0% found this document useful (0 votes)
20 views12 pages

Encryption Techniques and Algorithms To Combat Cyb

Uploaded by

M Nakkach
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views12 pages

Encryption Techniques and Algorithms To Combat Cyb

Uploaded by

M Nakkach
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/372832281

Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A


Review

Article in VAWKUM Transactions on Computer Sciences · June 2023


DOI: 10.21015/vtcs.v11i1.1521

CITATIONS READS
5 1,835

5 authors, including:

Shuaib Ahmed Wadho Areej Fatemah Meghji


Tunku Abdul Rahman University Mehran University of Engineering and Technology
7 PUBLICATIONS 28 CITATIONS 22 PUBLICATIONS 188 CITATIONS

SEE PROFILE SEE PROFILE

Roshan Kumar Farhan Shaikh


Tunku Abdul Rahman University Tunku Abdul Rahman University
6 PUBLICATIONS 40 CITATIONS 15 PUBLICATIONS 432 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Farhan Shaikh on 25 March 2024.

The user has requested enhancement of the downloaded file.


VAWKUM Transactions on Computer Sciences
VAWKUM
VAWKUM
VAWKUM
VAWKUMVAWKUM
VAWKUM
VAWKUM
VAWKUM
VAWKUM
VAWKUM
VAWKUM
VAWKUM
VAWKUM Transactions
Transactions
Transactions
VFAST Transactions
Transactions
VAWKUM
Transactions
Transactions
Transactions
Transactions
VAWKUM
VAWKUM on
onon
on
Transactions
Transactionson
onon
on
http://vfast.org/journals/index.php/VTCS@ Computer
Computer
Computer
on
on
on Computer
Computer
Computer
Transactions
Computer
Computer
Computer
Computer
2023
Transactions
Transactions
Transactions
Transactions
Transactions on on
on on
on Sciences
Sciences
Sciences
Mathematics
Sciences
Sciences
Sciences
on
Sciences Computer
Sciences
Sciences
Sciences
ISSN(e): 2308-8168,
Computer
Computer
Computer
Computer
Computer Sciences
ISSN(p):
Sciences
Sciences
Sciences
Sciences
Sciences 2411-6335
Volume 11, Number 1, January-June 2023 pp: 295-305

Encryption Techniques and


Algorithms to Combat
Cybersecurity Attacks: A Review
Shuaib Ahmed Wadho1 , Areej Fatemah Meghji2* , Aun Yichiet1 , Roshan Kumar1 ,
Farhan Bashir Shaikh1

1
Faculty of Information and Communication Technology Universiti Tunku Abdul Rahman
(UTAR), Kampar Campus, Malaysia; 2 Department of Software Engineering, Mehran
University of Engineering and Technology, Jamshoro, Sindh, Pakistan

Keywords: cyber-attack, Abstract The danger of cyber-attacks is constant in the current digital envi-
encryption, ronment. The necessity for effective security actions are more crucial than ever
cybersecurity,
encryption algorithms
before due to the increasingly complex nature of cybersecurity attacks. Using
encryption approaches and algorithms is one of the best ways to secure more
Journal Info: sensitive data from cyber-attacks. In order to effectively defend against cyberse-
Submitted: curity assaults, this research study attempts to give an analysis of the function
May 15, 2023
Accepted: that encryption methods and approaches serve. We investigate various encryp-
June 15, 2023 tion algorithms and techniques, their advantages and disadvantages, and their
Published: applications. In addition, we investigate the difficulties of encryption and the po-
June 30, 2023 tential solutions to these difficulties.

