UPSI Digital Repository (UDRep)
Start | FAQ | About

QR Code Link :

Type :article
Subject :L Education (General)
Main Author :Gan, Hui Ching
Additional Authors :Mohamad Fadli Zolkipli
Title :Review on cryptography techniques in network security
Place of Production :Tanjong Malim
Publisher :Fakulti Seni, Komputeran dan Industri Kreatif
Year of Publication :2021
Corporate Name :Universiti Pendidikan Sultan Idris
PDF Full Text :Login required to access this item.

Abstract : Universiti Pendidikan Sultan Idris
This article's aim is to provide an overview of network security encryption technologies. This article discusses the different types of cryptographic techniques, advantages, and disadvantages of cryptography on network security. First, we will go over the different cryptographic techniques' operational characteristics. The approach entails comparing and observing the outcomes of 20 different papers. The survey's findings would demonstrate the characteristics, advantages, and disadvantages posed by cryptographic technology, allowing the general public to gain a deeper understanding of the technology.

References

Abood, O. G., & Guirguis, S. K. (2018). A Survey on Cryptography Algorithms. International Journal of Scientific and Research Publications (IJSRP), 8(7), 495-516. https://doi.org/10.29322/ijsrp.8.7.2018.p7978

Adamovic, S., Sarac, M., Stamenkovic, D., & Radovanovic, D. (2018). The Importance of the Using Software Tools for Learning Modern Cryptography. International Journal of Engineering Education, 34(1), 256-262.

Akhil, K. M., Kumar, M. P., & Pushpa, B. R. (2017). Enhanced cloud data security using AES algorithm. Proceedings of the 2017 International Conference on Intelligent Computing and Control (I2C2), 2017, pp. 1-5. https://doi.org/10.1109/I2C2.2017.8321820

Amalraj, A.J., & Jose, J.R (2016). A Survey Paper on Cryptography Techniques. International Journal of Computer Science and Mobile Computing, 5(8), 55-59.

Babu, S.A. (2017). Modification Affine Ciphers Algorithm for Cryptography Password. International Journal of Research in Science & Engineering, 3(2).

Chatzikonstantinou, A., Ntantogian, C., Karopoulos, G., & Xenakis, C. (2016). Evaluation of Cryptography Usage in Android Applications. BICT'15: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 83-90. https://doi.org/10.4108/eai.3-12-2015.2262471

Connor, L., Dukatz, C., DiValentin, l., & Farhady, n. (2017). Cryptography in a post-quantum world", Accenture.com, 2018. [Online]. Available: https://www.accenture.com/us-en/insights/technology/quantum-cryptography.

Faheem, M., Jamel, S., Hassan, A., A., Z., Shafinaz, N., & Mat, M. (2017). A Survey on the Cryptographic Encryption Algorithms. International Journal of Advanced Computer Science and Applications, 8(11), 333-344. https://doi.org/10.14569/ijacsa.2017.081141

Hassan, N., Khalid, A., & Khanfar, K. (2016). A Survey of Cryptography Cloud Storage Techniques. International Journal of Computer Science and Mobile Computing, 5(2), 186-191.

Hossain, A., Hossain, B., Uddin, S., & Imtiaz, S. (2016). Performance Analysis of Different Cryptography Algorithms. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3).

Kapoor, V., & Yadav, R. (2016). A Hybrid Cryptography Technique for Improving Network Security. International Journal of Computer Applications, 141(11), 25-30. https://doi.org/10.5120/ijca2016909863

Maqsood, F., Ahmed, M., Ali, M., & Shah, M.A. (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal of Advanced Computer Science and Applications, 8(6). https://doi.org/10.14569/IJACSA.2017.080659

Mavroeidis, V., Vishi, K., D., M., & Jøsang, A. (2018). The Impact of Quantum Computing on Present Cryptography. International Journal of Advanced Computer Science and Applications, 9(3), 405-414. https://doi.org/10.14569/ijacsa.2018.090354

Mewada, S., Sharma, P., & Gautam, S. (2016). Classification of Efficient Symmetric Key Cryptography Algorithms. International Journal of Computer Science and Information Security, 14(2). https://doi.org/10.13140/RG.2.2.30465.66402

Mohamad, M. S. A., Din, R., & Ahmad, J. I. (2021). Research trends review on RSA scheme of asymmetric cryptography techniques. Bulletin of Electrical Engineering and Informatics, 10(1), 487–492. https://doi.org/10.11591/eei.v10i1.2493

Praveena, A., & Smys, S. (2016). Efficient Cryptographic approach for Data Security in Wireless Sensor Networks using MES V-II. Proceedings of the 2016 10th International Conference on Intelligent Systems and Control (ISCO). Coimbatore, India: IEEE. https://doi.org/10.1109/ISCO.2016.7726911

Sharma, S., & Gupta, Y. (2017). Study on Cryptography and Techniques. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2(1), 249-252.

Sujatha, K., & Ramya, D. (2018). A Review Paper on Cryptography and Network Security. International Journal of Pure and Applied Mathematics, 119(17), 1279-1284.

Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A Review Paper on Network Security and Cryptography. Advances in Computational Sciences and Technology, 10(5), 763-770.

Ubaidullah, M., & Makki, Q. (2016). A review on symmetric key encryption techniques in cryptography. International Journal of Computer Applications, 147(10), 43-48. https://doi.org/10.5120/ijca2016911203

 


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries with this repository, kindly contact us at pustakasys@upsi.edu.my or Whatsapp +60163630263 (Office hours only)