Survey on Modern Cryptography
DOI:
https://doi.org/10.31642/JoKMC/2018/070101Keywords:
Cryptography, encryption, decryption, AES, RC4, RSAAbstract
Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from unauthorized individuals. Encryption is a mechanism of converting plain-text into cipher-text in order to be unreadable by unwanted people. In this review, we explain some important cryptography primitives ( symmetric and asymmetric cryptography algorithms) with examples for each type. Comparative study is making among this cryptography primitives according to many parameters such as structure, speed, block size and others parameters.Downloads
References
Ali, Y., “Improve E-Services Security Level by Modifying AES Algorithm”, Master’s Thesis, Department of Computer Science, University of Technology, (2016).
Piper, F. & Murphy, C. , “Cryptography: A Very Short Introduction”, © Oxford University Press, Oxford, UK, (2006).
Dent, A. & Mitchell, C., “User’s Guide to Cryptography and Standards”, Artech House, INC. USA, (2005).
Kessler, G., “An Overview of Cryptography”, [online]: http://www.garykessler.net/library/crypto.html, (2013).
Stamp, M. & Low, R. , “Applied Cryptanalysis Breaking Ciphers in the Real World”, © John Wiley & Sons, Inc., New Jersey, USA, (2007).
Pavithra, S., & Ramadevi, E., “Study and Performance Analysis of Cryptography Algorithms”, International Journal of Advanced Research in Computer Engineering & Technology, 1(5), 82-86. (2012).
Delfs, H. & Knebl, H. , “Introduction to Cryptography Principles and Applications Second Edition”, © Springer-Verlag Berlin Heidelberg, (2007). DOI: https://doi.org/10.1007/3-540-49244-5
Barker, E., & Roginsky, A., “Transitions: Recommendation for Transitioning the Use of 595 Cryptographic Algorithms and Key Lengths”, National Institute of Standards and Technology, Gaithersburg, Maryland, (2015). DOI: https://doi.org/10.6028/NIST.SP.800-131Ar1
Hussein, Z., “Design and Implementation of Enhancement RC4 Stream Cipher System”, Master’s Thesis, Department of Computer Science, University of Technology, (2015).
Kawle, P., Hiwase, A., Bagde, G., Tekam, E. & Kalbande, R., “Modified Advanced Encryption Standard”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-4, Issue-1, (2014).
Omran, A. ,“Performance Analysis of AES and LWAES Algorithms”, Master, thesis, Iraqi Commission for Computers and Informatics, (2018).
Sadiq, A.T. & Faisal, F.H., “Modification AES algorithm based on Extended Key and Plain Text” , Journal of Advanced Computer Science and Technology Research, ISSN: 2231-8852, Vol.5 No.4, (2015).
Daernen, J. & Rijrnen V., “The Design of Rijndael AES - The Advanced Encryption Standard”, © Springer-Verlag Berlin Heidelberg, (2002).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Mustafa M. Abd Zaid, Soukaena Hassan
This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.