*Correspondence Author Email Address:


[email protected]

1 Introduction
The Internet plays an important role in global communication today. Innovations, reach, and reduced costs
have significantly increased the availability, use, and performance of the Internet, resulting in roughly 3
billion users worldwide [1]. Thus, it is not surprising that the Internet has become increasingly integrated
in our daily lives. Currently, a vast majority of nations’ monetary, commercial, societal, and regulatory
operations, on an individual, government, and non-governmental level, are carried out in cyberspace [2].
Essential and sensitive infrastructures either constitute a part of cyberspace, or are administered, man-
aged, and exploited through it, and a majority of confidential data is transmitted to or created in this area.
This includes a majority of financial transactions and confidential communications between governments,
research facilities, the military, and individuals. Today, a large amount of time is spent daily interacting in
this space [3].
Cybersecurity is a broad term usually referring to methods and approaches aimed at avoiding unlawful
entry, misuse, or damage to computer systems, networks, data, and information. It refers to a collection

This work is licensed under a Creative Commons Attribution 3.0 License.


295
VAWKUM Transactions on Computer Sciences

of policies and procedures that ensure the confidentiality, integrity, and availability of digital assets [4].
Encryption is a critical component of cybersecurity since it safeguards sensitive data and communications.
To protect the privacy and integrity of data, encryption involves converting plain text into an encrypted
form which cannot be read [5]. The process utilizes an algorithm, also referred to as a cipher, to encrypt
user data. The encrypted user text, or ciphertext, consists of text that is scrambled to make it incompre-
hensible. Sensitive information has long been shielded from unauthorized access using encryption. As
depicted in Figure 1, while sending some data, the sender uses an encryption key to convert the content
into ciphertext. The ciphertext is unreadable and thus allows the safe transmission of the data [6]. At the
receivers end, the ciphertext is reconverted to the original, legible text using the decryption key. With the
passage of time, several encryption algorithms or ciphers have been proposed. One prime difference be-
tween the proposed approaches is in their use of the encryption key. Symmetric encryption approaches
rely on keeping the key safe and thus use the same key for the encryption/decryption process. Asymmet-
ric encryption uses a pair of keys, a public key is used to encrypt the data whereas a private key is used for
the decryption step. Both the keys are mathematically related, however, the private key cannot be derived
from the public key. Encryption can be applied on any form of user data including text, image, audio and
video [7].
Given the sophistication and frequency of cyber-attacks in the modern digital era, the use of encryption
is more crucial than ever before [8]. Every cybersecurity strategy incorporates some form of encryption
method and algorithm. Data is converted into an unintelligible form using encryption algorithms and
procedures, which can only be unlocked with the correct decryption key. As the data is scrambled before
transmission, an unauthorised party will not be able to access or make sense of the contents unless the
data is converted back into its original structure. Data saved on computers, sent via networks, and kept in
the cloud are all protected by encryption [9]. Applications for encryption methods and techniques range
from securing online transactions to safeguarding private data.

Figure 1. The Process of Encryption

An attempt has been made in the current paper to review the existing literature on encryption tech-

296
VAWKUM Transactions on Computer Sciences

niques being utilized to combat cybersecurity attacks. The rest of this paper has been structured in the
following manner: section 2 describes the classification of encryption techniques followed by a review in
section 3 focusing on the encryption techniques utilized, their advantages, disadvantages, and the gap in
the research. Section 4 presents the challenges associated with encryption and the methods to overcome
the discussed challenges followed by the various applications of encryption techniques. Section 6 presents
the conclusion of the paper.

2 Classification of Encryption Techniques


As depicted in Figure 2, there are many different encryption methods and algorithms, and they all have
different strengths and limitations [10]. The prevailing forms of encryption have been discussed in the
subsequent sections.

Figure 2. Encryption Techniques and Algorithms Matrix

2.1 Symmetric Encryption


This technique employs a solitary key for both the encryption and decryption of data [11, 12]. This key is
mutually shared by the data’s sender and receiver. Symmetric encryption is characterized by its swiftness
and efficiency; however, it necessitates a secure channel through which the key can be exchanged securely
[13].

2.2 Asymmetric Encryption


As opposed to symmetric encryption, this technique relies on a pair of keys—a public key and a private
key—to accomplish data encryption and decryption [14]. The public key is disseminated to all individuals

297
VAWKUM Transactions on Computer Sciences

desiring to transmit encrypted data, while the private key remains confidentially held by the designated
recipient. While asymmetric encryption is relatively slower than its symmetric counterpart, it offers height-
ened security [15].

