Performance Enhancement of State-of-the-Art Cryptography Algorithms in the Banking Sector

Data security is a complex subject in today's world that affects both data storage and data transmission. In recent months, we've seen a lot of cyber security attacks that have tampered with consumer privacy. These assaults simply smashed all the security algorithms and had an impact on us...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2023 Third International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS) s. 56 - 63
Hlavní autoři: Surla, Govindu, Lakshmi, R.
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.09.2023
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Data security is a complex subject in today's world that affects both data storage and data transmission. In recent months, we've seen a lot of cyber security attacks that have tampered with consumer privacy. These assaults simply smashed all the security algorithms and had an impact on user data's identity, confidentiality, authentication, integrity, and availability. One such technique is the use of cryptography to ensure data secrecy, authentication, integrity, availability, and identification. Encryption is the process of converting plaintext, or ordinary data, into something obscure or ciphertext using mathematical formulas or changes. Algorithms are the terms used to describe these mathematical operations or formulas utilized in encryption techniques. The data encryption techniques, including DES, BLOWFISH, RSA, SHA, EIGAMAL, TEA, and others, have been examined. Symmetric key encryption methods include DES and BLOWFISH. There are asymmetric key encryption algorithms such as RSA and SHA. To determine the best data encryption method many encryption algorithms have been analyzed and compared based on various characteristics.
DOI:10.1109/ICUIS60567.2023.00018