0% found this document useful (0 votes)
98 views6 pages

Review and Open Issues of Cryptographic Algorithms in Cyber Security

Uploaded by

Duy Hoang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views6 pages

Review and Open Issues of Cryptographic Algorithms in Cyber Security

Uploaded by

Duy Hoang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/335188685

Review and Open issues of Cryptographic Algorithms in Cyber Security

Conference Paper · August 2019


DOI: 10.1109/iCCECE46942.2019.8941663

CITATIONS READS

6 2,447

4 authors:

Safeeullah Soomro Mohammad Riyaz Belgaum


American National University and University of Fairfax USA University of Kuala Lumpur
113 PUBLICATIONS   451 CITATIONS    56 PUBLICATIONS   278 CITATIONS   

SEE PROFILE SEE PROFILE

Ruchin Jain Zainab Alansari


AMA International University Majan College
4 PUBLICATIONS   26 CITATIONS    52 PUBLICATIONS   257 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Load Balancing in Software Defined Networking View project

4th International Conference on Emerging Technologies in Computing 2021 (iCETiC '21), London Metropolitan University, London, UK View project

All content following this page was uploaded by Safeeullah Soomro on 22 September 2019.

The user has requested enhancement of the downloaded file.


Review and Open issues of Cryptographic
Algorithms in Cyber Security
Safeeullah Soomro Mohammad Riyaz Belgaum Zainab Alansari
Department of Computer Studies Malaysian Institute of Information Department of Computer Studies, AMA
AMA International University Technology International University, Salmabad,
Salmabad, Bahrain Universiti Kuala Lumpur, Kuala Bahrain.
[email protected] Lumpur, Malaysia.(UniKL MIIT) [email protected]
[email protected]

Ruchin Jain
Department of Computer Studies
AMA International University
Salmabad, Bahrain
[email protected]

Abstract— Security has been a primary focus in all the data and information related to private and public sectors are
areas of communications and also has become a big problem very sensible and are prone to attacks. Today most of the
for all kind of companies dealing with heterogeneous data. To transactions are carried out online due to fast internet
overcome the security issues, we have cybersecurity specialists service and applications available on devices like mobile,
and experts around the world but the finding and hiring these
tabs and laptops, so it is challenging to avoid leakage of
people are difficult due to expenses accordance with projects.
The researchers have focused on some of the issues of information, theft and robbery.
cryptographic algorithms to review it and provide solutions in
terms of research and development. Furthermore, we discuss Moreover, with the advancement of technology and the
cryptographic algorithms which may help to reduce security usage of 3G and 4G communications availability has led the
issues around the world, but some issues are rigorous, so will intruders and hackers to get their tasks easy as the users are
discuss here and review it according to standard encryption not aware of how to keep their data secure. Therefore the
and decryption methods in cryptography. Some of the security has become a concern of the providers itself. We
encryption and decryption algorithms consider and explain can say that it is a war against intruders and hackers to keep
some excellent examples for the researchers to find it for a
data secure. To avoid and stay safe ourselves, we have to
better comparison in the field of cybersecurity. Our effort may
help researchers to enhance security capabilities in terms of provide pieces of training and awareness of security issues
cryptographic algorithms in general. We provide a summary of and provide comprehensive approaches to employees who
different algorithms in this paper and elaborate open issues can remain reliable data and information all the time. It is
together with discussions that may help us to reduce problems current need of all industries to keep their employees trained
of security issues. and updated for upcoming security issues otherwise it is
challenging to hire security specialist who is very difficult to
Keywords—Encryption, Decryption, Cryptography, Data, find and expenses to affect the project’s cost and time
information security, Security issues, Secret Keys and ultimately.
Cryptographic algorithms.

