DES, AES, RSA加密标准综述

Aljaafari Hamza, B. Kumar
{"title":"DES, AES, RSA加密标准综述","authors":"Aljaafari Hamza, B. Kumar","doi":"10.1109/SMART50582.2020.9336800","DOIUrl":null,"url":null,"abstract":"Cryptography is wide domain with many subs. The objective of this review paper is to give light review for readers and students of the three common used algorithm two in symmetric cryptography DES, AES and one in asymmetric cryptography RSA. Allowing the reader to have simple understanding of the background history of the algorithm in review and the key functional cipher operation of the algorithm. Accordingly summary of strength and weakness of each algorithm under the review will be highlighted. And how the security goals is such confidentiality and integrity are achieve using the mentioned algorithms. The paper will sequentially list and review the said algorithms and clarify the relational between them. Such as the relation between the symmetric and asymmetric algorithm the one with secret key and the ones with key pairs. The paper may insight some of the research window for upcoming scholar research in the field of cryptography.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"A Review Paper on DES, AES, RSA Encryption Standards\",\"authors\":\"Aljaafari Hamza, B. Kumar\",\"doi\":\"10.1109/SMART50582.2020.9336800\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptography is wide domain with many subs. The objective of this review paper is to give light review for readers and students of the three common used algorithm two in symmetric cryptography DES, AES and one in asymmetric cryptography RSA. Allowing the reader to have simple understanding of the background history of the algorithm in review and the key functional cipher operation of the algorithm. Accordingly summary of strength and weakness of each algorithm under the review will be highlighted. And how the security goals is such confidentiality and integrity are achieve using the mentioned algorithms. The paper will sequentially list and review the said algorithms and clarify the relational between them. Such as the relation between the symmetric and asymmetric algorithm the one with secret key and the ones with key pairs. The paper may insight some of the research window for upcoming scholar research in the field of cryptography.\",\"PeriodicalId\":129946,\"journal\":{\"name\":\"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SMART50582.2020.9336800\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMART50582.2020.9336800","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

摘要

密码学是一个涉及面很广的学科。本文的目的是为读者和学生提供三种常用算法的简要回顾,其中两种在对称密码学中DES, AES和一种在非对称密码学中RSA。让读者对回顾算法的背景历史和算法的关键功能密码操作有一个简单的了解。相应的,我们将重点总结每一种算法的优缺点。以及如何使用上述算法来实现机密性和完整性等安全目标。本文将依次列出和回顾上述算法,并阐明它们之间的关系。例如对称算法和非对称算法之间的关系,带密钥算法和带密钥对算法之间的关系。本文为今后密码学领域的学者研究提供了一些研究窗口。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Review Paper on DES, AES, RSA Encryption Standards
Cryptography is wide domain with many subs. The objective of this review paper is to give light review for readers and students of the three common used algorithm two in symmetric cryptography DES, AES and one in asymmetric cryptography RSA. Allowing the reader to have simple understanding of the background history of the algorithm in review and the key functional cipher operation of the algorithm. Accordingly summary of strength and weakness of each algorithm under the review will be highlighted. And how the security goals is such confidentiality and integrity are achieve using the mentioned algorithms. The paper will sequentially list and review the said algorithms and clarify the relational between them. Such as the relation between the symmetric and asymmetric algorithm the one with secret key and the ones with key pairs. The paper may insight some of the research window for upcoming scholar research in the field of cryptography.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信