2.3 Hash Functions


This technique generates a fixed-size message digest for a given message, rendering it irreversible [16].
Hash functions are primarily employed to ensure data integrity and to verify that no unauthorized alter-
ations have been made.

2.4 Hybrid Encryption


This technique integrates the security attributes of both symmetric and asymmetric encryption to establish
a more resilient and efficient encryption system [17]. It is often employed in scenarios necessitating secure
communication between two parties across an insecure medium, such as the internet.

2.5 Comparison of Encryption Techniques and Algorithms


The primary difference between symmetric and asymmetric encryption is in the use of the cryptographic
key. Asymmetric encryption uses two different keys, one for encryption and other for decryption, while the
symmetric encryption customs a single key for decryption and encryption. Data Encryption Standard (DES,
3DES), Blowfish, International Data Encryption Algorithm (IDEA), and Advanced Encryption Standard (AES)
are examples of symmetric encryption methods [18]. Techniques using asymmetric encryption are harder
to crack, thus utilised to secure sensitive information pertaining to government and financial sectors [19].
Furthermore, they encrypt data using a block cipher and have a key length of 128, 192, or 256 bits [20–22].
The DES is a more established method for symmetric encryption [21] which utilizes a 56-bit key. On the
other hand, the Blowfish is a well-known symmetric encryption method which uses the flexible length key
which known due to speed and flexibility.
The symmetric encryption methods also include Elliptic Curve Cryptography (ECC), Diffie-Hellman and,
RSA [23]. The usually used asymmetric encryption technique as known as RSA which uses a public key
for encryption while a private key for decryption. It is used for secure email mechanism, web browsing /
searching, and for online transactions. While the ECC, which produces keys using elliptic curves relatively
than prime numbers, is another example of asymmetric encryption method [24]. Furthermore, it is famil-
iar for both its speed and effectiveness. A secure channel between two parties is established using the
Diffie-Hellman key exchange technique. First introduced in 1991, IDEA encryption was meant to replace
DES. However, the newer AES was ultimately deemed more secure. Table 1 compares some symmetric
encryption methods and algorithms.

Table 1. Comparison symmetric encryption algorithms and techniques

Technique \ Year Intro- Key Size Block Size (bits) Mode of Operation Speed Security
Algorithm duced (bits) Level
DES 1977 56 64 ECB, CBC, CFB, OFB Fast Low
3DES 1998 168 64 ECB, CBC, CFB, OFB Slow Medium
AES 2001 128, 192, 256 128 ECB, CBC, CFB, OFB Fast High
Blowfish 1993 32-448 64 ECB, CBC, CFB, OFB Fast Medium
Twofish 1998 128, 192, 256 128 ECB, CBC, CFB, OFB Fast High
RC4 1987 40-2048 Stream cipher Stream cipher Fast Low
RC5 1994 32-2048 32, 64, 128 ECB, CBC, CFB, OFB Fast Medium

It needs to be noted that the security of an encryption method depends on a number of features, such
as the key size, how it is used, and how it works. The software’s and tools used to protect and decrypt the
data also play an important role in determining the speed of a method.

298
VAWKUM Transactions on Computer Sciences

3 Literature Review
We found during the literature review (see Table 2) that the use of encryption techniques and algorithms
is one of best methods to protect against the continuous cybersecurity threats that happen in the digital
environment. However, we analyze the current state of research in this field, focusing on the issue pre-
sented, the techniques used, the publication year, the publisher, the advantages and disadvantages, and
the gaps identified during.

Table 2. Summary of Reviewed Literature

Ref Problem Dis- Techniques Year Publisher Pros Cons Gap


cussed Used
[25] Post-Quantum Key Schedul- 2022 Springer Improvement in per- No issues high- Limited testing
Cryptographic ing Algo- formance and secu- lighted on real-world
Method rithm rity - 30% frequency, systems
24% area, 10% confi-
dential rate
[20] Survey on data RAS, DES and 2021 ELSEVIER Detailed review of Limitations of the More work
encryption CAST block various encryption discussed encryp- needed on big
algorithms for big tion techniques data encryption
data encryption via symmetric
block ciphers
[26] Addressing CIA CIA 2021 JICT Detailed review of CIA Reliance on internet Model CIA needed
development
for Information
Security
[27] Different RSA, Blow- 2021 IJEAST Evaluation of algo- Limited discussion Explore other
encryption fish, AES, rithms based on on encryption tech- cryptographic
techniques for and DES specific criteria such niques methods, conduct
image, video, encryption as time, memory, in-depth perfor-
audio, and algorithms cryptographic power, mance analysis
document files and network band-
width
[28] Review differ- AES and CBC 2021 ESCI Recognition of the Analysis limited to Need growth and
ent emphasis higher security pro- entropy, floating advancements in
on entropy, vided by the CBC frequency and his- AES due to its sig-
histogram, mode of operation togram nificant advances
and floating compared to ECB in entropy
frequency
[29] Protecting Post- 2021 IEEE Develops new post- dependence of IoT Limited adoption
Against Quan- Quantum quantum cryptog- devices on the phys- and support for
tum Attacks Cryptogra- raphy algorithm to ical characteristics post-quantum
phy protect against quan- (bandwidth etc.) cryptography
tum attacks
[30] Improving Per- Parallelization 2019 ACM Increases speed Limited applicability Limited analy-
formance of Techniques and performance of to other encryption sis of security
ChaCha20 ChaCha20 algorithm algorithms implications of
through paralleliza- parallelization
tion
[31] Increasing Se- Improved 2018 Springer Enhances security of Additional computa- Does not address
curity of RSA Key Genera- RSA algorithm by gen- tional overhead in other weaknesses
tion erating secure keys key generation in RSA algorithm
[32] Vulnerabilities Segmentation 2017 Springer Efficiently identifies Limited applicability Research is lim-
in web ontolo- method and exploits weak- to other algorithms ited to fault
gies nesses in algorithm injection attacks
of web security
[11] symmetric key SLR 2016 IJCA Evaluation based on Limited focus on Inclusion of quan-
encryption multiple parameters symmetric encryp- titative perfor-
techniques tion mance metrics

As seen in Table 2, the literature review provides a summary of the current research in the encryption

299
VAWKUM Transactions on Computer Sciences

techniques and algorithms in terms of the problem that have been addressed with new directions, the
techniques used, the advantages and disadvantages, and the research gaps are also identified. The eval-
uated studies discuss a number of issues, including the security weaknesses in the AES, the big flaws in
RSA and as well as in RC4, the recital enhancements of ChaCha20, and defense against quantum attacks.
However, the analysis discovered a number of pros and cons of the different encryption techniques and
algorithms used. For instance, fault injection attacks have been identified to locate and exploit bugs in the
AES algorithm, but their use with other encryption methods is quite limited. Similar to pre-quantum cryp-
tography, post-quantum cryptography provides greater protection against quantum assaults but is not
widely used or supported. The current research also uncovered gaps in the existing research, including a
lack of research on various forms of attacks, insufficient testing on real-world systems, and little analysis of
the security implications of parallelization. In general, academics and practitioners striving to enhance the
security and effectiveness of encryption approaches and algorithms can benefit from the current results.
Even though encryption is a vital cybersecurity tool, it needs to be incorporated in tandem with addi-
tional safeguards. robust authorization procedures, effective firewalls, intrusion detection systems, peri-
odic security assessments, and staff training are all essential to this. A comprehensive cybersecurity plan
employs numerous levels of defence to safeguard against a wide variety of cyber attacks.

4 Challenges Associated with Encryption


Although encryption has advantages, there are also drawbacks to using it [33]. The most difficult issue is
key management. Both the transmitter and the receiver of encrypted data must exchange and securely
store keys. Encryption can also require a lot of computation, which slows down the processing of big
amounts of data [34, 35].

