{"title":"Review and Analysis of Cryptography Techniques","authors":"Samya Al Busafi, B. Kumar","doi":"10.1109/SMART50582.2020.9336792","DOIUrl":null,"url":null,"abstract":"Recently, there has been a significant increase in the number of Internet users. Thus, digital data has occupied the highest rank in our time, because most companies and governments adopt the total dependence for the transmission of their data transactions with customers and banking transactions over the World Wide Web. Therefore, total reliance on digital data needs to secure this data and preserve it from theft and modification in order to reach the intended user intact without distortion, and this is done by securing this data using encryption with its various techniques. There are many technologies that encrypt the data sent to the receiving party called encryption techniques. This research will examine the analysis of different encryption techniques, for example, symmetric cryptography technique and asymmetric cryptography techniques, Rivest Shamir and Adleman, Diffie-Hellman, Digital Signature Algorithm, (ECC) Elliptic curve cryptography, and how can employ them and explore the best methods of cryptography techniques that give complete confidential and transmitted data.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMART50582.2020.9336792","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Recently, there has been a significant increase in the number of Internet users. Thus, digital data has occupied the highest rank in our time, because most companies and governments adopt the total dependence for the transmission of their data transactions with customers and banking transactions over the World Wide Web. Therefore, total reliance on digital data needs to secure this data and preserve it from theft and modification in order to reach the intended user intact without distortion, and this is done by securing this data using encryption with its various techniques. There are many technologies that encrypt the data sent to the receiving party called encryption techniques. This research will examine the analysis of different encryption techniques, for example, symmetric cryptography technique and asymmetric cryptography techniques, Rivest Shamir and Adleman, Diffie-Hellman, Digital Signature Algorithm, (ECC) Elliptic curve cryptography, and how can employ them and explore the best methods of cryptography techniques that give complete confidential and transmitted data.