Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms

被引:0
|
作者
Yassein, Muneer Bani [1 ]
Aljawarneh, Shadi [1 ]
Qawasmeh, Ethar [1 ]
Mardini, Wail [1 ]
Khamayseh, Yaser [1 ]
机构
[1] Jordan Univ Sci & Technol, Irbid, Jordan
关键词
Cloud computing; Cryptography; Encryption; Decryption; private and public key encryption; AES; DES; 3DES; Blowfish; DSA; Elliptic Curve; Diffie-Hellman and RSA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing emerged in the last years to handle systems with large-scale services sharing between vast numbers of users. It provides enormous storage for data and computing power to users over the Internet. There are many issues with the high growth of data. Data security is one of the most important issues in cloud computing. There are many algorithms and implementation for data security. These algorithms provided various encryption methods. In this work, We present a comprehensive study between Symmetric key and Asymmetric key encryption algorithms that enhanced data security in cloud computing system. We discuss AES, DES, 3DES and Blowfish for symmetric encryption algorithms, and RSA, DSA, Diffie-Hellman and Elliptic Curve, for asymmetric encryption algorithms.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Email Authentication Using Symmetric and Asymmetric Key Algorithm Encryption
    Halim, Mohamad Azhar Abdul
    Wen, Chuah Chai
    Rahmi, Isredza
    Abdullah, Nurul Azma
    Rahman, Nurul Hidayah Ab.
    2ND INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2017 (ICAST'17), 2017, 1891
  • [2] Big-Key Symmetric Encryption: Resisting Key Exfiltration
    Bellare, Mihir
    Kane, Daniel
    Rogaway, Phillip
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 373 - 402
  • [3] A Comparison between Symmetric and Asymmetric Key Encryption Algorithm based Decryption Mixnets
    Ahmad, Sahan
    Alam, Kazi Md Rokibul
    Rahman, Habibur
    Tamura, Shinsuke
    2015 INTERNATIONAL CONFERENCE ON NETWORKING SYSTEMS AND SECURITY (NSYSS), 2015, : 194 - 198
  • [4] Study of Digital Signature with Encryption Based on Combined Symmetric Key
    Wu Suyan
    Li Wenbo
    Hu Xiangyi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1145 - +
  • [5] Enhanced Cloud Security Framework To Confirm Data Security on Asymmetric And Symmetric Key Encryption
    Jayapandian, N.
    Rahman, A. M. J. Md. Zubair
    Radhikadevi, S.
    Koushikaa, M.
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [6] Tree based symmetric key broadcast encryption
    Bhattacherjee, Sanjay
    Sarkar, Palash
    JOURNAL OF DISCRETE ALGORITHMS, 2015, 34 : 78 - 107
  • [7] Symmetric key encryption using wavelet transformation
    Srikumar, R
    Malarvizhi, CS
    PICS 2001: IMAGE PROCESSING, IMAGE QUALITY, IMAGE CAPTURE, SYSTEMS CONFERENCE, PROCEEDINGS, 2001, : 376 - 376
  • [8] Amortized Threshold Symmetric-key Encryption
    Christodorescu, Mihai
    Gaddam, Sivanarayana
    Mukherjee, Pratyay
    Sinha, Rohit
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2758 - 2779
  • [9] CHAKRA: A New Approach for Symmetric Key Encryption
    Kumar, P. Ramesh
    Dhenakaran, S. S.
    Sailaja, K. L.
    SaiKishore, P.
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 727 - 732
  • [10] DiSE: Distributed Symmetric-key Encryption
    Agrawal, Shashank
    Mohassel, Payman
    Mukherjee, Pratyay
    Rindal, Peter
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1993 - 2010