4.1 Additional Challenges Associated with Encryption


The potential for side-channel attacks is another difficulty with encryption. In order to retrieve the encryp-
tion key, these attacks take advantage of holes in the physical implementation of the encryption system,
such as power usage or electromagnetic radiation [36]. Due to these flaws, it is crucial to implement en-
cryption techniques in a secure way. The balance between security and usability is another difficulty [37].
It is possible to build encryption algorithms so that they are both easy to use and very safe. As a result, it’s
critical to strike a balance between the two to make encryption both efficient and useful. Finally, there may
be legal and regulatory restrictions on encryption. Some nations might impose limitations on the use of
encryption or demand that businesses give law enforcement access to their systems through a backdoor.
As a result, it’s crucial to be aware of these rules and follow them in order to protect encrypted data [38].

4.2 Ways to Overcome Encryption Challenges


Various tactics can be employed to get around encryption’s difficulties. These tactics consist of:

4.2.1 Key Management


To ensure the security of encrypted data, it is essential to put into practice appropriate key management
procedures [39]. To prevent unwanted access, this entails securely exchanging and storing keys as well as
rotating them on a regular basis.

4.2.2 Secure Implementation


Secure implementation of encryption techniques helps lessen side-channel attack risks [40]. This entails
making use of hardware security modules, putting in place strict access controls, and carrying out frequent
security audits.

300
VAWKUM Transactions on Computer Sciences

4.2.3 Usability
Encryption algorithms can be more widely adopted if they are simple to use and can be integrated into cur-
rent systems [41]. This entails creating user-friendly interfaces, as well as offering help and documentation
that is crystal clear [42].

4.2.4 Compliance
Adhering to legal and regulatory regulations is essential to avoiding sanctions, both monetary and oth-
erwise. This entails keeping abreast of evolving legislation and collaborating with legal professionals to
maintain compliance.

5 Applications of Encryption Techniques and


Algorithms
To safeguard sensitive data from cyber-attacks, several fields use encryption methods and approaches
[43–50]. The following are some of the most typical uses for encryption:

1. Secure Communications: Email, instant messaging, and online transactions are all secured via en-
cryption over the internet.
2. Cloud security: Data saved on the cloud, particularly private financial and health records, are pro-
tected via encryption.
3. Mobile Security: Data held on mobile devices, such as smartphones and tablets, are protected via
encryption.
4. Industrial Control Systems Security: Critical infrastructure, such as power plants and water treatment
facilities, are shielded from cyber-attacks via encryption. However, the application of the encryption
techniques and algorithms in Table 3 needs to be better understood.

Table 3. Encryption Techniques and Algorithms

Application Encryption Technique Purpose


Secure Communication Asymmetric Encryption Protects communication from eavesdrop-
ping and ensures the identity of the commu-
nicating parties
Data Storage Symmetric Encryption, Hash Protects data at rest from unauthorized ac-
Functions cess or modification. Hash functions are
used for password storage
Financial Transactions Asymmetric Encryption Secures online financial transactions and
protects sensitive financial data
Digital Signatures Asymmetric Encryption Provides non-repudiation and authentica-
tion for electronic documents and transac-
tions
VPNs and Remote Access Symmetric Encryption, Asym- Secures remote access to networks and data,
metric Encryption and protects data in transit
Cloud Security Hybrid Encryption Protects data stored in cloud environments
and data transmitted to and from the cloud

6 Conclusion
The use of encryption methods and algorithms is essential for thwarting cybersecurity threats. In domains
including secure communications, cloud security, and mobile security, encryption techniques are used to
safeguard sensitive data. Each encryption technique has its own set of advantages and concerns, and

301
VAWKUM Transactions on Computer Sciences

these should be examined before using a specific approach. Some techniques are more suited for par-
ticular domains and this too needs to be taken into consideration before choosing a particular approach.
Some difficulties encountered in implementing encryption include key management, side-channel attacks,
and legal and regulatory restrictions. Effective key management techniques, secure implementation, a bal-
ance between security and usability, and adherence to legal and regulatory regulations must all be put into
place in order to overcome these obstacles. By doing this, we can make sure that encryption continues to
be a crucial weapon in the struggle against online threats.

