最常用的加密算法分析

Attiq Ahmed, Muhammad Naeem
{"title":"最常用的加密算法分析","authors":"Attiq Ahmed, Muhammad Naeem","doi":"10.24032/ijeacs/0402/003","DOIUrl":null,"url":null,"abstract":"As the things are settled down after the emergence of technology, and this is the decade of professionalism as far as technology is concerned, security of data is the major hurdle in this race. This is the era in which data is one click away from the users, so data needs to be more secured so that it can be avoided unauthorized access. For this purpose, different data security fields have also emerged to ensure data security and confidentiality. In this survey paper we will look up all the techniques used for data encryption and after that, we compare those techniques to provide the best algorithm to ensure that data is secured. We go categorically, as in most of the cases, symmetric encryption technique is applicable and, in a few cases, asymmetric is recommended. Firstly, in our study, we compare both the techniques with each other and then compare all the algorithms working under the above-mentioned categories concerning their time, efficiency, memory usage, latency, key size, and several rounds which will result in showing the best algorithm according to input data.","PeriodicalId":423763,"journal":{"name":"International Journal of Engineering and Applied Computer Science","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of Most Common Encryption Algorithms\",\"authors\":\"Attiq Ahmed, Muhammad Naeem\",\"doi\":\"10.24032/ijeacs/0402/003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the things are settled down after the emergence of technology, and this is the decade of professionalism as far as technology is concerned, security of data is the major hurdle in this race. This is the era in which data is one click away from the users, so data needs to be more secured so that it can be avoided unauthorized access. For this purpose, different data security fields have also emerged to ensure data security and confidentiality. In this survey paper we will look up all the techniques used for data encryption and after that, we compare those techniques to provide the best algorithm to ensure that data is secured. We go categorically, as in most of the cases, symmetric encryption technique is applicable and, in a few cases, asymmetric is recommended. Firstly, in our study, we compare both the techniques with each other and then compare all the algorithms working under the above-mentioned categories concerning their time, efficiency, memory usage, latency, key size, and several rounds which will result in showing the best algorithm according to input data.\",\"PeriodicalId\":423763,\"journal\":{\"name\":\"International Journal of Engineering and Applied Computer Science\",\"volume\":\"78 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Engineering and Applied Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.24032/ijeacs/0402/003\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering and Applied Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24032/ijeacs/0402/003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

随着技术的出现,一切都尘埃落定,而就技术而言,这是专业的十年,数据的安全是这场竞赛的主要障碍。这是一个数据离用户只需点击一下的时代,因此数据需要更加安全,以避免未经授权的访问。为此,不同的数据安全领域也应运而生,以确保数据的安全性和保密性。在本调查报告中,我们将查找用于数据加密的所有技术,然后,我们比较这些技术,以提供最佳算法,以确保数据安全。在大多数情况下,我们都明确地说,对称加密技术是适用的,在少数情况下,建议使用非对称加密技术。首先,在我们的研究中,我们将两种技术相互比较,然后比较在上述类别下工作的所有算法的时间,效率,内存使用,延迟,密钥大小和几轮,这将导致根据输入数据显示最佳算法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Analysis of Most Common Encryption Algorithms
As the things are settled down after the emergence of technology, and this is the decade of professionalism as far as technology is concerned, security of data is the major hurdle in this race. This is the era in which data is one click away from the users, so data needs to be more secured so that it can be avoided unauthorized access. For this purpose, different data security fields have also emerged to ensure data security and confidentiality. In this survey paper we will look up all the techniques used for data encryption and after that, we compare those techniques to provide the best algorithm to ensure that data is secured. We go categorically, as in most of the cases, symmetric encryption technique is applicable and, in a few cases, asymmetric is recommended. Firstly, in our study, we compare both the techniques with each other and then compare all the algorithms working under the above-mentioned categories concerning their time, efficiency, memory usage, latency, key size, and several rounds which will result in showing the best algorithm according to input data.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Research on Bearing Fault Detection Algorithm Based on Convolution Neural Network and SVM Parameters Identification of Induction Motor Using Bacterial Foraging Algorithm Reactive Power Compensation and Harmonic Mitigation in Single-Phase Distribution System using Multilevel Converter Based D-STATCOM Outbreaks Predictions of Covid19 in Tabasco, Mexico, using Fast Fourier Transform Prototype for Multimedia Content Delivery based on Non-Transmittable Codewords Enhanced Viterbi Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1