Review on Cryptography Techniques in Network Security

Authors

  • Angela Gan 011-36877982

DOI:

https://doi.org/10.37134/jictie.vol8.1.10.2021

Keywords:

cryptography, network security, symmetric-key algorithms, asymmetric-key algorithms

Abstract

This article's aim is to provide an overview of network security encryption technologies. This article discusses the different types of cryptographic techniques, advantages, and disadvantages of cryptography on network security. First, we will go over the different cryptographic techniques' operational characteristics. The approach entails comparing and observing the outcomes of 20 different papers. The survey's findings would demonstrate the characteristics, advantages, and disadvantages posed by cryptographic technology, allowing the general public to gain a deeper understanding of the technology.

Downloads

Download data is not yet available.

References

Abood, O. G., & Guirguis, S. K. (2018). A Survey on Cryptography Algorithms. International Journal of Scientific and Research Publications (IJSRP), 8(7), 495-516. https://doi.org/10.29322/ijsrp.8.7.2018.p7978

Adamovic, S., Sarac, M., Stamenkovic, D., & Radovanovic, D. (2018). The Importance of the Using Software Tools for Learning Modern Cryptography. International Journal of Engineering Education, 34(1), 256-262.

Akhil, K. M., Kumar, M. P., & Pushpa, B. R. (2017). Enhanced cloud data security using AES algorithm. Proceedings of the 2017 International Conference on Intelligent Computing and Control (I2C2), 2017, pp. 1-5. https://doi.org/10.1109/I2C2.2017.8321820

Amalraj, A.J., & Jose, J.R (2016). A Survey Paper on Cryptography Techniques. International Journal of Computer Science and Mobile Computing, 5(8), 55-59.

Babu, S.A. (2017). Modification Affine Ciphers Algorithm for Cryptography Password. International Journal of Research in Science & Engineering, 3(2).

Chatzikonstantinou, A., Ntantogian, C., Karopoulos, G., & Xenakis, C. (2016). Evaluation of Cryptography Usage in Android Applications. BICT'15: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), 83-90. https://doi.org/10.4108/eai.3-12-2015.2262471

Connor, L., Dukatz, C., DiValentin, l., & Farhady, n. (2017). Cryptography in a post-quantum world", Accenture.com, 2018. [Online]. Available: https://www.accenture.com/us-en/insights/technology/quantum-cryptography.

Faheem, M., Jamel, S., Hassan, A., A., Z., Shafinaz, N., & Mat, M. (2017). A Survey on the Cryptographic Encryption Algorithms. International Journal of Advanced Computer Science and Applications, 8(11), 333-344. https://doi.org/10.14569/ijacsa.2017.081141

Hassan, N., Khalid, A., & Khanfar, K. (2016). A Survey of Cryptography Cloud Storage Techniques. International Journal of Computer Science and Mobile Computing, 5(2), 186-191.

Hossain, A., Hossain, B., Uddin, S., & Imtiaz, S. (2016). Performance Analysis of Different Cryptography Algorithms. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3).

Kapoor, V., & Yadav, R. (2016). A Hybrid Cryptography Technique for Improving Network Security. International Journal of Computer Applications, 141(11), 25-30. https://doi.org/10.5120/ijca2016909863

Maqsood, F., Ahmed, M., Ali, M., & Shah, M.A. (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal of Advanced Computer Science and Applications, 8(6). https://doi.org/10.14569/IJACSA.2017.080659

Mavroeidis, V., Vishi, K., D., M., & Jøsang, A. (2018). The Impact of Quantum Computing on Present Cryptography. International Journal of Advanced Computer Science and Applications, 9(3), 405-414. https://doi.org/10.14569/ijacsa.2018.090354

Mewada, S., Sharma, P., & Gautam, S. (2016). Classification of Efficient Symmetric Key Cryptography Algorithms. International Journal of Computer Science and Information Security, 14(2). https://doi.org/10.13140/RG.2.2.30465.66402

Mohamad, M. S. A., Din, R., & Ahmad, J. I. (2021). Research trends review on RSA scheme of asymmetric cryptography techniques. Bulletin of Electrical Engineering and Informatics, 10(1), 487–492. https://doi.org/10.11591/eei.v10i1.2493

Praveena, A., & Smys, S. (2016). Efficient Cryptographic approach for Data Security in Wireless Sensor Networks using MES V-II. Proceedings of the 2016 10th International Conference on Intelligent Systems and Control (ISCO). Coimbatore, India: IEEE. https://doi.org/10.1109/ISCO.2016.7726911

Sharma, S., & Gupta, Y. (2017). Study on Cryptography and Techniques. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2(1), 249-252.

Sujatha, K., & Ramya, D. (2018). A Review Paper on Cryptography and Network Security. International Journal of Pure and Applied Mathematics, 119(17), 1279-1284.

Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A Review Paper on Network Security and Cryptography. Advances in Computational Sciences and Technology, 10(5), 763-770.

Ubaidullah, M., & Makki, Q. (2016). A review on symmetric key encryption techniques in cryptography. International Journal of Computer Applications, 147(10), 43-48. https://doi.org/10.5120/ijca2016911203

Downloads

Published

2021-07-14

How to Cite

Gan, A. (2021). Review on Cryptography Techniques in Network Security. Journal of ICT in Education, 8(1), 125–135. https://doi.org/10.37134/jictie.vol8.1.10.2021