Key Cryptographic Methods in the Cloud: A Comparative Study

Vikas Yadav, M. Kumar
{"title":"Key Cryptographic Methods in the Cloud: A Comparative Study","authors":"Vikas Yadav, M. Kumar","doi":"10.1109/ICCT56969.2023.10076165","DOIUrl":null,"url":null,"abstract":"With cloud computing becoming an inseparable part of human daily life and making its way in every field of technology during the last decade with smarter human generation and adoption of new data policies, data security has become a significant pillar of trust. The standard of data security ensures the quality of privacy while availing various services over the internet. To achieve a step forward against always developing exploiters various algorithms have been developed which come under the wing of cryptography. Cryptography is the branch that ensures confidentiality, integrity, authentication, privacy, and security of the data of a consumer. This paper has dis-cussed and analyzed DES, triple DES, Blowfish, AES, IDEA, RC4, RSA, and ECC cryptography algorithms based on their ability of key size, block size, encryption time, decryption time, and total time in the Node JavaScript environment. Since, JavaScript powers 80% of the internet, this paper provides a production-level real-world analysis of various algorithms at present time.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT56969.2023.10076165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With cloud computing becoming an inseparable part of human daily life and making its way in every field of technology during the last decade with smarter human generation and adoption of new data policies, data security has become a significant pillar of trust. The standard of data security ensures the quality of privacy while availing various services over the internet. To achieve a step forward against always developing exploiters various algorithms have been developed which come under the wing of cryptography. Cryptography is the branch that ensures confidentiality, integrity, authentication, privacy, and security of the data of a consumer. This paper has dis-cussed and analyzed DES, triple DES, Blowfish, AES, IDEA, RC4, RSA, and ECC cryptography algorithms based on their ability of key size, block size, encryption time, decryption time, and total time in the Node JavaScript environment. Since, JavaScript powers 80% of the internet, this paper provides a production-level real-world analysis of various algorithms at present time.
云中的密钥加密方法:比较研究
随着云计算成为人类日常生活中不可分割的一部分,并在过去十年中随着更智能的人类一代和新数据策略的采用,在每个技术领域取得了进展,数据安全已成为信任的重要支柱。数据安全标准确保了在互联网上使用各种服务时的隐私质量。为了对抗不断发展的漏洞利用者,已经开发了各种算法,这些算法都属于密码学的范畴。密码学是确保消费者数据的机密性、完整性、身份验证、隐私性和安全性的分支。本文根据DES、triple DES、Blowfish、AES、IDEA、RC4、RSA、ECC等加密算法在Node JavaScript环境下的密钥大小、块大小、加密时间、解密时间、总时间等能力,对其进行了讨论和分析。由于JavaScript为80%的互联网提供动力,因此本文提供了目前各种算法的生产级实际分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信