I. INTRODUCTION The researchers in this field provide useful algorithms to


avoid security issues and provide safeguards to the data and
information, which we may keep safe and secure from
Presently everyone's concern in all the areas of research is intruders and hackers. These algorithms are called
security as it plays a significant role to secure the data and encryption and decryption algorithms. There are various
information from the intruders and hackers through some encryption and decryption algorithms where the user needs
cryptographic algorithms. The major part of cryptographic the same key on both sides called symmetric, and the
algorithms is encryption and decryption of communication algorithms that have different keys for encryption and
messages. The encryption is the process of encoded decryption is called asymmetric. In this work, we provide
messages from senders to receivers in such a way that no both reviews and challenges for securing the data, which is
other actor can understand. The decryption is mainly the the ultimate goal of any company or industry around the
reverse process of encrypted messages, which is decrypted world.
from the secret information through a secret key that only
sender and receiver can understand and use it. Most of the banking and electronic transactions are carried
out through online using wireless networks that demand
In this work, we are providing review and open issues of the secure connections[1]. This is called as CLA triad [1], which
cryptographic algorithms, which may help to secure the data ensures the confidentiality, and authentication through
and information through communication channels secretly. wireless or on a wired connection. According to banking
The cybersecurity is a major challenge for all industries to and electronic payments survey the NIST Computer
keep their data and information safe from intruders and Security Handbook [9] defines the term computer security
hackers. Securing data has become very difficult to manage as, “The protection afforded to an automatic information
due to the cost involved and the availability of experts. For system in order to accomplish the applicable objectives of
all sizes of organizations like small, medium and large, the preserving the integrity, availability and confidentiality of

158
978-1-7281-2138-3/19/$31.00 ©2019 IEEE
information system resources (includes hardware, software, hackers, which are discussed below to provide security and
firmware, information/data, and telecommunications).” The vigilance.
mechanism that protects the information from changes, a. Authentication
destruction, unintended or unauthorized access of the data is The messages in between senders and receivers have a piece
security. Cryptography (a word with Greek origins, means of code, which may validate on both sides are called as
“secret writing”), is the science and art of transforming authentication in cryptography. For example, when we are
messages to make them secure and immune to attack, used doing online shopping or carrying online banking
in security in networking. [10]. transactions, we receive OTC (One Time Code) which may
keep security measures for the out data and information. In
Our research outlines the following research questions, and Figure 2, we provide a pictorial presentation of the
each research question is answered in our study. authentication process in cryptography. Mainly it proves the
identity in between sender and receiver through any
I. How Cryptographic algorithms work and secure communication channel.
information from other parties. Furthermore
provides literature review and discussion. b. Confidentiality/Privacy
II. Review of those algorithms and provide a solution The privacy means only sender and receiver can understand
in terms of discussions where we discuss the the communication which is called as a secret
challenges and comparative analysis of algorithms communication. It exchanges cipher messages between
in terms of cybersecurity and provide final verdict sender and receiver through any communication channel
according to our understanding of research in where authorized parties can understand it. Furthermore,
cryptographic algorithms. confidentiality is a process where only the authorized party
can use and understand it. Moreover, unauthorized parties
Furthermore, our study provides a literature review, can download or copy the message but could not understand
challenges and future research on the comparison of due to encryption. The reason is that they could not decrypt
different research work based on various entities like time the message due to the unavailability of the encryption key.
consumption, key length, speed and cost. In Figure 3, the process of privacy/confidentiality is shown
below.
The paper briefs as follows: Section 2 introduces S M R
cryptographic algorithms while section 3 discusses the
comparative analysis, discussion about cryptographic
algorithms and cybersecurity; section 4 provides related K
research while section 5 presents the conclusion. Fig.3 Privacy in between sender and receiver

II. CRYPTOGRAPHIC ALGORITHMS OVERVIEW In Figure 3, S represents the sender, M represents the
Cryptographic algorithms are securing information through message, R represents the receiver and K stands for key,
communication paths. Those algorithms are essential and which is a secret key on any communication channel.
useful for different tasks carried from sender and receiver c. Integrity
through any network. The tasks are encryption, decryption, This process ensures the data and information is secure and
authentication and digital identity, which are carried through places it on devices correctly. It aims to keep as trusted data
cryptographic algorithms and keep communication and on devices where senders and receivers can upload and
information safe from hackers and intruders. Technically download the data. Furthermore, it provides a protected
the algorithms are categorized as symmetric and shield to data and information from intruders and hackers
asymmetric, which are designed for the achievement of who may damage it.
security measurements for the listed categories. d. Non-Repudiation
Non-repudiation is a legal concept, which is used for
security purpose and provides proofs to senders and
receivers. Mainly it is a legitimate concern that no one can
deny any transaction between both parties.
e. Service Availability and Reliability
This is mainly a maintenance part of the cybersecurity
process where devices can maintain and repair onetime. It
manages to detect and remove spyware for operating
systems. Furthermore, we provide a summary of different
cryptographic algorithms and discuss some issues and
challenges. Before discussing the various algorithms, we
give some information about the symmetric and asymmetric,
Fig.1 Cryptographic Security Categories which is a need for the understanding of most of the
Fig. 1 represents the Cryptographic categories of the algorithms in cryptography. The symmetric algorithm is an
security and goals of the cryptographic functions in general. encryption method or scheme, which uses the same key for
The five main goals of the cryptographic algorithms, make encryption, and decryption of messages in between senders
sure to secure data and information from intruders and and receivers. The asymmetric algorithm is also called
public-key cryptography, where messages are encrypted and

