A. A. Adigun, O.I. Adigun, M.O. Abolarinwa, O.S. Bakare, S.O. Folorunso, S.O. Adebayo, A.I. Oladimeji
{"title":"高级加密标准系统对隐藏数据性能的审查","authors":"A. A. Adigun, O.I. Adigun, M.O. Abolarinwa, O.S. Bakare, S.O. Folorunso, S.O. Adebayo, A.I. Oladimeji","doi":"10.4314/dujopas.v10i2b.21","DOIUrl":null,"url":null,"abstract":"As the digital landscape continues to rapidly evolve, fueled by the proliferation of multimediaapplications, ensuring the security of data transmission has become a paramount concern.Cryptography emerges as a stalwart guardian in this dynamic environment, offering a robustapproach to safeguarding sensitive information. Despite significant strides in enhancing securityservices and processes over the years, the relentless march of technological progress demands a continual reassessment of strategies for protecting data in transit. Cryptography, with its ability totransform plaintext into ciphertext through encryption procedures, remains a cornerstone of moderndata security frameworks. This paper reviews a series of data security methods, focusing on theperformance of the Advanced Encryption Standard (AES) system in concealing data. A structuredapproach is employed to actualize the reviewed methods, with cryptographic techniques scrutinized inthe literature. Analysis is conducted to obtain reviewed literature, evaluating the strengths andlimitations of different cryptographic methods. The practical application of cryptography techniquesis assessed across various literatures, identifying potential implications for enhancing data security inthe modern digital environment. It is observed that encryption techniques are utilized to protect dataover the internet and other forms of data transmission, yet brute force methods can sometimes easilyidentify hidden data. This paper suggests that combining two or more algorithms can lead to betterdata security. Specifically, combining the AES algorithm with other algorithms such as Proxy reencryption, Honey encryption, and N-th degree Truncated Polynomial Ring Unit (NTRU) canenhance the data encryption and decryption process.","PeriodicalId":213779,"journal":{"name":"Dutse Journal of Pure and Applied Sciences","volume":" 3","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Review of the Advanced Encryption Standard System Performance on Hidden Data\",\"authors\":\"A. A. Adigun, O.I. Adigun, M.O. Abolarinwa, O.S. Bakare, S.O. Folorunso, S.O. Adebayo, A.I. Oladimeji\",\"doi\":\"10.4314/dujopas.v10i2b.21\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the digital landscape continues to rapidly evolve, fueled by the proliferation of multimediaapplications, ensuring the security of data transmission has become a paramount concern.Cryptography emerges as a stalwart guardian in this dynamic environment, offering a robustapproach to safeguarding sensitive information. Despite significant strides in enhancing securityservices and processes over the years, the relentless march of technological progress demands a continual reassessment of strategies for protecting data in transit. Cryptography, with its ability totransform plaintext into ciphertext through encryption procedures, remains a cornerstone of moderndata security frameworks. This paper reviews a series of data security methods, focusing on theperformance of the Advanced Encryption Standard (AES) system in concealing data. A structuredapproach is employed to actualize the reviewed methods, with cryptographic techniques scrutinized inthe literature. Analysis is conducted to obtain reviewed literature, evaluating the strengths andlimitations of different cryptographic methods. The practical application of cryptography techniquesis assessed across various literatures, identifying potential implications for enhancing data security inthe modern digital environment. It is observed that encryption techniques are utilized to protect dataover the internet and other forms of data transmission, yet brute force methods can sometimes easilyidentify hidden data. This paper suggests that combining two or more algorithms can lead to betterdata security. Specifically, combining the AES algorithm with other algorithms such as Proxy reencryption, Honey encryption, and N-th degree Truncated Polynomial Ring Unit (NTRU) canenhance the data encryption and decryption process.\",\"PeriodicalId\":213779,\"journal\":{\"name\":\"Dutse Journal of Pure and Applied Sciences\",\"volume\":\" 3\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Dutse Journal of Pure and Applied Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4314/dujopas.v10i2b.21\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Dutse Journal of Pure and Applied Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4314/dujopas.v10i2b.21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Review of the Advanced Encryption Standard System Performance on Hidden Data
As the digital landscape continues to rapidly evolve, fueled by the proliferation of multimediaapplications, ensuring the security of data transmission has become a paramount concern.Cryptography emerges as a stalwart guardian in this dynamic environment, offering a robustapproach to safeguarding sensitive information. Despite significant strides in enhancing securityservices and processes over the years, the relentless march of technological progress demands a continual reassessment of strategies for protecting data in transit. Cryptography, with its ability totransform plaintext into ciphertext through encryption procedures, remains a cornerstone of moderndata security frameworks. This paper reviews a series of data security methods, focusing on theperformance of the Advanced Encryption Standard (AES) system in concealing data. A structuredapproach is employed to actualize the reviewed methods, with cryptographic techniques scrutinized inthe literature. Analysis is conducted to obtain reviewed literature, evaluating the strengths andlimitations of different cryptographic methods. The practical application of cryptography techniquesis assessed across various literatures, identifying potential implications for enhancing data security inthe modern digital environment. It is observed that encryption techniques are utilized to protect dataover the internet and other forms of data transmission, yet brute force methods can sometimes easilyidentify hidden data. This paper suggests that combining two or more algorithms can lead to betterdata security. Specifically, combining the AES algorithm with other algorithms such as Proxy reencryption, Honey encryption, and N-th degree Truncated Polynomial Ring Unit (NTRU) canenhance the data encryption and decryption process.