Classification of Cryptography

Classification of Cryptography

Source publication
Article
Full-text available
This paper discusses several important algorithms used for the encryption and decryption of data in all fields, to make a comparative study for most important algorithms in terms of speed (implementation) and security (special keys) determine whether an encryption algorithm is good. What is more, computational resources, such memory (RAM) size, are...

Contexts in source publication

Context 1
... steps are involved: generation of public/private key pair, encrypting the plain text (data) into ciphertext (data), and decrypting the data to generate the original text. The following diagram explains the steps followed; Figure 13. RSA Encryption Algorithm ...
Context 2
... steps are involved: generation of public/private key pair, encrypting the plain text (data) into ciphertext (data), and decrypting the data to generate the original text. The following diagram explains the steps followed; Figure 13. RSA Encryption Algorithm ...

Similar publications

Article
Full-text available
For a smart cloud computing system, security and privacy are the required factors. In recent days, the evolvement of cloud technology is immense, according to which several cloud service providers (CSPs) evolved. Each CSP has its infrastructure with its security policies. Even though still the security in cloud computing is an existing challenge, i...
Article
Full-text available
Information security plays a significant role in information society. Cryptography is a key proof of concept to increasing the security of information assets and has been deployed in various algorithms. Among cryptography algorithms is Extended Tiny Encryption Algorithm. This study aims to describe a recent Android Apps to realize XTEA Cryptography...
Article
Full-text available
Due to the growth of transferring and sharing information between entities, an efficient security model is needed to protect secret information while storing or transferring over unsecured network systems. Symmetric cryptography algorithms could be used to secure information; they are immune from many kinds of attack but their main weakness is the...

Citations

... In a survey conducted by Yegireddi and Kumar [11] Although AES and Blowfish have flexible key structures, they are the only algorithms that provide speed and security when compared to more popular traditional encryption approaches. Extensive research on both symmetric and asymmetric cryptography algorithms has resulted in numerous studies aimed at enhancing and improving them [5], [12], [13]. Table 1 specifically highlights selected works focusing on these algorithms, particularly those relevant to the problem under study. ...
Article
Full-text available
Nowadays, cybersecurity has grown into a more significant and difficult scientific issue. The recognition of threats and attacks meant for knowledge and safety on the internet is growing harder to detect. Since cyber security guarantees the privacy and security of data sent via the Internet, it is essential, while also providing protection against malicious attacks. Thanks to that, encrypt has grown into an answer that has become an essential element of information security systems. For securing shared data, multiple approaches are needed. The most common prevent and stream cryptography methods and algorithms, associated with their encoding, decrypt times, and throughputs (speeds), are discussed in this work: AES, Blowfish, Twofish, Salsa20 and ChaCha20 were studied. research using different types of images. The productivity of each method is assessed in this study utilizing the following parameters: process time and speed. This article analyzes and compares several symmetric key ciphers (AES, Blowfish, Twofish, Salsa20 and ChaCha20) are based on time-based encoding and decoding of visuals generated utilizing Java as the main programming platform.
... In a survey conducted by Yegireddi and Kumar [11] Although AES and Blowfish have flexible key structures, they are the only algorithms that provide speed and security when compared to more popular traditional encryption approaches. Extensive research on both symmetric and asymmetric cryptography algorithms has resulted in numerous studies aimed at enhancing and improving them [5], [12], [13]. Table 1 specifically highlights selected works focusing on these algorithms, particularly those relevant to the problem under study. ...
Article
Full-text available
Nowadays, cybersecurity has grown into a more significant and dif-ficult scientific issue. The recognition of threats and attacks meant forknowledge and safety on the internet is growing harder to detect. Since cyber-security guarantees the privacy and security of data sent via the Internet, it isessential, while also providing protection against malicious attacks. Encrypthas grown into an answer that has become an essential element of informationsecurity systems. To ensure the security of shared data, including text, images,or videos, it is essential to employ various methods and strategies. This studydelves into the prevalent cryptographic methods and algorithms utilized forprevention and stream encryption, examining their encoding techniques suchas advanced encryption standard (AES), Blowfish, Twofish, Salsa20, andChaCha20. The primary objective of this research is to identify the optimaltimes and throughputs (speeds) for data encryption and decryption processes.The methodology of this study involved selecting five distinct types of imagesto compare the outcomes of the techniques evaluated in this research. The as-sessment focused on processing time and speed parameters, examining visualencoding and decoding using Java as the primary platform. A comparativeanalysis of several symmetric key ciphers was performed, focusing on han-dling large datasets. Despite this limitation, comparing different images helpedevaluate the techniques' novelty. The results showed that ChaCha20 had thebest average time for both encryption and decryption, being over 50% fasterthan some other algorithms. However, the Twofish algorithm had lowerthroughput during testing. The paper concludes with findings and suggestionsfor future improvements. (2) (PDF) Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption. Available from: https://www.researchgate.net/publication/381224600_Comparative_Analysis_of_AES_Blowfish_Twofish_Salsa20_and_ChaCha20_for_Image_Encryption [accessed Jun 13 2024].
... 2. Confidentiality is making sure that the sensitive content of the message is private and cannot be seen unless by authorized users, otherwise if the information is breached by unauthorized users, it should be undecipherable and not understandable to protect the security of the message [9]. ...
... 3. Integrity is ensuring that the information that cryptology is being applied on remains unchanged, which means that the message should be the same format and content at the sender and the recipient. Furthermore, the encryption algorithm used should be able to maintain the content of the message and not change the meaning of it [9]. ...
... 5. Non-repudiation is keeping logs of every action done to make sure that a person is always held accountable for any action that happens, so that if any malicious action occurs it can be traced back to the person who did it with the specific privileges [9]. ...
Thesis
Full-text available
Nowadays, the need for secure image transmission is at an all-time high due to the excessive volume of messages with images sent every day. Therefore, the importance of securing these images has generated demand to research image encryption techniques that will save the integrity of the image as well as protect it. In this paper, after a thorough background review is discussed, an image encryption scheme that utilizes 3 encryption techniques is proposed. The first step incorporates the use of Jigsaw Transform to introduce confusion to the scheme, then DNA Coding and Chaos theory are used in the subsequent steps to provide diffusion for the scheme and to finally obtain the encrypted image. Multiple evaluation metrics are introduced to assess the performance of the proposed image encryption framework.
... Brute force attack to use all possible key combinations maybe [10]. [11]. ...
... Another use of RSA is the secure key exchange between two parties in symmetric encryption to ensure that the secret key is not acquired by malicious third parties [12]. [11]. ...
... Out [11] = {1,1,1,0,0,0,0,1,1,1,....,0,0,1,1,1,1,1,1} In the next few lines, an XOR operation is applied between the key obtained from sine logistic function and the bit-stream of the image's pixels. The result will then be converted into an image form to display the encrypted image. ...
Thesis
Full-text available
Image encryption has gained significant traction due to the rapid development of network communication, particularly in the context of the unique nature of images. The encryption techniques used for images differ greatly from traditional techniques employed for texts or files. Similarly, the widespread adoption of the Internet of Things (loT) by numerous organizations has introduced a new and urgent security risk, as it enables remote and easy transmission of various types of data between authorized users. In this thesis, cryptography techniques are discussed with a focus on image encryption techniques currently employed. The thesis examines the current state of the art by exploring techniques proposed in recent papers as well. This thesis then proposes an image encryption technique tailored for IoT and real-time applications utilizing the Lorenz chaotic system, then the proposed artifact is evaluated using common evaluation metrics from the literature. Finally, the findings are displayed, compared with example findings from the literature, and analyzed to determine if the thesis objectives were met
... Data can be encapsulated through all these techniques, but such mechanisms are unreliable for cloud networks. If an attacker uses cryptanalysis, the key can be easily obtained, which is a data [17] integrated several symmetric and asymmetric methods to assess the effectiveness of various cryptographic algorithms. After gathering the methods, the uniqueness of each one was evaluated, and it was then debated which method was best for data security. ...