159
decrypted with two different keys one is public, and another III. CHALLENGES AND COMPARATIVE
private key. The public key can be shared with anyone while ANALYSIS
the private key has to be shared with specific receivers to In this section, we discuss and provide a comparative
keep data safe and secure from the intruders and hackers. analysis of different factors of a cryptographic algorithm
a) DES/3DES or TripleDES like time, cost, usage, key length, factors, performance,
The US Government started using this encryption method in advanced features and security issues. The challenges are
the ’70s. The ATMs use this method for the transactions depicted below, and the solution may discuss according to
carried out. It provides encrypted data and password in given sceneries and expert opinions.
different operating systems used for ATMs. Furthermore, The cyberattacks come along with online transactions,
the advanced version offers three times better than the old network share folders, clods and data integration centers. A
system and ensures the encryption process in an efficient study on various research papers is carried out to provide
way. data in the table and compare with current scenarios of
b) Blowfish Malaysia country, which is quite better in the development
Bruce Schneider developed the blowfish algorithm in 1993. of safer strategies for the cyber attacks.
This technique is open and free to use as the patents are not
held by anyone. The secret key size may vary from 32 to Incidents 2012-2018 2019 Increase/Decrease
448 bits. It is faster than DES in converting messages using
Fraud 2439 2650 Increase
encryption and decryption.
Intrusion 2203 2305 Increase
c) AES
Spam 291 400 Increase
Advanced Encryption Standard started in 1997 by the
Malicious 353 380 Increase
National Institute of Standards and Technology. It is an
advanced encrypted system which works efficiently in Code
restricted environments. Furthermore, the Twofish Cyber 173 10 Increase
algorithm becomes an advanced encryption algorithm which Harassments
replaced DES. Also, AES could benefit the databases to Content 10 20 Increase
secure the data [13]. During encryption-decryption, the AES Related
process encodes ten rounds for 128-bit keys. Twelve rounds Denial of 55 90 Increase
for 192-bit keys and fourteen rounds for the 256-bit keys to Services
come out with the last encoded message [14]. The AES Vulnerability 12 42 Increase
allows 128-bit length information to be split into four Reports
fundamental active blocks. Those parts are dealt with as a Table.1 Cryptographic Security Categories
line of bytes and combine data from 8 to 256 bits in
different pieces. In Table 1, Column 1 shows the data attacks in different
d) RSA related entities regarding cybersecurity. Column 2 provides
RSA represents Ron Rivest, Adi Shamir and Leonard information on various attacks since 2012-2018[23].
Adleman. RSA is named after the mathematicians who Column 3 contains attacks of the year 2019, and column 4
concocted it. RSA was first distributed in 1997 [11]. shows the relative comparison between the years from 2012
Variable size key and encryption square are utilized in RSA. till now. It shows an increasing trend because of cyber hubs
The primary favourable position of the RSA calculation is in different small, medium and large organizations. The
upgraded security and comfort. Utilizing Public Key reasons are costly to higher people and provide cyber
Encryption is likewise a preferred position of this solutions. Most of the companies and organizations have
calculation. RSA needs encryption speed [12]. RSA, by and already installed and started to offer security systems fully.
large, has three stages; key age, encoding and deciphering. According to our knowledge, the increment of 10% is not a
Then again, RSA has numerous disparities, so it is not significant loss and is quite affordable. According to this
suitable for banking and commercial industries [15]. survey report, we can say that due to the integration of cyber
e) IDEA systems and experts, 20% is an efficient way to deal with
IDEA technique is a minor revision in DES where it cyber attacks.
operates on 64 to 128 bits and provides a chunk of pieces in IV. RELATED RESEARCH
8 bits where the bitwise operation may rotate a bit per single
entry time. This encryption calculation was utilized in Pretty In this section, we provide relevant research on the work,
Good Privacy (PGP) Version 2 and is a discretionary which is closely related to our presented study. Protocols
calculation in OpenPGP. IDEA features 64-bit blocks with a can be accurate using inductive definitions as the inductive
128-bit key. method is simple and general. It tackles three versions of
f) MD5 Otway-Rees protocol for authentication, two versions of
MD5 was created by Professor Ronald Rivest and was Needham-Schroeder symmetric key protocol, and a
utilized to make digital signatures. It is a single direction recursive protocol. The analysis of Needham-Schroeder
hash work and is planned for 32-bit machines. It supplanted discloses Lowe’s attack, and the researcher found an
the MD4 calculation. alternative of Otway-Rees. Furthermore, the study of
This section has provided complete information about the Yahalom, a simplified version of Woo-Lam and the shared-
algorithms in detail, which may be useful for the readers to key version of Needham-Schroeder have been done. It was
understand the basics of cryptography. also analyzed that Kerberos is complicated to interpret
because of the use of session keys for encryption. In Internet

160
protocol TLS, arbitrary secret numbers are exchanged, to other algorithms and therefore, is a promising candidate for
generate the session keys. Using one Isabelle command encryption and decryption process of multimedia data.[18]
produced many results. Analyzing Needham-Schroeder took Studies were also performed on Finite-field cryptography,
only 30 hours, which include extending the model with which has a vital role to play in the current cyberspace
public-key encryption and hashing. It was suggested to network. One model is the RSA open key cryptosystem
follow explicitness which simplifies the proofs. Checking based the multifaceted design of discovering factorization of
the model is an e ective means of finding attacks. It copes enormous whole numbers and pivotal Diffie-hellman trade
with only many finite states and fails to find the reason why as it was hard to ascertain discrete logarithms in limited
an attack happened. This model provides an inductive proof fields. To ensure arranged data, the hardness of these issues
to give an examination of the protocol. When a protocol is should be estimated, and the related security utilizing
modified, the proof scripts from the beginning for its persuasive parameters for cryptography was required. Issues
analysis. All the steps were analyzed in the study. These were experienced at a hypothetical level, the Buhler's recipe
scripts take less time to execute, which is competitive with and its translation. The Buhler's strategy is an equation for
model checking. The net result of this study concludes that a most pessimistic scenario asymptotic. Issues during
designer of the protocol used model checking inspection and information accumulation incorporated that information
should apply the inductive approach to examine deeply into focuses on a given modulus size are not prone to be created
the properties for accuracy. [16] freely. Issues at procedure level were the base modulus sizes
Another study was conducted in which two efficient were given dependent on interoperability more than security
cryptosystems using the permutation–substitution supported issues. In this way, the examination expresses that there is a
by chaotic systems are proposed. Firstly, an S-box method is hole between the Buhler's recipe given the present
introduced, which exhibits its efficiency in the S-box factorization speed information, where the L-documentation
designed scheme to secure colour image encryption equation which gave progressively unpredictability of
technique. Besides, an encryption plot that is productive in finding the factorization. Besides, it is proposed to fuse
shading dependent on clamorous maps and S-confines the moderate qualities to the following RSA modulus update
type of stage substitution system was created. This research process. The open key length suggestions for RSA and DH,
put forth a practical and straightforward S-box method their experience and thinking are given. In light of this
based on the logistic-sine map. The researchers suggested exploration, a refreshed technique for estimating adequate
that to manage the problem of crucial little space and key sizes of the RSA and DH, and to benchmark it against
powerless encryption in the current disordered ways, an the open key is recommended for limited field cryptography
effective disarray based picture encryption plot as change [19].
substitution. Using the change substitution structure was to Cloud Computing has a commitment in the field of IoT and
incite encryption between the figure pictures and key itself, is apparent that the Cloud Computing innovation improves
along these lines expanding the security by including the capacity of the IoT. As opposed to utilizing broad
dissemination in the plain picture. The investigation utilization of IoT, this examination took the advantage that
demonstrated the adequacy of the proposed plans that Cloud Computing security through the AES calculation
demonstrated that encryption plan meets prerequisites for performs reliably better in various conditions, including
encryption criteria. This encryption scheme also provides both, equipment and programming stages. This utilization
sizeable keyspace and is therefore adequate for could be workable for all sort of stages and DSPs.
implementing this method.[17] Consequently, it demonstrates how Cloud Computing
Researchers also created and planned an asset productive innovation improves the capacity of the IoT [20].
encryption calculation framework which is exceptionally As we know that Medical Internet of Things, also known as
moderate but can be applied in multithreaded programming MIoT, plays a vital role in improving the health and safety
for encrypting the massive multimedia data. Another multi- of a massive number of people after the MIot was evolved.
level encryption model was developed using three schemes, Therefore, the concept of remote health care came into force
namely, the Feistel Encryption Scheme, genetic algorithms wherein the real-time data is sent to the medical data
and the Advanced Encryption Standard (AES). The system centres, which is efficient and cost-effective. MIoT devices
used actual big multimedia data which was medical-based handle information that increases exponentially. Since this
and compared the results to the benchmarked encryption data is sensitive hence security and privacy of the data
algorithms like the RC6, MARS, 3-DES, DES, and collected from MIoT devices, transferring data to the cloud,
Blowfish for the encryption and decryption procedures for are major unsolved concerns. The author focuses on the
the running time and their throughput. security and privacy issues in MIoT. The matters discussed
A study, considering the system efficiency and performance, in this study are (i) Insecure Network. (ii) Lightweight
proposed an encryption system. This framework was Protocols for Device and (iii) Data Sharing. Four kinds of
contrasted and its later form for demonstrating its asset issues are considered in this study k-anonymity, including
effectiveness. Results demonstrated that the request in Partial Datafy k-anonymity, Overall Datafy k-anonymity, μ-
contrast with the standard encryption calculations Argus k-anonymity, and clustering k-anonymity. The study
demonstrated the least run time and higher throughput for showed that clustering 2-anonymity gave the best results.
the cryptographic procedures. Improvement is observed in Further research on security issues and challenges are
the computation run time by 75%, and its throughput was suggested by the authors.[21]
more significant than before by a multiple of four as The encrypted data in the cloud, which has to be shared, is
compared to its sequential version. This algorithm exhibits a of significant importance. Therefore, research proposed
better Avalanche Effect in cryptography as compared to cryptosystem considered a key-total verification that can

161
produce a consistent size key that decodes the ciphertexts. p. 1028–1031.Chandra S, 2014, A comparative survey of symmetric
and asymmetric key cryptography in International Conference on
The key size isn't subject to figure content's length, and the Electronics, Communication and Computational Engineering p. 83–
plan is autonomous on the occasions the records are 93.
transferred to the cloud server. Moreover, in this exploration [4] Gaithuru J, 2015, A Comprehensive Literature Review of
model, the framework gives an answer to the issue of key Asymmetric Key Cryptography Algorithms for Establishment of the
spillage during information sharing. The information Existing Gap, Malaysian Software Engineering Conference p. 236-
244.
proprietor can extricate an amassed key, including its expiry
[5] Tripathi R and Agrawal S, 2014, Comparative Study of Symmetric
date and the agent's personality. The key enables the cloud and Asymmetric Cryptography Techniques, International Journal of
server to control the privilege to download, characters Advanced Foundation and Research in Computer1, 6 p. 68–76.
substance who needs to get to or download. Hence the [6] Chandra S Bhattacharyya S Paira S and Alam S, 2014, A Study and
investigation demonstrates that the message in this key can't Analysis on Symmetric Cryptography in International Conference on
be denied and verification key can't be manufactured. The Science, Engineering and Management Research IEEE p. 1-9.
technique is promising for asset improvement and keeping [7] Mathur H and Alam P, 2015, Cryptology Algorithm, Int. J. Emerging
Trends Technology Comput. Sci. 4, 1, p. 4–6.
key spillage from accomplishing productivity for
[8] Behrouz A Forouzan, “Data Communications and Networking”,
information partaking in powerful distributed storage for a McGraw-Hill, 4th Edition. 2007.
cryptosystem. The exploration model is an expansion of the [9] William Stallings, “Cryptography and Network Security: Principles
key-total cryptosystem conspire. The KAAC has Encrypt and Practice”, Pearson Education/Prentice Hall, 5th Edition.
and Extract systems, which have two crucial jobs to [10] http://searchsecurity.techtarget.com/definition/RSA
perform. The number of ciphertexts in distributed storage as [11] http://www.emc.com/emc-plus/rsa-labs/standardsinitiatives/
a rule increment quickly. By setting up a compelling advantages-and-disadvantages.htm
personality validation framework, the plan tackled the issue [12] Singh, G.: A Study of Encryption Algorithms (RSA, DES, 3DES and
of mystery key spillage. The key-total verification AES) for Information Security. International Journal of Computer
Applications, Vol. 67, No. 19, (2013).
cryptosystem (KAAC) gives a protected, proficient, and
[13] Singh, M. G., Singla, M. A., & Sandha, M. K.: Cryptography
adaptable information partaking in distributed storage. Algorithm Comparison for Security Enhancement in Wireless
Confinement in this plan is that the length of the open Intrusion Detection System.
parameter with a few classes of ciphertext is a straight [15] Koko, S. O. A. F. M., & Babiker, A.: Comparison of Various
connection. The KAAC method can be in situations, Encryption Algorithms and Techniques for improving secured data
wherein patient-controlled encryption is desired, searching Communication. IOSR Journal of Computer Engineering (IOSR-
JCE), Vol. 17, No. 1, 62-69, (2015).
encrypted data in the data center or cloud and many other
[16] Paulson, Lawrence C, “The inductive approach to verifying
similar cases. Thus, this method will have promising cryptographic protocols” Journal of Computer Security, vol. 6, no. 1-
candidature for its usage [22]. 2, pp. 85-128, Jan 1998.
[17] Akram Belazi, Majid Khan, Ahmed A. Abd El-Latif, Safya Belghith,
ACKNOWLEDGEMENT “Efficient Cryptosystem Approaches: S-boxes and Permutation–
This work is supported by CTRG Research Group of the Substitution-based Encryption”, An International Journal of
Nonlinear Dynamics and Chaos in Engineering Systems, Volume 87,
College of Computer Studies, AMA International University, Issue 1, pp 337–361, January 2017.
Kingdom of Bahrain. [18] Shadi Aljawarneh, Muneer Bani, YasseinWe’am Adel Talafha, “A
Multithreaded Programming Approach For Multimedia Big Data:
V. CONCLUSION Encryption System”, Multimedia Tools and Applications, Volume
77, Issue 9, pp 10997–11016, May 2018.
In this work, we have provided answers to our research
[19] Mikko Kiviharju, “On The Fog Of RSA Key Lengths: Verifying
questions, which belong to cryptographic algorithms and Public Key Cryptography Strength Recommendations” 2017
cybersecurity. Mainly we provide reviews of different International Conference on Military Communications and
cryptographic algorithms and discussion. Furthermore, we Information Systems (ICMCIS), DOI:
have discussed the cybersecurity challenges and presented 10.1109/ICMCIS.2017.7956481.
our analysis. Moreover, cyber-attacks are increasing day by [20] Christos Stergiou, Kostas E. Psannis, Byung-Gyu Kim, Brij Gupta,
“Secure Integration of IoT and Cloud Computing”, Future Generation
day due to the availability of cyber hubs in all Computer Systems, Volume 78, Part 3 January 2018, Pages 964-975.
companies/industries of the world and relevant measures [21] Wencheng Sun, Zhiping Cai, Yangyang Li, Fang Liu, Shengqun Fang,
have to be taken into consideration to avoid such breaching Guoyan Wang, “Security and Privacy in the Medical Internet of
of data and information from intruders and hackers. Things: A Review”, Security and Communication Networks, Volume
2018, Article ID 5978636, 9 pages,
REFERENCES https://doi.org/10.1155/2018/5978636.
[22] C. Guo, N. Luoc, Md Zakirul Alam Bhuiyan, Yingmo Jie, Yuanfang
[1] Tingyuan Nie, Chuanwang Song and Xulong Zhi, "Performance Chen, Bin Feng, Muhammad Alam, “Key-aggregate authentication
Evaluation of DES and Blowfish Algorithms", IEEE International
cryptosystem for data sharing in dynamic cloud storage”, Future
Conference on Biomedical Engineering and Computer Science
Generation Computer, Generation Computer Systems (2017),
(ICBECS- 2010), pp. 1-4, 23-25 Apr 2010.
http://dx.doi.org/10.1016/j.future.2017.07.038
[2] Basri B, 2016, Kriptografi Simetris dan Asimetris dalam Perspektif
[23] G.Nikheta Reddy and GJ Ugander”A study of Cyber Security
Keamanan Data dan Kompleksitas Komputasi, Jurnal Ilmu
Komputer2, 2 p. 17–23. Challenges and its emerging trends on latest technologies” Published
in International Journal of Engineering Research And Management
[3] Bisht N and Singh S, 2015, A Comparative Study of Some Symmetric (IJERM) ISSN: 2349- 2058, Volume-05, Issue-07, July 2018.
and Asymmetric Key Cryptography Algorithms International Journal
of Innovative Research in Science, Engineering and Technology4, 3

162

View publication stats

You might also like