UPSI Digital Repository (UDRep)
|
|
|
Abstract : Universiti Pendidikan Sultan Idris |
This article's aim is to provide an overview of network security encryption technologies. This article discusses the different types of cryptographic techniques, advantages, and disadvantages of cryptography on network security. First, we will go over the different cryptographic techniques' operational characteristics. The approach entails comparing and observing the outcomes of 20 different papers. The survey's findings would demonstrate the characteristics, advantages, and disadvantages posed by cryptographic technology, allowing the general public to gain a deeper understanding of the technology. |
References |
Abood, O. G., & Guirguis, S. K. (2018). A Survey on Cryptography Algorithms. International Journal of Scientific and Research Publications (IJSRP), 8(7), 495-516. https://doi.org/10.29322/ijsrp.8.7.2018.p7978 Adamovic, S., Sarac, M., Stamenkovic, D., & Radovanovic, D. (2018). The Importance of the Using Software Tools for Learning Modern Cryptography. International Journal of Engineering Education, 34(1), 256-262. Akhil, K. M., Kumar, M. P., & Pushpa, B. R. (2017). Enhanced cloud data security using AES algorithm. Proceedings of the 2017 International Conference on Intelligent Computing and Control (I2C2), 2017, pp. 1-5. https://doi.org/10.1109/I2C2.2017.8321820 Amalraj, A.J., & Jose, J.R (2016). A Survey Paper on Cryptography Techniques. International Journal of Computer Science and Mobile Computing, 5(8), 55-59. Babu, S.A. (2017). Modification Affine Ciphers Algorithm for Cryptography Password. International Journal of Research in Science & Engineering, 3(2). Chatzikonstantinou, A., Ntantogian, C., Karopoulos, G., & Xenakis, C. (2016). Evaluation of Cryptography Usage in Android Applications. BICT'15: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 83-90. https://doi.org/10.4108/eai.3-12-2015.2262471 Connor, L., Dukatz, C., DiValentin, l., & Farhady, n. (2017). Cryptography in a post-quantum world", Accenture.com, 2018. [Online]. Available: https://www.accenture.com/us-en/insights/technology/quantum-cryptography. Faheem, M., Jamel, S., Hassan, A., A., Z., Shafinaz, N., & Mat, M. (2017). A Survey on the Cryptographic Encryption Algorithms. International Journal of Advanced Computer Science and Applications, 8(11), 333-344. https://doi.org/10.14569/ijacsa.2017.081141 Hassan, N., Khalid, A., & Khanfar, K. (2016). A Survey of Cryptography Cloud Storage Techniques. International Journal of Computer Science and Mobile Computing, 5(2), 186-191. Hossain, A., Hossain, B., Uddin, S., & Imtiaz, S. (2016). Performance Analysis of Different Cryptography Algorithms. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3). Kapoor, V., & Yadav, R. (2016). A Hybrid Cryptography Technique for Improving Network Security. International Journal of Computer Applications, 141(11), 25-30. https://doi.org/10.5120/ijca2016909863 Maqsood, F., Ahmed, M., Ali, M., & Shah, M.A. (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal of Advanced Computer Science and Applications, 8(6). https://doi.org/10.14569/IJACSA.2017.080659 Mavroeidis, V., Vishi, K., D., M., & Jøsang, A. (2018). The Impact of Quantum Computing on Present Cryptography. International Journal of Advanced Computer Science and Applications, 9(3), 405-414. https://doi.org/10.14569/ijacsa.2018.090354 Mewada, S., Sharma, P., & Gautam, S. (2016). Classification of Efficient Symmetric Key Cryptography Algorithms. International Journal of Computer Science and Information Security, 14(2). https://doi.org/10.13140/RG.2.2.30465.66402 Mohamad, M. S. A., Din, R., & Ahmad, J. I. (2021). Research trends review on RSA scheme of asymmetric cryptography techniques. Bulletin of Electrical Engineering and Informatics, 10(1), 487–492. https://doi.org/10.11591/eei.v10i1.2493 Praveena, A., & Smys, S. (2016). Efficient Cryptographic approach for Data Security in Wireless Sensor Networks using MES V-II. Proceedings of the 2016 10th International Conference on Intelligent Systems and Control (ISCO). Coimbatore, India: IEEE. https://doi.org/10.1109/ISCO.2016.7726911 Sharma, S., & Gupta, Y. (2017). Study on Cryptography and Techniques. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2(1), 249-252. Sujatha, K., & Ramya, D. (2018). A Review Paper on Cryptography and Network Security. International Journal of Pure and Applied Mathematics, 119(17), 1279-1284. Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A Review Paper on Network Security and Cryptography. Advances in Computational Sciences and Technology, 10(5), 763-770. Ubaidullah, M., & Makki, Q. (2016). A review on symmetric key encryption techniques in cryptography. International Journal of Computer Applications, 147(10), 43-48. https://doi.org/10.5120/ijca2016911203
|
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |