Mohammed A Althamir, Abdullah Alabdulhay, M. M. Yasin
{"title":"对称与非对称加密密钥大小比较的系统文献综述","authors":"Mohammed A Althamir, Abdullah Alabdulhay, M. M. Yasin","doi":"10.1109/ICSMDI57622.2023.00027","DOIUrl":null,"url":null,"abstract":"Symmetric and asymmetric encryption methods are used when a web browser is used to reply to emails, submit website forms, and perform similar activities. Key size is essential to enable security, which means the longer a key is, the better security can be ensured. Purpose: This review aims to present an overview of the critical size length, which is significant against different types of cyber attacks. Methodology: This research study is based on systematic literature review and secondary data analysis. Results: The symmetric and asymmetric key sizing participate in enabling data security and protection. Conclusion: Different cryptographic techniques will contribute to highlight the best approach that can be employed to maintain confidential data and address related issues within symmetric and asymmetric encryption key size.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Systematic Literature Review on Symmetric and Asymmetric Encryption Comparison Key Size\",\"authors\":\"Mohammed A Althamir, Abdullah Alabdulhay, M. M. Yasin\",\"doi\":\"10.1109/ICSMDI57622.2023.00027\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Symmetric and asymmetric encryption methods are used when a web browser is used to reply to emails, submit website forms, and perform similar activities. Key size is essential to enable security, which means the longer a key is, the better security can be ensured. Purpose: This review aims to present an overview of the critical size length, which is significant against different types of cyber attacks. Methodology: This research study is based on systematic literature review and secondary data analysis. Results: The symmetric and asymmetric key sizing participate in enabling data security and protection. Conclusion: Different cryptographic techniques will contribute to highlight the best approach that can be employed to maintain confidential data and address related issues within symmetric and asymmetric encryption key size.\",\"PeriodicalId\":373017,\"journal\":{\"name\":\"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSMDI57622.2023.00027\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSMDI57622.2023.00027","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Systematic Literature Review on Symmetric and Asymmetric Encryption Comparison Key Size
Symmetric and asymmetric encryption methods are used when a web browser is used to reply to emails, submit website forms, and perform similar activities. Key size is essential to enable security, which means the longer a key is, the better security can be ensured. Purpose: This review aims to present an overview of the critical size length, which is significant against different types of cyber attacks. Methodology: This research study is based on systematic literature review and secondary data analysis. Results: The symmetric and asymmetric key sizing participate in enabling data security and protection. Conclusion: Different cryptographic techniques will contribute to highlight the best approach that can be employed to maintain confidential data and address related issues within symmetric and asymmetric encryption key size.