Review on Cryptography Techniques in Network Security
DOI:
https://doi.org/10.37134/jictie.vol8.1.10.2021Keywords:
cryptography, network security, symmetric-key algorithms, asymmetric-key algorithmsAbstract
This article's aim is to provide an overview of network security encryption technologies. This article discusses the different types of cryptographic techniques, advantages, and disadvantages of cryptography on network security. First, we will go over the different cryptographic techniques' operational characteristics. The approach entails comparing and observing the outcomes of 20 different papers. The survey's findings would demonstrate the characteristics, advantages, and disadvantages posed by cryptographic technology, allowing the general public to gain a deeper understanding of the technology.
Downloads
References
Abood, O. G., & Guirguis, S. K. (2018). A Survey on Cryptography Algorithms. International Journal of Scientific and Research Publications (IJSRP), 8(7), 495-516. https://doi.org/10.29322/ijsrp.8.7.2018.p7978
Adamovic, S., Sarac, M., Stamenkovic, D., & Radovanovic, D. (2018). The Importance of the Using Software Tools for Learning Modern Cryptography. International Journal of Engineering Education, 34(1), 256-262.
Akhil, K. M., Kumar, M. P., & Pushpa, B. R. (2017). Enhanced cloud data security using AES algorithm. Proceedings of the 2017 International Conference on Intelligent Computing and Control (I2C2), 2017, pp. 1-5. https://doi.org/10.1109/I2C2.2017.8321820
Amalraj, A.J., & Jose, J.R (2016). A Survey Paper on Cryptography Techniques. International Journal of Computer Science and Mobile Computing, 5(8), 55-59.
Babu, S.A. (2017). Modification Affine Ciphers Algorithm for Cryptography Password. International Journal of Research in Science & Engineering, 3(2).
Chatzikonstantinou, A., Ntantogian, C., Karopoulos, G., & Xenakis, C. (2016). Evaluation of Cryptography Usage in Android Applications. BICT'15: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 83-90. https://doi.org/10.4108/eai.3-12-2015.2262471
Connor, L., Dukatz, C., DiValentin, l., & Farhady, n. (2017). Cryptography in a post-quantum world", Accenture.com, 2018. [Online]. Available: https://www.accenture.com/us-en/insights/technology/quantum-cryptography.
Faheem, M., Jamel, S., Hassan, A., A., Z., Shafinaz, N., & Mat, M. (2017). A Survey on the Cryptographic Encryption Algorithms. International Journal of Advanced Computer Science and Applications, 8(11), 333-344. https://doi.org/10.14569/ijacsa.2017.081141
Hassan, N., Khalid, A., & Khanfar, K. (2016). A Survey of Cryptography Cloud Storage Techniques. International Journal of Computer Science and Mobile Computing, 5(2), 186-191.
Hossain, A., Hossain, B., Uddin, S., & Imtiaz, S. (2016). Performance Analysis of Different Cryptography Algorithms. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3).
Kapoor, V., & Yadav, R. (2016). A Hybrid Cryptography Technique for Improving Network Security. International Journal of Computer Applications, 141(11), 25-30. https://doi.org/10.5120/ijca2016909863
Maqsood, F., Ahmed, M., Ali, M., & Shah, M.A. (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal of Advanced Computer Science and Applications, 8(6). https://doi.org/10.14569/IJACSA.2017.080659
Mavroeidis, V., Vishi, K., D., M., & Jøsang, A. (2018). The Impact of Quantum Computing on Present Cryptography. International Journal of Advanced Computer Science and Applications, 9(3), 405-414. https://doi.org/10.14569/ijacsa.2018.090354
Mewada, S., Sharma, P., & Gautam, S. (2016). Classification of Efficient Symmetric Key Cryptography Algorithms. International Journal of Computer Science and Information Security, 14(2). https://doi.org/10.13140/RG.2.2.30465.66402
Mohamad, M. S. A., Din, R., & Ahmad, J. I. (2021). Research trends review on RSA scheme of asymmetric cryptography techniques. Bulletin of Electrical Engineering and Informatics, 10(1), 487–492. https://doi.org/10.11591/eei.v10i1.2493
Praveena, A., & Smys, S. (2016). Efficient Cryptographic approach for Data Security in Wireless Sensor Networks using MES V-II. Proceedings of the 2016 10th International Conference on Intelligent Systems and Control (ISCO). Coimbatore, India: IEEE. https://doi.org/10.1109/ISCO.2016.7726911
Sharma, S., & Gupta, Y. (2017). Study on Cryptography and Techniques. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2(1), 249-252.
Sujatha, K., & Ramya, D. (2018). A Review Paper on Cryptography and Network Security. International Journal of Pure and Applied Mathematics, 119(17), 1279-1284.
Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A Review Paper on Network Security and Cryptography. Advances in Computational Sciences and Technology, 10(5), 763-770.
Ubaidullah, M., & Makki, Q. (2016). A review on symmetric key encryption techniques in cryptography. International Journal of Computer Applications, 147(10), 43-48. https://doi.org/10.5120/ijca2016911203