CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

A Comparative Survey on Symmetric and Asymmetric key Encryption Techniques in cloud

عنوان مقاله: A Comparative Survey on Symmetric and Asymmetric key Encryption Techniques in cloud
شناسه ملی مقاله: CSITM02_183
منتشر شده در دومین همایش ملی مهندسی رایانه و مدیریت فناوری اطلاعات در سال 1394
مشخصات نویسندگان مقاله:

Mehrdad Babaei Baghbaderani - Department of Computer; Dolatabad Branch, Islamic Azad University, Isfahan, Iran
Reihaneh Khorsand Motlagh - Esfahani Department of Computer; Dolatabad Branch, Islamic Azad University, Isfahan, Iran
Mohammad Abbasi Hafshejani - Department of Computer; Dolatabad Branch, Islamic Azad University, Isfahan, Iran

خلاصه مقاله:
Encryption plays an important role in maintaining security and privacy of information in world today. The best way to protect personal data is using Encryption. Symmetric keyalgorithm and asymmetric key algorithm are two main types of encryption algorithm for information. Symmetric key algorithmis used more common and faster for data encryption. This article tries to compare both symmetric and asymmetric key algorithmsin network cloud [1]. Another type of encryption algorithm thatwill be referred in brief is hash encryption algorithm. Hash algorithm is a unidirectional encryption method and is used as a good way to keep track of data integration

کلمات کلیدی:
Symmetric key algorithms, DES, AES, Triple DES,BLOWFISH , Asymmetric Algorithms ,ECC, RSA

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/422944/