Critical Analysis of Cryptographic Algorithms

Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via...

Full description

Saved in:
Bibliographic Details
Published in:2020 8th International Symposium on Digital Forensics and Security (ISDFS) pp. 1 - 7
Main Authors: AlRoubiei, Mazoon, AlYarubi, Thuraiya, Kumar, Basant
Format: Conference Proceeding
Language:English
Published: IEEE 01.06.2020
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via preventing disclosure of the communication where the data are converted from a readable form into an unreadable form and vice versa. The cryptography algorithm has two types namely: Symmetric key and Asymmetric key. Asymmetric key algorithm mainly invented to overcome the dilemma of key distribution in symmetric key. There are several algorithms classified under these two types based on different parameters. Hence, this variation leads to different levels of performance and efficiency of these algorithms. This paper presents a critical analysis of these systems based on a detailed study and literature review of some cryptography algorithms.
AbstractList Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via preventing disclosure of the communication where the data are converted from a readable form into an unreadable form and vice versa. The cryptography algorithm has two types namely: Symmetric key and Asymmetric key. Asymmetric key algorithm mainly invented to overcome the dilemma of key distribution in symmetric key. There are several algorithms classified under these two types based on different parameters. Hence, this variation leads to different levels of performance and efficiency of these algorithms. This paper presents a critical analysis of these systems based on a detailed study and literature review of some cryptography algorithms.
Author AlRoubiei, Mazoon
Kumar, Basant
AlYarubi, Thuraiya
Author_xml – sequence: 1
  givenname: Mazoon
  surname: AlRoubiei
  fullname: AlRoubiei, Mazoon
  organization: Modern College of Business and Science,Department of Comp Sc,Muscat,Sultanate of Oman
– sequence: 2
  givenname: Thuraiya
  surname: AlYarubi
  fullname: AlYarubi, Thuraiya
  organization: Modern College of Business and Science,Department of Comp Sc,Muscat,Sultanate of Oman
– sequence: 3
  givenname: Basant
  surname: Kumar
  fullname: Kumar, Basant
  organization: Modern College of Business and Science,Department of Comp Sc,Muscat,Sultanate of Oman
BookMark eNotj8tOwzAQAI0EB1r4Ag7kBxK83tb2HqNAaaVKHArnyo9taylNIieX_D1I9DSX0UizEPdd37EQryArAElvu8P75rAilLJSUsmKALQCvBMLMMqCJiR6FGWT05SCa4u6c-08prHoT0WT52Hqz9kNlxSKuj33f9blOj6Jh5NrR36-cSl-Nh_fzbbcf33umnpfJgA7lWiANVgPJoLy6Hw0HK3XRnN0yDqQJhORSRljVxiCX68jyKgdK-8041K8_HcTMx-HnK4uz8fbAf4CyKhA-g
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ISDFS49300.2020.9116213
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1728169399
9781728169392
EndPage 7
ExternalDocumentID 9116213
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i118t-371e618b17d12b3abd7ed8b676eda3e6c9697d3e9277843ccb55d10d6ae2ba6e3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:51 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i118t-371e618b17d12b3abd7ed8b676eda3e6c9697d3e9277843ccb55d10d6ae2ba6e3
PageCount 7
ParticipantIDs ieee_primary_9116213
PublicationCentury 2000
PublicationDate 2020-June
PublicationDateYYYYMMDD 2020-06-01
PublicationDate_xml – month: 06
  year: 2020
  text: 2020-June
PublicationDecade 2020
PublicationTitle 2020 8th International Symposium on Digital Forensics and Security (ISDFS)
PublicationTitleAbbrev ISDFS
PublicationYear 2020
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7311242
Snippet Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Asymmetric key Algorithm
Bibliographies
Classification algorithms
Cryptography
Data communication
Data privacy
Digital forensics
Eavesdropping
Symmetric Key Algorithm
Title Critical Analysis of Cryptographic Algorithms
URI https://ieeexplore.ieee.org/document/9116213
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA61ePCk0opv9uDRtMlunkepFgUphar0VpLMVAvaLe1W8N-7r1YEL95CGAgz4WMmmcdHyBVzSQCmHdVSTqmw3lDDpaHBTz0EZ4GX2fOXRz0YmPHYDhvketsLg4hl8Rl2imWZy4c0rIuvsm4OTBUXFLU7WquqV6su2eLMdh9Gt_2RsAlj-bMvZp1a-hdtSuk1-vv_O--AtH_a76Lh1rEckgbOW4RuSAmizRyRKJ1GveXXIqumTs9CdPP-muZSbx-rNnnu3z317mnNdUBneYif5TjnqLjxXAOPfeI8aATjlVYILkEVrLIaErSx1kYkIXgpgTNQDmPvFCZHpDlP53hMImWMlLmtMUerkNIUESADYQFBCSfghLQKVSeLapzFpNby9O_tM7JXWLOqjjonzWy5xguyGz6z2Wp5Wd7BN11eiZk
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS0JBFB7EglpVaPTuLlo2OnPvPJdhiZKJoIU7mcexhPKKXoP-ffelEbRpNwwHhnOGj3NmzuND6IaYyHkiDZacTzHTVmFFucLOTq13RnuaZ89ferLfV-OxHlTQ7bYXBgDy4jNoZMs8l-9jt86-ypopMEWYUdTucMZCUnRrlUVblOhmd3jfHjIdEZI-_ELSKOV_EafkfqN98L8TD1H9pwEvGGxdyxGqwLyG8IaWINhMEgniadBafi2SYu70zAV3769xKvX2saqj5_bDqNXBJdsBnqVBfpIinYKgylLpaWgjY70Er6yQAryJQDgttPQR6FBKxSLnLOeeEi8MhNYIiI5RdR7P4QQFQinOU2tDilfGucpiQOKZ9uAFM8yfolqm6mRRDLSYlFqe_b19jfY6o6fepNftP56j_cyyRa3UBaomyzVcol33mcxWy6v8Pr4BuQGM4A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+8th+International+Symposium+on+Digital+Forensics+and+Security+%28ISDFS%29&rft.atitle=Critical+Analysis+of+Cryptographic+Algorithms&rft.au=AlRoubiei%2C+Mazoon&rft.au=AlYarubi%2C+Thuraiya&rft.au=Kumar%2C+Basant&rft.date=2020-06-01&rft.pub=IEEE&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FISDFS49300.2020.9116213&rft.externalDocID=9116213