Review and Analysis of Cryptography Techniques

Samya Al Busafi, B. Kumar
{"title":"Review and Analysis of Cryptography Techniques","authors":"Samya Al Busafi, B. Kumar","doi":"10.1109/SMART50582.2020.9336792","DOIUrl":null,"url":null,"abstract":"Recently, there has been a significant increase in the number of Internet users. Thus, digital data has occupied the highest rank in our time, because most companies and governments adopt the total dependence for the transmission of their data transactions with customers and banking transactions over the World Wide Web. Therefore, total reliance on digital data needs to secure this data and preserve it from theft and modification in order to reach the intended user intact without distortion, and this is done by securing this data using encryption with its various techniques. There are many technologies that encrypt the data sent to the receiving party called encryption techniques. This research will examine the analysis of different encryption techniques, for example, symmetric cryptography technique and asymmetric cryptography techniques, Rivest Shamir and Adleman, Diffie-Hellman, Digital Signature Algorithm, (ECC) Elliptic curve cryptography, and how can employ them and explore the best methods of cryptography techniques that give complete confidential and transmitted data.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMART50582.2020.9336792","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Recently, there has been a significant increase in the number of Internet users. Thus, digital data has occupied the highest rank in our time, because most companies and governments adopt the total dependence for the transmission of their data transactions with customers and banking transactions over the World Wide Web. Therefore, total reliance on digital data needs to secure this data and preserve it from theft and modification in order to reach the intended user intact without distortion, and this is done by securing this data using encryption with its various techniques. There are many technologies that encrypt the data sent to the receiving party called encryption techniques. This research will examine the analysis of different encryption techniques, for example, symmetric cryptography technique and asymmetric cryptography techniques, Rivest Shamir and Adleman, Diffie-Hellman, Digital Signature Algorithm, (ECC) Elliptic curve cryptography, and how can employ them and explore the best methods of cryptography techniques that give complete confidential and transmitted data.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
密码学技术综述与分析
最近,互联网用户的数量有了显著的增长。因此,数字数据在我们这个时代占据了最高的地位,因为大多数公司和政府完全依赖于通过万维网传输他们与客户的数据交易和银行交易。因此,完全依赖数字数据需要保护这些数据,防止其被盗和修改,以便完好无损地到达预期用户,这是通过使用各种技术加密来保护这些数据来实现的。有许多技术对发送给接收方的数据进行加密,称为加密技术。本研究将分析不同的加密技术,例如对称加密技术和非对称加密技术,Rivest Shamir和Adleman, Diffie-Hellman,数字签名算法,(ECC)椭圆曲线加密,以及如何使用它们,并探索提供完整机密和传输数据的加密技术的最佳方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Oral Disease Detection using Neural Network A Review on Effectiveness of Artificial Intelligence Techniques in the Detection of COVID-19 Accident Avoidance Simulation using SUMO Gesture-Based Model of Mixed Reality Human-Computer Interface The Survey of Digital Image Analysis with Artificial Intelligence- DCNN Technique
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1