Performance Enhancement of State-of-the-Art Cryptography Algorithms in the Banking Sector

Data security is a complex subject in today's world that affects both data storage and data transmission. In recent months, we've seen a lot of cyber security attacks that have tampered with consumer privacy. These assaults simply smashed all the security algorithms and had an impact on us...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2023 Third International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS) s. 56 - 63
Hlavní autoři: Surla, Govindu, Lakshmi, R.
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.09.2023
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Data security is a complex subject in today's world that affects both data storage and data transmission. In recent months, we've seen a lot of cyber security attacks that have tampered with consumer privacy. These assaults simply smashed all the security algorithms and had an impact on user data's identity, confidentiality, authentication, integrity, and availability. One such technique is the use of cryptography to ensure data secrecy, authentication, integrity, availability, and identification. Encryption is the process of converting plaintext, or ordinary data, into something obscure or ciphertext using mathematical formulas or changes. Algorithms are the terms used to describe these mathematical operations or formulas utilized in encryption techniques. The data encryption techniques, including DES, BLOWFISH, RSA, SHA, EIGAMAL, TEA, and others, have been examined. Symmetric key encryption methods include DES and BLOWFISH. There are asymmetric key encryption algorithms such as RSA and SHA. To determine the best data encryption method many encryption algorithms have been analyzed and compared based on various characteristics.
AbstractList Data security is a complex subject in today's world that affects both data storage and data transmission. In recent months, we've seen a lot of cyber security attacks that have tampered with consumer privacy. These assaults simply smashed all the security algorithms and had an impact on user data's identity, confidentiality, authentication, integrity, and availability. One such technique is the use of cryptography to ensure data secrecy, authentication, integrity, availability, and identification. Encryption is the process of converting plaintext, or ordinary data, into something obscure or ciphertext using mathematical formulas or changes. Algorithms are the terms used to describe these mathematical operations or formulas utilized in encryption techniques. The data encryption techniques, including DES, BLOWFISH, RSA, SHA, EIGAMAL, TEA, and others, have been examined. Symmetric key encryption methods include DES and BLOWFISH. There are asymmetric key encryption algorithms such as RSA and SHA. To determine the best data encryption method many encryption algorithms have been analyzed and compared based on various characteristics.
Author Surla, Govindu
Lakshmi, R.
Author_xml – sequence: 1
  givenname: Govindu
  surname: Surla
  fullname: Surla, Govindu
  email: govindu561@gmail.com
  organization: Pondicherry University,Department of Computer Science,India
– sequence: 2
  givenname: R.
  surname: Lakshmi
  fullname: Lakshmi, R.
  email: prof.rlakshmi@gmail.com
  organization: Pondicherry University,Department of Computer Science,India
BookMark eNotzMFKxDAUQNEIutBx_kAhP9D60iRtsqxl1MKAQp2FqyGmL21xmpRMNv17FV2dzeXekEsfPBJyzyBnDPRD2xzargRZVnkBBc8BgKkLstWVVlwCh1IrfU0-3jC6EGfjLdKdH3-d0ScaHO2SSZgFl6URszom2sR1SWGIZhlXWp-GEKc0zmc6efqT0EfjvyY_0A5tCvGWXDlzOuP23w05PO3em5ds__rcNvU-mxjTKTMl710vwcpSCtTGVRyEE8Ioa3s04lMLywTnClEqbo3kSoFWfeG47U3v-Ibc_X0nRDwucZpNXI8MJEitSv4N_Z1RmA
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICUIS60567.2023.00018
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350306989
EndPage 63
ExternalDocumentID 10505986
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-a63dfd50c5654e9af7304f44a8ccdea4b94c14338ee583ca5388098d2f3cdadf3
IEDL.DBID RIE
IngestDate Wed May 08 06:10:57 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-a63dfd50c5654e9af7304f44a8ccdea4b94c14338ee583ca5388098d2f3cdadf3
PageCount 8
ParticipantIDs ieee_primary_10505986
PublicationCentury 2000
PublicationDate 2023-Sept.-1
PublicationDateYYYYMMDD 2023-09-01
PublicationDate_xml – month: 09
  year: 2023
  text: 2023-Sept.-1
  day: 01
PublicationDecade 2020
PublicationTitle 2023 Third International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS)
PublicationTitleAbbrev ICUIS
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8432046
Snippet Data security is a complex subject in today's world that affects both data storage and data transmission. In recent months, we've seen a lot of cyber security...
