Mohammed A Althamir, Abdullah Alabdulhay, M. M. Yasin
{"title":"A Systematic Literature Review on Symmetric and Asymmetric Encryption Comparison Key Size","authors":"Mohammed A Althamir, Abdullah Alabdulhay, M. M. Yasin","doi":"10.1109/ICSMDI57622.2023.00027","DOIUrl":null,"url":null,"abstract":"Symmetric and asymmetric encryption methods are used when a web browser is used to reply to emails, submit website forms, and perform similar activities. Key size is essential to enable security, which means the longer a key is, the better security can be ensured. Purpose: This review aims to present an overview of the critical size length, which is significant against different types of cyber attacks. Methodology: This research study is based on systematic literature review and secondary data analysis. Results: The symmetric and asymmetric key sizing participate in enabling data security and protection. Conclusion: Different cryptographic techniques will contribute to highlight the best approach that can be employed to maintain confidential data and address related issues within symmetric and asymmetric encryption key size.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSMDI57622.2023.00027","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Symmetric and asymmetric encryption methods are used when a web browser is used to reply to emails, submit website forms, and perform similar activities. Key size is essential to enable security, which means the longer a key is, the better security can be ensured. Purpose: This review aims to present an overview of the critical size length, which is significant against different types of cyber attacks. Methodology: This research study is based on systematic literature review and secondary data analysis. Results: The symmetric and asymmetric key sizing participate in enabling data security and protection. Conclusion: Different cryptographic techniques will contribute to highlight the best approach that can be employed to maintain confidential data and address related issues within symmetric and asymmetric encryption key size.