Performance Enhancement of State-of-the-Art Cryptography Algorithms in the Banking Sector
Data security is a complex subject in today's world that affects both data storage and data transmission. In recent months, we've seen a lot of cyber security attacks that have tampered with consumer privacy. These assaults simply smashed all the security algorithms and had an impact on us...
Uloženo v:
| Vydáno v: | 2023 Third International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS) s. 56 - 63 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.09.2023
|
| Témata: | |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Data security is a complex subject in today's world that affects both data storage and data transmission. In recent months, we've seen a lot of cyber security attacks that have tampered with consumer privacy. These assaults simply smashed all the security algorithms and had an impact on user data's identity, confidentiality, authentication, integrity, and availability. One such technique is the use of cryptography to ensure data secrecy, authentication, integrity, availability, and identification. Encryption is the process of converting plaintext, or ordinary data, into something obscure or ciphertext using mathematical formulas or changes. Algorithms are the terms used to describe these mathematical operations or formulas utilized in encryption techniques. The data encryption techniques, including DES, BLOWFISH, RSA, SHA, EIGAMAL, TEA, and others, have been examined. Symmetric key encryption methods include DES and BLOWFISH. There are asymmetric key encryption algorithms such as RSA and SHA. To determine the best data encryption method many encryption algorithms have been analyzed and compared based on various characteristics. |
|---|---|
| AbstractList | Data security is a complex subject in today's world that affects both data storage and data transmission. In recent months, we've seen a lot of cyber security attacks that have tampered with consumer privacy. These assaults simply smashed all the security algorithms and had an impact on user data's identity, confidentiality, authentication, integrity, and availability. One such technique is the use of cryptography to ensure data secrecy, authentication, integrity, availability, and identification. Encryption is the process of converting plaintext, or ordinary data, into something obscure or ciphertext using mathematical formulas or changes. Algorithms are the terms used to describe these mathematical operations or formulas utilized in encryption techniques. The data encryption techniques, including DES, BLOWFISH, RSA, SHA, EIGAMAL, TEA, and others, have been examined. Symmetric key encryption methods include DES and BLOWFISH. There are asymmetric key encryption algorithms such as RSA and SHA. To determine the best data encryption method many encryption algorithms have been analyzed and compared based on various characteristics. |
| Author | Surla, Govindu Lakshmi, R. |
| Author_xml | – sequence: 1 givenname: Govindu surname: Surla fullname: Surla, Govindu email: govindu561@gmail.com organization: Pondicherry University,Department of Computer Science,India – sequence: 2 givenname: R. surname: Lakshmi fullname: Lakshmi, R. email: prof.rlakshmi@gmail.com organization: Pondicherry University,Department of Computer Science,India |
