Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms

被引:0
|
作者
Yassein, Muneer Bani [1 ]
Aljawarneh, Shadi [1 ]
Qawasmeh, Ethar [1 ]
Mardini, Wail [1 ]
Khamayseh, Yaser [1 ]
机构
[1] Jordan Univ Sci & Technol, Irbid, Jordan
关键词
Cloud computing; Cryptography; Encryption; Decryption; private and public key encryption; AES; DES; 3DES; Blowfish; DSA; Elliptic Curve; Diffie-Hellman and RSA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing emerged in the last years to handle systems with large-scale services sharing between vast numbers of users. It provides enormous storage for data and computing power to users over the Internet. There are many issues with the high growth of data. Data security is one of the most important issues in cloud computing. There are many algorithms and implementation for data security. These algorithms provided various encryption methods. In this work, We present a comprehensive study between Symmetric key and Asymmetric key encryption algorithms that enhanced data security in cloud computing system. We discuss AES, DES, 3DES and Blowfish for symmetric encryption algorithms, and RSA, DSA, Diffie-Hellman and Elliptic Curve, for asymmetric encryption algorithms.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Symmetric-Key Homomorphic Encryption for Encrypted Data Processing
    Chan, Aldar C-F.
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 774 - 778
  • [32] Security analysis and new models on the intelligent symmetric key encryption
    Zhou, Lu
    Chen, Jiageng
    Zhang, Yidan
    Su, Chunhua
    James, Marino Anthony
    COMPUTERS & SECURITY, 2019, 80 : 14 - 24
  • [33] Symmetric key image encryption using chaotic Rossler system
    Mandal, Mrinal K.
    Kar, Madhumita
    Singh, Sandesh K.
    Barnwal, Vivek K.
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2145 - 2152
  • [34] DNA Image Encryption Using Modified Symmetric Key (MSK)
    Ochani, Arti
    Jadhav, Dipti
    Gulwani, Reshma
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 465 - 468
  • [35] Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm
    Geetha, R.
    Padmavathy, T.
    Thilagam, T.
    Lallithasree, A.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (01) : 21 - 36
  • [36] A Symmetric-Key Broadcast Encryption Scheme with Shorter Transmissions
    Wang, Shyh-Yih
    Yang, Wu-Chuan
    Tzeng, Show-Shiow
    IEEE INTERNATIONAL SYMPOSIUM ON NEXT-GENERATION ELECTRONICS 2013 (ISNE 2013), 2013,
  • [37] Security technologies on image information (6); symmetric key encryption
    Watanabe, Dai
    Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, 2015, 69 (07): : 553 - 559
  • [38] A Novel Symmetric Key Encryption Technique using Cellular Automata
    Parashar, Deepika
    Roy, Satyabrata
    Jain, Vipin
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 174 - 178
  • [39] Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm
    R. Geetha
    T. Padmavathy
    T. Thilagam
    A. Lallithasree
    Wireless Personal Communications, 2020, 112 : 21 - 36
  • [40] Secure Symmetric Key Fuzzy Identity-Based Encryption
    Liu, Pengtao
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2665 - 2668