Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms

被引:0
作者
Yassein, Muneer Bani [1 ]
Aljawarneh, Shadi [1 ]
Qawasmeh, Ethar [1 ]
Mardini, Wail [1 ]
Khamayseh, Yaser [1 ]
机构
[1] Jordan Univ Sci & Technol, Irbid, Jordan
来源
2017 INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICET) | 2017年
关键词
Cloud computing; Cryptography; Encryption; Decryption; private and public key encryption; AES; DES; 3DES; Blowfish; DSA; Elliptic Curve; Diffie-Hellman and RSA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing emerged in the last years to handle systems with large-scale services sharing between vast numbers of users. It provides enormous storage for data and computing power to users over the Internet. There are many issues with the high growth of data. Data security is one of the most important issues in cloud computing. There are many algorithms and implementation for data security. These algorithms provided various encryption methods. In this work, We present a comprehensive study between Symmetric key and Asymmetric key encryption algorithms that enhanced data security in cloud computing system. We discuss AES, DES, 3DES and Blowfish for symmetric encryption algorithms, and RSA, DSA, Diffie-Hellman and Elliptic Curve, for asymmetric encryption algorithms.
引用
收藏
页数:7
相关论文
共 23 条
  • [1] Abd Elminaam DiaaSalama., 2010, IJ NETWORK SECURITY, V10, P216
  • [2] Alowolodu O, 2013, INT J COMPUTER APPL, V66
  • [3] [Anonymous], 2013, GLOBAL J COMPUT SCI
  • [4] [Anonymous], TENCON 2009 2009 IEE
  • [5] [Anonymous], 2011, INT J EMERGING TECHN
  • [6] [Anonymous], 2012, INT J COMPUTER SCI C
  • [7] Arora R., 2013, Int. J. Eng. Res. Appl., V3, P1922
  • [8] Boni Sharad, 2015, INT J COMPUTER APPL, V130
  • [9] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [10] Gallagher Patrick, 2013, DIGITAL SIGNATURE ST, VFIPS, P186, DOI DOI 10.6028/NIST.FIPS.186-4