{"title":"密码算法的关键分析","authors":"Mazoon AlRoubiei, Thuraiya AlYarubi, B. Kumar","doi":"10.1109/ISDFS49300.2020.9116213","DOIUrl":null,"url":null,"abstract":"Security is the most important role in data communication due to the increase of the intruder’s possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via preventing disclosure of the communication where the data are converted from a readable form into an unreadable form and vice versa. The cryptography algorithm has two types namely: Symmetric key and Asymmetric key. Asymmetric key algorithm mainly invented to overcome the dilemma of key distribution in symmetric key. There are several algorithms classified under these two types based on different parameters. Hence, this variation leads to different levels of performance and efficiency of these algorithms. This paper presents a critical analysis of these systems based on a detailed study and literature review of some cryptography algorithms.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Critical Analysis of Cryptographic Algorithms\",\"authors\":\"Mazoon AlRoubiei, Thuraiya AlYarubi, B. Kumar\",\"doi\":\"10.1109/ISDFS49300.2020.9116213\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security is the most important role in data communication due to the increase of the intruder’s possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via preventing disclosure of the communication where the data are converted from a readable form into an unreadable form and vice versa. The cryptography algorithm has two types namely: Symmetric key and Asymmetric key. Asymmetric key algorithm mainly invented to overcome the dilemma of key distribution in symmetric key. There are several algorithms classified under these two types based on different parameters. Hence, this variation leads to different levels of performance and efficiency of these algorithms. This paper presents a critical analysis of these systems based on a detailed study and literature review of some cryptography algorithms.\",\"PeriodicalId\":221494,\"journal\":{\"name\":\"2020 8th International Symposium on Digital Forensics and Security (ISDFS)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 8th International Symposium on Digital Forensics and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS49300.2020.9116213\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS49300.2020.9116213","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security is the most important role in data communication due to the increase of the intruder’s possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via preventing disclosure of the communication where the data are converted from a readable form into an unreadable form and vice versa. The cryptography algorithm has two types namely: Symmetric key and Asymmetric key. Asymmetric key algorithm mainly invented to overcome the dilemma of key distribution in symmetric key. There are several algorithms classified under these two types based on different parameters. Hence, this variation leads to different levels of performance and efficiency of these algorithms. This paper presents a critical analysis of these systems based on a detailed study and literature review of some cryptography algorithms.