Critical Analysis of Cryptographic Algorithms
Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via...
Saved in:
| Published in: | 2020 8th International Symposium on Digital Forensics and Security (ISDFS) pp. 1 - 7 |
|---|---|
| Main Authors: | , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.06.2020
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via preventing disclosure of the communication where the data are converted from a readable form into an unreadable form and vice versa. The cryptography algorithm has two types namely: Symmetric key and Asymmetric key. Asymmetric key algorithm mainly invented to overcome the dilemma of key distribution in symmetric key. There are several algorithms classified under these two types based on different parameters. Hence, this variation leads to different levels of performance and efficiency of these algorithms. This paper presents a critical analysis of these systems based on a detailed study and literature review of some cryptography algorithms. |
|---|---|
| AbstractList | Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via preventing disclosure of the communication where the data are converted from a readable form into an unreadable form and vice versa. The cryptography algorithm has two types namely: Symmetric key and Asymmetric key. Asymmetric key algorithm mainly invented to overcome the dilemma of key distribution in symmetric key. There are several algorithms classified under these two types based on different parameters. Hence, this variation leads to different levels of performance and efficiency of these algorithms. This paper presents a critical analysis of these systems based on a detailed study and literature review of some cryptography algorithms. |
| Author | AlRoubiei, Mazoon Kumar, Basant AlYarubi, Thuraiya |
| Author_xml | – sequence: 1 givenname: Mazoon surname: AlRoubiei fullname: AlRoubiei, Mazoon organization: Modern College of Business and Science,Department of Comp Sc,Muscat,Sultanate of Oman – sequence: 2 givenname: Thuraiya surname: AlYarubi fullname: AlYarubi, Thuraiya organization: Modern College of Business and Science,Department of Comp Sc,Muscat,Sultanate of Oman – sequence: 3 givenname: Basant surname: Kumar fullname: Kumar, Basant organization: Modern College of Business and Science,Department of Comp Sc,Muscat,Sultanate of Oman |
| BookMark | eNotj8tOwzAQAI0EB1r4Ag7kBxK83tb2HqNAaaVKHArnyo9taylNIieX_D1I9DSX0UizEPdd37EQryArAElvu8P75rAilLJSUsmKALQCvBMLMMqCJiR6FGWT05SCa4u6c-08prHoT0WT52Hqz9kNlxSKuj33f9blOj6Jh5NrR36-cSl-Nh_fzbbcf33umnpfJgA7lWiANVgPJoLy6Hw0HK3XRnN0yDqQJhORSRljVxiCX68jyKgdK-8041K8_HcTMx-HnK4uz8fbAf4CyKhA-g |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ISDFS49300.2020.9116213 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 1728169399 9781728169392 |
| EndPage | 7 |
| ExternalDocumentID | 9116213 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i118t-371e618b17d12b3abd7ed8b676eda3e6c9697d3e9277843ccb55d10d6ae2ba6e3 |
| IEDL.DBID | RIE |
| IngestDate | Thu Jun 29 18:37:51 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i118t-371e618b17d12b3abd7ed8b676eda3e6c9697d3e9277843ccb55d10d6ae2ba6e3 |
| PageCount | 7 |
| ParticipantIDs | ieee_primary_9116213 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-June |
| PublicationDateYYYYMMDD | 2020-06-01 |
| PublicationDate_xml | – month: 06 year: 2020 text: 2020-June |
| PublicationDecade | 2020 |
| PublicationTitle | 2020 8th International Symposium on Digital Forensics and Security (ISDFS) |
| PublicationTitleAbbrev | ISDFS |
| PublicationYear | 2020 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.7311242 |
| Snippet | Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Asymmetric key Algorithm Bibliographies Classification algorithms Cryptography Data communication Data privacy Digital forensics Eavesdropping Symmetric Key Algorithm |
| Title | Critical Analysis of Cryptographic Algorithms |
| URI | https://ieeexplore.ieee.org/document/9116213 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA61ePCk0opv9uDRtMlunkepFgUphar0VpLMVAvaLe1W8N-7r1YEL95CGAgz4WMmmcdHyBVzSQCmHdVSTqmw3lDDpaHBTz0EZ4GX2fOXRz0YmPHYDhvketsLg4hl8Rl2imWZy4c0rIuvsm4OTBUXFLU7WquqV6su2eLMdh9Gt_2RsAlj-bMvZp1a-hdtSuk1-vv_O--AtH_a76Lh1rEckgbOW4RuSAmizRyRKJ1GveXXIqumTs9CdPP-muZSbx-rNnnu3z317mnNdUBneYif5TjnqLjxXAOPfeI8aATjlVYILkEVrLIaErSx1kYkIXgpgTNQDmPvFCZHpDlP53hMImWMlLmtMUerkNIUESADYQFBCSfghLQKVSeLapzFpNby9O_tM7JXWLOqjjonzWy5xguyGz6z2Wp5Wd7BN11eiZk |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS0JBFB7EglpVaPTuLlo2OnPvPJdhiZKJoIU7mcexhPKKXoP-ffelEbRpNwwHhnOGj3NmzuND6IaYyHkiDZacTzHTVmFFucLOTq13RnuaZ89ferLfV-OxHlTQ7bYXBgDy4jNoZMs8l-9jt86-ypopMEWYUdTucMZCUnRrlUVblOhmd3jfHjIdEZI-_ELSKOV_EafkfqN98L8TD1H9pwEvGGxdyxGqwLyG8IaWINhMEgniadBafi2SYu70zAV3769xKvX2saqj5_bDqNXBJdsBnqVBfpIinYKgylLpaWgjY70Er6yQAryJQDgttPQR6FBKxSLnLOeeEi8MhNYIiI5RdR7P4QQFQinOU2tDilfGucpiQOKZ9uAFM8yfolqm6mRRDLSYlFqe_b19jfY6o6fepNftP56j_cyyRa3UBaomyzVcol33mcxWy6v8Pr4BuQGM4A |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+8th+International+Symposium+on+Digital+Forensics+and+Security+%28ISDFS%29&rft.atitle=Critical+Analysis+of+Cryptographic+Algorithms&rft.au=AlRoubiei%2C+Mazoon&rft.au=AlYarubi%2C+Thuraiya&rft.au=Kumar%2C+Basant&rft.date=2020-06-01&rft.pub=IEEE&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FISDFS49300.2020.9116213&rft.externalDocID=9116213 |