Author Contributions
Shuaib Ahmed Wadho: Conceptualization, Data curation, Original draft preparation. Areej Fatemah
Meghji: Visualization, Writing- Reviewing and Editing. Aun Yichient: Investigation, Supervision. Roshan
Kumar: Investigation, Validation. Farhan Bashir Shaikh: Writing- Reviewing and Editing.

Compliance with Ethical Standards


It is declared that all authors don’t have any conflict of interest. It is also declared that this article does not
contain any studies with human participants or animals performed by any of the authors. Furthermore,
informed consent was obtained from all individual participants included in the study.

References
[1] S. Tan, P. Xie, J. M. Guerrero, J. C. Vasquez, Y. Li, and X. Guo, “Attack detection design for dc microgrid
using eigenvalue assignment approach,” Energy Reports, vol. 7, pp. 469–476, 2021.
[2] Y. Li and Q. Liu, “A comprehensive review study of cyber-attacks and cyber security; emerging trends
and recent developments,” Energy Reports, vol. 7, pp. 8176–8186, 2021.
[3] I. Priyadarshini, R. Kumar, R. Sharma, P. K. Singh, and S. C. Satapathy, “Identifying cyber insecurities
in trustworthy space and energy sector for smart grids,” Computers & Electrical Engineering, vol. 93, p.
107204, 2021.
[4] D. Ghelani, “Cyber security, cyber threats, implications and future perspectives: A review,” Authorea
Preprints, 2022.
[5] M. S. Rathore, M. Poongodi, P. Saurabh, U. K. Lilhore, S. Bourouis, W. Alhakami, J. Osamor, and
M. Hamdi, “A novel trust-based security and privacy model for internet of vehicles using encryption
and steganography,” Computers and Electrical Engineering, vol. 102, p. 108205, 2022.
[6] K. R. Saraf, V. P. Jagtap, and A. K. Mishra, “Text and image encryption decryption using advanced en-
cryption standard,” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),
vol. 3, no. 3, pp. 118–126, 2014.

[7] M. E. Smid and D. K. Branstad, “Data encryption standard: past and future,” Proceedings of the IEEE,
vol. 76, no. 5, pp. 550–559, 1988.
[8] W. Duo, M. Zhou, and A. Abusorrah, “A survey of cyber attacks on cyber physical systems: Recent
advances and challenges,” IEEE/CAA Journal of Automatica Sinica, vol. 9, no. 5, pp. 784–800, 2022.

[9] W. Bai, M. Pearson, P. G. Kelley, and M. L. Mazurek, “Improving non-experts’ understanding of end-
to-end encryption: an exploratory study,” in 2020 IEEE european symposium on security and privacy
workshops (EuroS&PW). IEEE, 2020, pp. 210–219.

