{"title":"云中的密钥加密方法:比较研究","authors":"Vikas Yadav, M. Kumar","doi":"10.1109/ICCT56969.2023.10076165","DOIUrl":null,"url":null,"abstract":"With cloud computing becoming an inseparable part of human daily life and making its way in every field of technology during the last decade with smarter human generation and adoption of new data policies, data security has become a significant pillar of trust. The standard of data security ensures the quality of privacy while availing various services over the internet. To achieve a step forward against always developing exploiters various algorithms have been developed which come under the wing of cryptography. Cryptography is the branch that ensures confidentiality, integrity, authentication, privacy, and security of the data of a consumer. This paper has dis-cussed and analyzed DES, triple DES, Blowfish, AES, IDEA, RC4, RSA, and ECC cryptography algorithms based on their ability of key size, block size, encryption time, decryption time, and total time in the Node JavaScript environment. Since, JavaScript powers 80% of the internet, this paper provides a production-level real-world analysis of various algorithms at present time.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Key Cryptographic Methods in the Cloud: A Comparative Study\",\"authors\":\"Vikas Yadav, M. Kumar\",\"doi\":\"10.1109/ICCT56969.2023.10076165\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With cloud computing becoming an inseparable part of human daily life and making its way in every field of technology during the last decade with smarter human generation and adoption of new data policies, data security has become a significant pillar of trust. The standard of data security ensures the quality of privacy while availing various services over the internet. To achieve a step forward against always developing exploiters various algorithms have been developed which come under the wing of cryptography. Cryptography is the branch that ensures confidentiality, integrity, authentication, privacy, and security of the data of a consumer. This paper has dis-cussed and analyzed DES, triple DES, Blowfish, AES, IDEA, RC4, RSA, and ECC cryptography algorithms based on their ability of key size, block size, encryption time, decryption time, and total time in the Node JavaScript environment. Since, JavaScript powers 80% of the internet, this paper provides a production-level real-world analysis of various algorithms at present time.\",\"PeriodicalId\":128100,\"journal\":{\"name\":\"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCT56969.2023.10076165\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT56969.2023.10076165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Key Cryptographic Methods in the Cloud: A Comparative Study
With cloud computing becoming an inseparable part of human daily life and making its way in every field of technology during the last decade with smarter human generation and adoption of new data policies, data security has become a significant pillar of trust. The standard of data security ensures the quality of privacy while availing various services over the internet. To achieve a step forward against always developing exploiters various algorithms have been developed which come under the wing of cryptography. Cryptography is the branch that ensures confidentiality, integrity, authentication, privacy, and security of the data of a consumer. This paper has dis-cussed and analyzed DES, triple DES, Blowfish, AES, IDEA, RC4, RSA, and ECC cryptography algorithms based on their ability of key size, block size, encryption time, decryption time, and total time in the Node JavaScript environment. Since, JavaScript powers 80% of the internet, this paper provides a production-level real-world analysis of various algorithms at present time.