Subject Review: Comparison between RSA, ECC & NTRU Algorithms

A. O. Khalaf, Shaimaa Khudhair Salah, Hind Jumaa Sartep, Z. Abdalrdha
{"title":"Subject Review: Comparison between RSA, ECC & NTRU Algorithms","authors":"A. O. Khalaf, Shaimaa Khudhair Salah, Hind Jumaa Sartep, Z. Abdalrdha","doi":"10.31695/ijerat.2019.3582","DOIUrl":null,"url":null,"abstract":"Encryption technology is one of the main means of protecting information security and includes many forms in terms of digital signatures, authentication, system security, confidentiality and data integrity and other functions. Therefore, Encryption and decryption are the best solution to protect data, especially not only sensitive data and protect them from attackers who aim to steal information. In this paper we use asymmetric encryption algorithms such as (RSA, Elliptic Curve, NTRU) that are used to send data over the network to provide security to users. We work on a review of the algorithms mentioned because of their importance in the encryption side and will give a summary of the performance of its work.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering Research and Advanced Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31695/ijerat.2019.3582","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Encryption technology is one of the main means of protecting information security and includes many forms in terms of digital signatures, authentication, system security, confidentiality and data integrity and other functions. Therefore, Encryption and decryption are the best solution to protect data, especially not only sensitive data and protect them from attackers who aim to steal information. In this paper we use asymmetric encryption algorithms such as (RSA, Elliptic Curve, NTRU) that are used to send data over the network to provide security to users. We work on a review of the algorithms mentioned because of their importance in the encryption side and will give a summary of the performance of its work.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
课题回顾:RSA、ECC和NTRU算法的比较
加密技术是保护信息安全的主要手段之一,在数字签名、身份验证、系统安全、保密性和数据完整性等功能方面包括多种形式。因此,加密和解密是保护数据,尤其是敏感数据,防止攻击者窃取信息的最佳解决方案。在本文中,我们使用非对称加密算法,如(RSA,椭圆曲线,NTRU),用于在网络上发送数据,为用户提供安全性。我们对提到的算法进行了回顾,因为它们在加密方面很重要,并将对其工作性能进行总结。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Object Boundaries Detection Based Center Of Gravity Optimization of Interval Type-2 Fuzzy Logic System for Software Reliability Prediction Analysis of Quality Control for Automatic Transmission Products MCVT Model By Six Sigma Approach at PT HPPM, Indonesia A New wireless sensor networks Routing Algorithm Based on SPIN Protocols and Circumference Technique Optimization of Production process in Sewing Work for Ethiopia Cultural Clothe Apparel Production
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1