A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges

被引:1
作者
Ramakrishna, Donagani [1 ]
Shaik, Mohammed Ali [1 ]
机构
[1] SR Univ, Warangal 506371, Telangana, India
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Security; Encryption; Cryptography; Internet of Things; Three-dimensional displays; Digital images; Chaotic communication; Hardware; Elliptic curve cryptography; Computer crime; Advanced encryption standard; blowfish; chaotic cryptography; cryptanalysis; denial of service attack; hash functions; RSA algorithm; data integrity; HARDWARE ARCHITECTURE; IMPLEMENTATION;
D O I
10.1109/ACCESS.2024.3518533
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. These algorithms include DES, 3DES, AES, blowfish, two-fish, RC4, one-time pad, RSA, ECC, Diffie-Hellman, MD5, and SHA-256. To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. The assessment also examines known flaws and prospective attacks for each algorithm and highlights current methods and future research gaps. This study provides valuable information on the advantages and disadvantages of different algorithms using a detailed diagram that summarizes the performance outcomes based on secrecy, integrity, and security. In addition, each algorithm's issues are covered in the review, giving readers a clear grasp of their limitations and possible areas for future research.
引用
收藏
页码:11576 / 11593
页数:18
相关论文
共 114 条
  • [1] A hybrid chaotic blowfish encryption for high-resolution satellite imagery
    Abbas, Syed Zeeshan
    Ibrahim, Haroon
    Khan, Majid
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (17) : 26069 - 26091
  • [2] Addagarla S.K., 2020, IJATCSE, V9, P4402, DOI [10.30534/ijatcse/2020/33942020, DOI 10.30534/IJATCSE/2020/33942020]
  • [3] Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
    Adeniyi, Abidemi Emmanuel
    Misra, Sanjay
    Daniel, Eniola
    Bokolo, Anthony, Jr.
    [J]. ALGORITHMS, 2022, 15 (10)
  • [4] Al-Badrei H. H., 2021, Adv. Mech., V9, P1467
  • [5] Isolation and characterisation of symmetrical C60Me6, C60Me5Cl and C60Me5O2OH, together with unsymmetrical C60Me5O3H, C60Me5OOH, C60Me4PhO2OH, and C60Me12;: fragmentation of methylfullerenols to C58
    Al-Matar, H
    Abdul-Sada, AK
    Avent, AG
    Fowler, PW
    Hitchcock, PB
    Rogers, KM
    Taylor, R
    [J]. JOURNAL OF THE CHEMICAL SOCIETY-PERKIN TRANSACTIONS 2, 2002, (01): : 53 - 58
  • [6] Al-Shareeda M. A., 2023, Informatica, V47, P110, DOI [10.31449/inf.v47i1.4463, DOI 10.31449/INF.V47I1.4463]
  • [7] Al-Smadi A M., 2021, International Journal of Electrical and Computer Engineering (IJECE), P11, DOI [10.11591/ijece.v11i3.pp2335-2342, DOI 10.11591/IJECE.V11I3.PP2335-2342]
  • [8] Implementation of Bluetooth Secure Simple Pairing (SSP) using Elliptic Curve Cryptography (ECC)
    Alfarjat, Ahmad Hweishel A.
    Hanumanthappa, J.
    Hamatta, Hatem S. A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (03): : 60 - 70
  • [9] A SHA-256 Hybrid-Redundancy Hardware Architecture for Detecting and Correcting Errors
    Algredo-Badillo, Ignacio
    Morales-Sandoval, Miguel
    Medina-Santiago, Alejandro
    Hernandez-Gracidas, Carlos Arturo
    Lobato-Baez, Mariana
    Morales-Rosales, Luis Alberto
    [J]. SENSORS, 2022, 22 (13)
  • [10] An efficient cryptographic technique using modified Diffie-Hellman in wireless sensor networks
    Ali, Shahwar
    Humaria, A.
    Ramzan, M. Sher
    Khan, Imran
    Saqlain, Syed M.
    Ghani, Anwar
    Zakia, J.
    Alzahrani, Bander A.
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (06):