... A hybrid algorithm was created by academics who tweaked existing algorithms. M. A. Al-Shabi [17] reviewed cryptographic algorithms, compared their methodologies, and found that symmetric algorithms are more secure and reliable than asymmetric ones. This research compared the algorithms, and the best strategies were presented. ...
Article
Full-text available
Citation: Zahra, S.W.; Nadeem, M.; Arshad, A.; Riaz, S.; Ahmed, W.; Abu Bakr, M.; Alabrah, A. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks. Symmetry 2024, 16, 605. https://doi. Abstract: Researchers have created cryptography algorithms that encrypt data using a public or private key to secure it from intruders. It is insufficient to protect the data by using such a key. No research article has identified an algorithm capable of protecting both the data and the associated key, nor has any mechanism been developed to determine whether access to the data is permissible or impermissible based on the authentication of the key. This paper presents a WEDEx-Kerberotic Framework for data protection, in which a user-defined key is firstly converted to a cipher key using the "Secure Words on Joining Key (SWJK)" algorithm. Subsequently, a WEDEx-Kerberotic encryption mechanism is created to protect the data by encrypting it with the cipher key. The first reason for making the WEDEx-Kerberotic Framework is to convert the user-defined key into a key that has nothing to do with the original key, and the length of the cipher key is much shorter than the original key. The second reason is that each ciphertext and key value are interlinked. When an intruder utilizes the snatching mechanism to obtain data, the attacker obtains data or a key unrelated to the original data. No matter how efficient the algorithm is, an attacker cannot access the data when these methods and algorithms are used to protect it. Finally, the proposed algorithm is compared to the previous approaches to determine the uniqueness of the algorithm and assess its superiority to the previous algorithms.
... Network security protection measures, including firewalls, access control mechanisms, virtual private networks (VPNs), and cryptographic techniques, aim to safeguard computer networks against unauthorized access, cyber attacks, and data breaches, while ensuring the security of data and communications. Cryptographic techniques, a notable example of such measures [15][16][17][18][19], play a crucial role in providing mechanisms for data confidentiality, integrity, and authenticity during transit and storage. Traditionally, security measures and strategies have been crafted and managed by domain experts [20]. ...
Article
Full-text available
In today’s intricate information technology landscape, the escalating complexity of computer networks is accompanied by a myriad of malicious threats seeking to compromise network components. To address these security challenges, we propose an approach that synergizes reinforcement learning and deep neural networks. Our method involves training autonomous cyber-agents to strategically attack network nodes, aiming to expose vulnerabilities and extract confidential information. We employ various off-policy deep reinforcement learning algorithms, including deep Q-network (DQN), double DQN, and dueling DQN, to train and evaluate these agents within two enterprise simulation networks provided by Microsoft. The simulations, modeled as Markov games between attack and defense, exclude human intervention. Results demonstrate that agents trained by double DQN and dueling DQN surpass baseline agents trained using traditional reinforcement learning and DQN methods. This approach not only enhances our understanding of network vulnerabilities but also lays the groundwork for future efforts to fortify computer network defense and security.
... The AES encryption algorithm was chosen in this study because the AES encryption algorithm is considered to have high speed and strength in the encryption and decryption process [13]. In addition, the AES algorithm is a symmetrical algorithm that is quite safe now compared to other algorithms [14]. These factors are balanced with information needs that can exchange information efficiently and effectively because in exchanging information, speed is a crucial factor [15]. ...
... Using the cloud securely is crucial to safeguarding the cloud computing infrastruc-ture, applications, and data. Different technologies and strategies provide security [8]. Data is kept in the Cloud on a remote, independently managed storage system. ...
Article
Full-text available
The idea of cloud computing makes it possible to create a shared pool of reconfigurable computing resources (such servers, networks, storage, apps, and services) that can be released and deployed quickly with no administrative effort or communication with service providers. When data is stored in a remote data center, maintaining data security is essential. This can be achieved by encryption. Through the process of encryption, data is changed so that unauthorized users cannot read it.The proposed system uses a new encryption technique that is based on the mathematical properties of the data. The proposed system is more secure than traditional encryption techniques because it utilizes the mathematical properties of the data. It is also more efficient because it doesn't require as much computation as traditional encryption techniques, meaning that less computation is needed.
... In Figure 2, it explains the security of messages using this algorithm depending on the key, if the key is known by someone else then that person can encrypt and decrypt the message. Asymmetric cryptography algorithms are algorithms that use different keys for the encryption and decryption processes [24]. Figure 3 explains the asymmetric cryptography algorithm, also known as the public key algorithm, because the key for encryption is public (public key) or can be known by everyone, but the key for decryption can only be known by authorized people who know it with the encoded data. ...
... Encryption is a critical approach enforced to secure data. Data encryption focuses on transforming an initial plaintext file or data into a string of unreadable code using some algorithms called ciphertext [5]. Encryption is classified into symmetric encryption and asymmetric encryption. ...
... Encryption is classified into symmetric encryption and asymmetric encryption. Symmetric encryption involves using a secret key in data encryption and decryption [5]. Asymmetrical encryption consists of a pair of keys, a public key that can be disclosed to others to decrypt files and a private key used for decrypting the ciphertext [5]. ...
... Symmetric encryption involves using a secret key in data encryption and decryption [5]. Asymmetrical encryption consists of a pair of keys, a public key that can be disclosed to others to decrypt files and a private key used for decrypting the ciphertext [5]. Any entity owning a public key can employ it to send a message, unlike a private key that remains secret and is used in decrypting a message, an aspect that advances security. ...
Article
Full-text available
Among the critical aspects directly linked to technology evolvement is cloud computing. Over the years, the amount of data among people and businesses has been growing, posing a challenge to its storage and management. To help address this issue, tech professionals and companies have attempted to find a secure, reliable, trusted, and user-friendly solution to data storage and management, among such solutions being cloud computing. Storing data in the cloud promotes on-demand services and intense applications boosted by a secured system of configurable computing resources. However, before a user decides to outsource personal data to the cloud, it must be protected by integrating distinct data encryption techniques. Data encryption is essential in advancing the security of any data that users store in cloud storage. Data encryption is classified into symmetric encryption and asymmetric encryption.