SourceID ieee
SourceType Publisher
StartPage 56
SubjectTerms Adleman (RSA)
Authentication
Banking
Cipher text
Cryptography
Data communication
Data Encryption Standard(DES)
Decryption
EIGAMAL
Encryption
Memory
Plaintext
Privacy
Rivest
Shamir
Ubiquitous computing
Title Performance Enhancement of State-of-the-Art Cryptography Algorithms in the Banking Sector
URI https://ieeexplore.ieee.org/document/10505986
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1BS8MwFH644cGTihV1Kjl4zdzWrE2Oc2w4kFGYg3kaafLiCtqOrhP89yZZdV48eEoJrxReCO9L-r7vA7jDnmZGuZ4qGXWoA7w0VVxQw4RC0zP2TOJ1Zp_i6ZQvFiKpyeqeC4OIvvkM2-7R_8vXhdq6qzK7w229FjxqQCOOox1Zq2bldDvifjKcT2YWnkdx25mCO2lC5-XxyzXFF43x8T8_dwLBnn5Hkp_CcgoHmJ_BS7Jv8SejfOVG9z4pDPGIkRaGWjRHB2VFhuXnuqrFqMng7bUos2r1viFZTmwIeZDeMIHM_JV9APPx6Hn4SGtfBJp1u6KiMgq10f2OsmCMoZDG7lJmGJNcKY2SpYIpC4NCjtjnoZJ9J_giuO6ZUGmpTXgOzbzI8QKIimyM0CpFTBnGItUylDyV9rztwAq_hMDlZbneSV8sv1Ny9cd8C45c6ndNWNfQrMot3sCh-qiyTXnrF-wLSWibVA
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwGA06BT2pOPG3OXjN7Nq0TY5zbGw4x2AbzNNIky-uoO3oOsH_3iSrzosHTwkhIZAQvpfke-8hdA--olranCoRecQCXpJIxommXIL2tbmTOJ3ZQTwcstmMjyqyuuPCAIBLPoOGrbq_fJXLtX0qMyfcxGvOol20F1Lqexu6VsXLaXr8od-e9scGoEdxw9qCW3FC6-bxyzfFhY3u0T8nPEb1LQEPj35CywnagewUvYy2Sf64ky1sacfjXGOHGUmuicFzpFWUuF18LstKjhq33l7zIi0X7yucZth0wY_CWSbgsXu0r6NptzNp90jljEDSZpOXRESB0ir0pIFjFLjQ5pxSTalgUioQNOFUGiAUMICQBVKEVvKFM-XrQCqhdHCGalmewTnCMjJ9uJIJQEIh5okSgWCJMDduC1fYBarbdZkvN-IX8-8lufyj_Q4d9CbPg_mgP3y6Qod2GzYpWdeoVhZruEH78qNMV8Wt27wvibWemw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+Third+International+Conference+on+Ubiquitous+Computing+and+Intelligent+Information+Systems+%28ICUIS%29&rft.atitle=Performance+Enhancement+of+State-of-the-Art+Cryptography+Algorithms+in+the+Banking+Sector&rft.au=Surla%2C+Govindu&rft.au=Lakshmi%2C+R.&rft.date=2023-09-01&rft.pub=IEEE&rft.spage=56&rft.epage=63&rft_id=info:doi/10.1109%2FICUIS60567.2023.00018&rft.externalDocID=10505986