A. O. Khalaf, Shaimaa Khudhair Salah, Hind Jumaa Sartep, Z. Abdalrdha
{"title":"课题回顾:RSA、ECC和NTRU算法的比较","authors":"A. O. Khalaf, Shaimaa Khudhair Salah, Hind Jumaa Sartep, Z. Abdalrdha","doi":"10.31695/ijerat.2019.3582","DOIUrl":null,"url":null,"abstract":"Encryption technology is one of the main means of protecting information security and includes many forms in terms of digital signatures, authentication, system security, confidentiality and data integrity and other functions. Therefore, Encryption and decryption are the best solution to protect data, especially not only sensitive data and protect them from attackers who aim to steal information. In this paper we use asymmetric encryption algorithms such as (RSA, Elliptic Curve, NTRU) that are used to send data over the network to provide security to users. We work on a review of the algorithms mentioned because of their importance in the encryption side and will give a summary of the performance of its work.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Subject Review: Comparison between RSA, ECC & NTRU Algorithms\",\"authors\":\"A. O. Khalaf, Shaimaa Khudhair Salah, Hind Jumaa Sartep, Z. Abdalrdha\",\"doi\":\"10.31695/ijerat.2019.3582\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Encryption technology is one of the main means of protecting information security and includes many forms in terms of digital signatures, authentication, system security, confidentiality and data integrity and other functions. Therefore, Encryption and decryption are the best solution to protect data, especially not only sensitive data and protect them from attackers who aim to steal information. In this paper we use asymmetric encryption algorithms such as (RSA, Elliptic Curve, NTRU) that are used to send data over the network to provide security to users. We work on a review of the algorithms mentioned because of their importance in the encryption side and will give a summary of the performance of its work.\",\"PeriodicalId\":424923,\"journal\":{\"name\":\"International Journal of Engineering Research and Advanced Technology\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Engineering Research and Advanced Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31695/ijerat.2019.3582\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering Research and Advanced Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31695/ijerat.2019.3582","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Subject Review: Comparison between RSA, ECC & NTRU Algorithms
Encryption technology is one of the main means of protecting information security and includes many forms in terms of digital signatures, authentication, system security, confidentiality and data integrity and other functions. Therefore, Encryption and decryption are the best solution to protect data, especially not only sensitive data and protect them from attackers who aim to steal information. In this paper we use asymmetric encryption algorithms such as (RSA, Elliptic Curve, NTRU) that are used to send data over the network to provide security to users. We work on a review of the algorithms mentioned because of their importance in the encryption side and will give a summary of the performance of its work.