Overview and Performance Analysis of Encryption Algorithms

Data protection is a complex problem affecting many areas including computers and communications. To ensure the necessary protection of applications, cryptographic methods and various algorithms are used. In this paper general overview of cryptography, information security and the comparison of algorithms with symmetric and asymmetric keys is presented. Factors ensuring the achievement of efficiency, flexibility and security are the basis of this research. As a result, the best solution for symmetric and asymmetric encryption is produced. © Published under licence by IOP Publishing Ltd.

Авторы
Oleiwi Z.C.1 , Alawsi W.A.1 , Alisawi W.C.1 , Alfoudi A.S.2 , Alfarhani L.H. 3
Сборник материалов конференции
Издательство
Institute of Physics Publishing
Номер выпуска
1
Язык
Английский
Статус
Опубликовано
Номер
012051
Том
1664
Год
2020
Организации
  • 1 College of Science, University of Al-Qadisiyah, Iraq
  • 2 College of Computer Science and Information Technology, University of Al-Qadisiyah., Iraq
  • 3 Academy Engineering, Rudn University, Russian Federation
Ключевые слова
AES; asymmetric encryption; cryptography; DES; encryption; RSA; Security model; symmetric encryption
Цитировать
Поделиться

Другие записи