| BookMark | eNotzMFKxDAUQNEIutBx_kAhP9D60iRtsqxl1MKAQp2FqyGmL21xmpRMNv17FV2dzeXekEsfPBJyzyBnDPRD2xzargRZVnkBBc8BgKkLstWVVlwCh1IrfU0-3jC6EGfjLdKdH3-d0ScaHO2SSZgFl6URszom2sR1SWGIZhlXWp-GEKc0zmc6efqT0EfjvyY_0A5tCvGWXDlzOuP23w05PO3em5ds__rcNvU-mxjTKTMl710vwcpSCtTGVRyEE8Ioa3s04lMLywTnClEqbo3kSoFWfeG47U3v-Ibc_X0nRDwucZpNXI8MJEitSv4N_Z1RmA |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICUIS60567.2023.00018 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798350306989 |
| EndPage | 63 |
| ExternalDocumentID | 10505986 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i119t-a63dfd50c5654e9af7304f44a8ccdea4b94c14338ee583ca5388098d2f3cdadf3 |
| IEDL.DBID | RIE |
| IngestDate | Wed May 08 06:10:57 EDT 2024 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i119t-a63dfd50c5654e9af7304f44a8ccdea4b94c14338ee583ca5388098d2f3cdadf3 |
| PageCount | 8 |
| ParticipantIDs | ieee_primary_10505986 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-Sept.-1 |
| PublicationDateYYYYMMDD | 2023-09-01 |
| PublicationDate_xml | – month: 09 year: 2023 text: 2023-Sept.-1 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | 2023 Third International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS) |
| PublicationTitleAbbrev | ICUIS |
| PublicationYear | 2023 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.8431007 |
| Snippet | Data security is a complex subject in today's world that affects both data storage and data transmission. In recent months, we've seen a lot of cyber security... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 56 |
| SubjectTerms | Adleman (RSA) Authentication Banking Cipher text Cryptography Data communication Data Encryption Standard(DES) Decryption EIGAMAL Encryption Memory Plaintext Privacy Rivest Shamir Ubiquitous computing |
| Title | Performance Enhancement of State-of-the-Art Cryptography Algorithms in the Banking Sector |
| URI | https://ieeexplore.ieee.org/document/10505986 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA22ePCkYsVvcvCa2jTZ3eRYlxZ7KYVaqKeSTSZ2QXfLdiv4703S1Xrx4CkhJAQmDPOYzJuH0D3oJAbDE6KtMIRLA0QZAcRmfQ4q8yJIKohNJJOJWCzktCGrBy4MAITiM-j6afjLN6Xe-lSZ83AXr6WIW6iVJPGOrNWwcmhPPozT-Xjm4HmcdL0ouG9N6LU8fqmmhKAxOv7ndSeos6ff4elPYDlFB1CcoZfpvsQfD4uVH_15XFocECMpLXFojgyqGqfV57pumlHjwdtrWeX16n2D8wK7LfhRBcEEPAsp-w6aj4bP6RNpdBFITqmsiYqZsSbqaQfGOEhlnZdyy7kSWhtQPJNcOxjEBEAkmFaRb_gihelbpo0ylp2jdlEWcIEwdwAEgIJiQnFgmewro3lGpWI80pReoo63y3K9a32x_DbJ1R_r1-jIm35XhHWD2nW1hVt0qD_qfFPdhQf7Aja0m34 |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA46BT2pOPG3OXjNXNu0TY5zbGw4x2AbzNNIkxdX0HZ0neB_b5JV58WDp4SQEMjj8T5e3vc-hO5BxhEoGhOpmSKUKyBCMSA68SmIxIogCSc2EQ-HbDbjo4qs7rgwAOCKz6Bhp-4vX-VybVNlxsNNvOYs2kV7IaV-c0PXqng5XpM_9NvT_tgA9ChuWFlw25zQqnn80k1xYaN79M8Lj1F9S8DDo5_QcoJ2IDtFL6NtkT_uZAs72vM419hhRpJrYvAcaRUlbhefy7JqR41bb695kZaL9xVOM2y24EfhJBPw2CXt62ja7UzaPVIpI5DU83hJRBQorcKmNHCMAhfa-CnVlAompQJBE06lAUIBAwhZIEVoW75wpnwdSCWUDs5QLcszOEeYGggC4IEImKAQJNwXStLE4yKgofS8C1S37zJfbppfzL-f5PKP9Tt00Js8D-aD_vDpCh1aM2xKsq5RrSzWcIP25UeZropbZ7wvez-exQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+Third+International+Conference+on+Ubiquitous+Computing+and+Intelligent+Information+Systems+%28ICUIS%29&rft.atitle=Performance+Enhancement+of+State-of-the-Art+Cryptography+Algorithms+in+the+Banking+Sector&rft.au=Surla%2C+Govindu&rft.au=Lakshmi%2C+R.&rft.date=2023-09-01&rft.pub=IEEE&rft.spage=56&rft.epage=63&rft_id=info:doi/10.1109%2FICUIS60567.2023.00018&rft.externalDocID=10505986 |