | |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via preventing disclosure of the communication where the data are converted from a readable form into an unreadable form and vice versa. The cryptography algorithm has two types namely: Symmetric key and Asymmetric key. Asymmetric key algorithm mainly invented to overcome the dilemma of key distribution in symmetric key. There are several algorithms classified under these two types based on different parameters. Hence, this variation leads to different levels of performance and efficiency of these algorithms. This paper presents a critical analysis of these systems based on a detailed study and literature review of some cryptography algorithms. |
|---|---|
| AbstractList | Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via preventing disclosure of the communication where the data are converted from a readable form into an unreadable form and vice versa. The cryptography algorithm has two types namely: Symmetric key and Asymmetric key. Asymmetric key algorithm mainly invented to overcome the dilemma of key distribution in symmetric key. There are several algorithms classified under these two types based on different parameters. Hence, this variation leads to different levels of performance and efficiency of these algorithms. This paper presents a critical analysis of these systems based on a detailed study and literature review of some cryptography algorithms. |
| Author | AlRoubiei, Mazoon Kumar, Basant AlYarubi, Thuraiya |
| Author_xml | – sequence: 1 givenname: Mazoon surname: AlRoubiei fullname: AlRoubiei, Mazoon organization: Modern College of Business and Science,Department of Comp Sc,Muscat,Sultanate of Oman – sequence: 2 givenname: Thuraiya surname: AlYarubi fullname: AlYarubi, Thuraiya organization: Modern College of Business and Science,Department of Comp Sc,Muscat,Sultanate of Oman – sequence: 3 givenname: Basant surname: Kumar fullname: Kumar, Basant organization: Modern College of Business and Science,Department of Comp Sc,Muscat,Sultanate of Oman |
| BookMark | eNotj8tOwzAQAI0EB1r4Ag7kBxK83tb2HqNAaaVKHArnyo9taylNIieX_D1I9DSX0UizEPdd37EQryArAElvu8P75rAilLJSUsmKALQCvBMLMMqCJiR6FGWT05SCa4u6c-08prHoT0WT52Hqz9kNlxSKuj33f9blOj6Jh5NrR36-cSl-Nh_fzbbcf33umnpfJgA7lWiANVgPJoLy6Hw0HK3XRnN0yDqQJhORSRljVxiCX68jyKgdK-8041K8_HcTMx-HnK4uz8fbAf4CyKhA-g |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ISDFS49300.2020.9116213 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 1728169399 9781728169392 |
| EndPage | 7 |
| ExternalDocumentID | 9116213 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i118t-371e618b17d12b3abd7ed8b676eda3e6c9697d3e9277843ccb55d10d6ae2ba6e3 |
| IEDL.DBID | RIE |
| IngestDate | Thu Jun 29 18:37:51 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i118t-371e618b17d12b3abd7ed8b676eda3e6c9697d3e9277843ccb55d10d6ae2ba6e3 |
| PageCount | 7 |
| ParticipantIDs | ieee_primary_9116213 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-June |
| PublicationDateYYYYMMDD | 2020-06-01 |
| PublicationDate_xml | – month: 06 year: 2020 text: 2020-June |
| PublicationDecade | 2020 |
| PublicationTitle | 2020 8th International Symposium on Digital Forensics and Security (ISDFS) |
| PublicationTitleAbbrev | ISDFS |
| PublicationYear | 2020 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.7311242 |
| Snippet | Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Asymmetric key Algorithm Bibliographies Classification algorithms Cryptography Data communication Data privacy Digital forensics Eavesdropping Symmetric Key Algorithm |
| Title | Critical Analysis of Cryptographic Algorithms |
| URI | https://ieeexplore.ieee.org/document/9116213 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA61ePCk0opv9uDRtHnsJpujVIteSqEKvZUkM9GCdku7Ffz37qsVwYu3EAbCZBgmj--bj5CbgA6k0IIyqxWNRQBqfZrQkDBpmYMi5qwSm9CjUTqdmnGL3O64MIhYgc-wVw6rv3zI_KZ8KusXialEKVG7p7WquVoNZIsz03-a3A8nsZGMFdc-wXqN9S_ZlKpqDA__t94R6f7Q76LxrrAckxYuOoRuRQmibR-RKAvRYPW1zOuu03Mf3b2_ZoXV28e6S16GD8-DR9poHdB5ccTPizznqHjquAYunLQONELqlFYIVqLyRhkNEo3QOo2l9y5JgDNQFoWzCuUJaS-yBZ6SKEDQUtsElLex8cHKwAGEknHqmXFwRjqlq7Nl3c5i1nh5_vf0BTkod7NGR12Sdr7a4BXZ95_5fL26rmLwDVJAil4 |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA6lCnpSacW3e_DottlkN9kcpVos1lJohd5KkploQbul3Qr-e_fViuDFWwgDYTIMk8f3zUfIjUMDnEnmUy2FHzIHvrZx5LuIck0NZDGnhdiEHAziyUQNa-R2y4VBxAJ8hq18WPzlQ2LX-VNZO0tMwXKJ2p0oDBkt2VoVaCugqt0b3XdHoeKUZhc_RluV_S_hlKJudA_-t-Ihaf4Q8LzhtrQckRrOG8TfyBJ4m04iXuK8zvJrkZZ9p2fWu3t_TTKrt49Vk7x0H8adR79SO_Bn2SE_zTI9QBHEJpAQMMO1AYkQGyEFguYorBJKAkfFpIxDbq2JIggoCI3MaIH8mNTnyRxPiOfASS51BMLqUFmnuQsAmOBhbKkycEoauavTRdnQYlp5efb39DXZexw_96f93uDpnOznO1tipS5IPV2u8ZLs2s90tlpeFfH4BraTjaU |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+8th+International+Symposium+on+Digital+Forensics+and+Security+%28ISDFS%29&rft.atitle=Critical+Analysis+of+Cryptographic+Algorithms&rft.au=AlRoubiei%2C+Mazoon&rft.au=AlYarubi%2C+Thuraiya&rft.au=Kumar%2C+Basant&rft.date=2020-06-01&rft.pub=IEEE&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FISDFS49300.2020.9116213&rft.externalDocID=9116213 |