CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges

عنوان مقاله: Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges
شناسه ملی مقاله: JR_JCR-16-2_005
منتشر شده در در سال 1402
مشخصات نویسندگان مقاله:

Yashar Salami - Department of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran
Vahid Khajevand - Department of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran
Esmaeil Zeinali - Department of Computer and Information TechnologyEngineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran

خلاصه مقاله:
Information security has become an important issue in the modern world due to its increasing popularity in Internet commerce and communication technologies such as the Internet of Things. Future media actors are considered a threat to security. Therefore, the need to use different levels of information security in different fields is more needed. Advanced information security methods are vital to prevent this type of threat. Cryptography is a valuable and efficient component for the safe transfer or storage of information in the cyber world. Familiarity with all types of encryption models is an essential need for cybersecurity experts. This paper separates Cryptographic algorithms into symmetric (SYM) and asymmetric (ASYM) categories based on the type of cryptographic structure. SYM algorithms mostly use the Feistel network (FN) structure, Substitution-Permutation Network (SPN), and the ASYM algorithms follow the mathematical structures. Based on this, we examined different encryption methods in terms of performance and detailed comparison of key size, block size, and the number of rounds. In continuation of the weakness of each algorithm against attacks and open challenges in each category, to study more is provided.

کلمات کلیدی:
Cryptography, Security, Algorithms

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/1875227/