密码学技术综述与分析

Samya Al Busafi, B. Kumar
{"title":"密码学技术综述与分析","authors":"Samya Al Busafi, B. Kumar","doi":"10.1109/SMART50582.2020.9336792","DOIUrl":null,"url":null,"abstract":"Recently, there has been a significant increase in the number of Internet users. Thus, digital data has occupied the highest rank in our time, because most companies and governments adopt the total dependence for the transmission of their data transactions with customers and banking transactions over the World Wide Web. Therefore, total reliance on digital data needs to secure this data and preserve it from theft and modification in order to reach the intended user intact without distortion, and this is done by securing this data using encryption with its various techniques. There are many technologies that encrypt the data sent to the receiving party called encryption techniques. This research will examine the analysis of different encryption techniques, for example, symmetric cryptography technique and asymmetric cryptography techniques, Rivest Shamir and Adleman, Diffie-Hellman, Digital Signature Algorithm, (ECC) Elliptic curve cryptography, and how can employ them and explore the best methods of cryptography techniques that give complete confidential and transmitted data.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Review and Analysis of Cryptography Techniques\",\"authors\":\"Samya Al Busafi, B. Kumar\",\"doi\":\"10.1109/SMART50582.2020.9336792\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, there has been a significant increase in the number of Internet users. Thus, digital data has occupied the highest rank in our time, because most companies and governments adopt the total dependence for the transmission of their data transactions with customers and banking transactions over the World Wide Web. Therefore, total reliance on digital data needs to secure this data and preserve it from theft and modification in order to reach the intended user intact without distortion, and this is done by securing this data using encryption with its various techniques. There are many technologies that encrypt the data sent to the receiving party called encryption techniques. This research will examine the analysis of different encryption techniques, for example, symmetric cryptography technique and asymmetric cryptography techniques, Rivest Shamir and Adleman, Diffie-Hellman, Digital Signature Algorithm, (ECC) Elliptic curve cryptography, and how can employ them and explore the best methods of cryptography techniques that give complete confidential and transmitted data.\",\"PeriodicalId\":129946,\"journal\":{\"name\":\"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SMART50582.2020.9336792\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMART50582.2020.9336792","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

最近,互联网用户的数量有了显著的增长。因此,数字数据在我们这个时代占据了最高的地位,因为大多数公司和政府完全依赖于通过万维网传输他们与客户的数据交易和银行交易。因此,完全依赖数字数据需要保护这些数据,防止其被盗和修改,以便完好无损地到达预期用户,这是通过使用各种技术加密来保护这些数据来实现的。有许多技术对发送给接收方的数据进行加密,称为加密技术。本研究将分析不同的加密技术,例如对称加密技术和非对称加密技术,Rivest Shamir和Adleman, Diffie-Hellman,数字签名算法,(ECC)椭圆曲线加密,以及如何使用它们,并探索提供完整机密和传输数据的加密技术的最佳方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Review and Analysis of Cryptography Techniques
Recently, there has been a significant increase in the number of Internet users. Thus, digital data has occupied the highest rank in our time, because most companies and governments adopt the total dependence for the transmission of their data transactions with customers and banking transactions over the World Wide Web. Therefore, total reliance on digital data needs to secure this data and preserve it from theft and modification in order to reach the intended user intact without distortion, and this is done by securing this data using encryption with its various techniques. There are many technologies that encrypt the data sent to the receiving party called encryption techniques. This research will examine the analysis of different encryption techniques, for example, symmetric cryptography technique and asymmetric cryptography techniques, Rivest Shamir and Adleman, Diffie-Hellman, Digital Signature Algorithm, (ECC) Elliptic curve cryptography, and how can employ them and explore the best methods of cryptography techniques that give complete confidential and transmitted data.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信