Survey on Modern Cryptography

Authors

  • Mustafa M. Abd Zaid Computer Sciences Department/ University of Technology, Baghdad, Iraq
  • Soukaena Hassan Computer Sciences Department/ University of Technology, Baghdad, Iraq

DOI:

https://doi.org/10.31642/JoKMC/2018/070101

Keywords:

Cryptography, encryption, decryption, AES, RC4, RSA

Abstract

Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from unauthorized individuals. Encryption is a mechanism of converting plain-text into cipher-text in order to be unreadable by unwanted people. In this review, we explain some important cryptography primitives ( symmetric and asymmetric cryptography algorithms) with examples for each type. Comparative study is making among this cryptography primitives according to many parameters such as structure, speed, block size and others parameters.

Downloads

Download data is not yet available.

References

Ali, Y., “Improve E-Services Security Level by Modifying AES Algorithm”, Master’s Thesis, Department of Computer Science, University of Technology, (2016).

Piper, F. & Murphy, C. , “Cryptography: A Very Short Introduction”, © Oxford University Press, Oxford, UK, (2006).

Dent, A. & Mitchell, C., “User’s Guide to Cryptography and Standards”, Artech House, INC. USA, (2005).

Kessler, G., “An Overview of Cryptography”, [online]: http://www.garykessler.net/library/crypto.html, (2013).

Stamp, M. & Low, R. , “Applied Cryptanalysis Breaking Ciphers in the Real World”, © John Wiley & Sons, Inc., New Jersey, USA, (2007).

Pavithra, S., & Ramadevi, E., “Study and Performance Analysis of Cryptography Algorithms”, International Journal of Advanced Research in Computer Engineering & Technology, 1(5), 82-86. (2012).

Delfs, H. & Knebl, H. , “Introduction to Cryptography Principles and Applications Second Edition”, © Springer-Verlag Berlin Heidelberg, (2007). DOI: https://doi.org/10.1007/3-540-49244-5

Barker, E., & Roginsky, A., “Transitions: Recommendation for Transitioning the Use of 595 Cryptographic Algorithms and Key Lengths”, National Institute of Standards and Technology, Gaithersburg, Maryland, (2015). DOI: https://doi.org/10.6028/NIST.SP.800-131Ar1

Hussein, Z., “Design and Implementation of Enhancement RC4 Stream Cipher System”, Master’s Thesis, Department of Computer Science, University of Technology, (2015).

Kawle, P., Hiwase, A., Bagde, G., Tekam, E. & Kalbande, R., “Modified Advanced Encryption Standard”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-4, Issue-1, (2014).

Omran, A. ,“Performance Analysis of AES and LWAES Algorithms”, Master, thesis, Iraqi Commission for Computers and Informatics, (2018).

Sadiq, A.T. & Faisal, F.H., “Modification AES algorithm based on Extended Key and Plain Text” , Journal of Advanced Computer Science and Technology Research, ISSN: 2231-8852, Vol.5 No.4, (2015).

Daernen, J. & Rijrnen V., “The Design of Rijndael AES - The Advanced Encryption Standard”, © Springer-Verlag Berlin Heidelberg, (2002).

Downloads

Published

2021-09-19

How to Cite

Abd Zaid, M., & Hassan, S. (2021). Survey on Modern Cryptography. Journal of Kufa for Mathematics and Computer, 7(1), 1–8. https://doi.org/10.31642/JoKMC/2018/070101

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.