302
VAWKUM Transactions on Computer Sciences

[10] G. K. Soni, H. Arora, and B. Jain, “A novel image encryption technique using arnold transform and
asymmetric rsa algorithm,” in International Conference on Artificial Intelligence: Advances and Applica-
tions 2019: Proceedings of ICAIAA 2019. Springer, 2020, pp. 83–90.
[11] M. U. Bokhari and Q. M. Shallal, “A review on symmetric key encryption techniques in cryptography,”
International journal of computer applications, vol. 147, no. 10, 2016.
[12] K. Saranya, R. Mohanapriya, and J. Udhayan, “A review on symmetric key encryption techniques in
cryptography,” International Journal of Science, Engineering and Technology Research (IJSETR), vol. 3, no. 3,
pp. 539–544, 2014.
[13] M. N. Alenezi, H. Alabdulrazzaq, and N. Q. Mohammad, “Symmetric encryption algorithms: Re-
view and evaluation study,” International Journal of Communication Networks and Information Security,
vol. 12, no. 2, pp. 256–272, 2020.
[14] B. Halak, Y. Yilmaz, and D. Shiu, “Comparative analysis of energy costs of asymmetric vs symmetric
encryption-based security applications,” IEEE Access, vol. 10, pp. 76 707–76 719, 2022.
[15] A. A.-R. El-Douh, S. F. Lu, A. A. Elkouny, and A. Amein, “Hybrid cryptography with a one–time stamp to
secure contact tracing for covid–19 infection,” International Journal of Applied Mathematics and Com-
puter Science, vol. 32, no. 1, pp. 139–146, 2022.
[16] A. John, A. Reji, A. P. Manoj, A. Premachandran, B. Zachariah, and J. Jose, “A novel hash function
based on hybrid cellular automata and sponge functions,” in Asian Symposium on Cellular Automata
Technology. Springer, 2022, pp. 221–233.
[17] X. Gao, J. Mou, B. Li, S. Banerjee, and B. Sun, “Multi-image hybrid encryption algorithm based on pixel
substitution and gene theory,” Fractals, p. 2340111, 2023.
[18] H. Dibas and K. E. Sabri, “A comprehensive performance empirical study of the symmetric algorithms:
Aes, 3des, blowfish and twofish,” in 2021 International Conference on Information Technology (ICIT).
IEEE, 2021, pp. 344–349.
[19] J. Daemen and V. Rijmen, The design of Rijndael. Springer, 2002, vol. 2.
[20] P. Matta, M. Arora, and D. Sharma, “A comparative survey on data encryption techniques: Big data
perspective,” Materials today: proceedings, vol. 46, pp. 11 035–11 039, 2021.
[21] ISO Central Secretary, “Information technology — security techniques — encryption algorithms —
part 3: Block ciphers,” International Organization for Standardization, Geneva, CH, Standard ISO/IEC
TR 18033-3:2010, 2010.
[22] R. V. Amorado, A. M. Sison, and R. P. Medina, “Enhanced data encryption standard (des) algorithm
based on filtering and striding techniques,” in Proceedings of the 2nd International Conference on Infor-
mation Science and Systems, 2019, pp. 252–256.
[23] R. Rajashree, “A comprehensive survey on lightweight asymmetric key cryptographic algorithm for
resource constrained devices,” SPAST Abstracts, vol. 1, no. 01, 2021.
[24] J. Zhang, A. Yan, and H. Zhang, “Asymmetric encryption of invisible structured light 3d imaging,” Ap-
plied Sciences, vol. 12, no. 7, p. 3563, 2022.
[25] S. Kumari, M. Singh, R. Singh, and H. Tewari, “To secure the communication in powerful internet of
things using innovative post-quantum cryptographic method,” Arabian Journal for Science and Engi-
neering, pp. 1–16, 2022.
[26] C. K. Yee and M. F. Zolkipli, “Review on confidentiality, integrity and availability in information security,”
Journal of Information and Communication Technology in Education, vol. 8, no. 2, pp. 34–42, 2021.

303
VAWKUM Transactions on Computer Sciences

[27] A. Poduval, N. Rai, P. Khan, A. Sane, and T. Chaudhari, “A survey on different encryption techniques
for image, video, audio and docs,” International Journal of Engineering Applied Sciences and Technology,
2021.
[28] S. Sanap and V. More, “Analysis of encryption techniques for secure communication,” in 2021 Interna-
tional Conference on Emerging Smart Computing and Informatics (ESCI). IEEE, 2021, pp. 290–294.
[29] L. Da Xu, Y. Lu, and L. Li, “Embedding blockchain technology into iot for security: A survey,” IEEE Internet
of Things Journal, vol. 8, no. 13, pp. 10 452–10 473, 2021.

[30] H. Zhang, C. Liu, W. Zhang, G. Zheng, and Y. Yu, “Generalight: Improving environment generalization
of traffic signal control via meta reinforcement learning,” in Proceedings of the 29th ACM International
Conference on Information & Knowledge Management, 2020, pp. 1783–1792.
[31] C. Marchand, A. Aubert, L. Bossuet et al., “On the security evaluation of the arm trustzone extension
in a heterogeneous soc,” in 2017 30th IEEE International System-on-Chip Conference (SOCC). IEEE, 2017,
pp. 108–113.
[32] R. Nejjahi, N. Gherabi, and A. Marzouk, “Towards classification of web ontologies using the horizontal
and vertical segmentation,” in International Conference on Information Technology and Communication
Systems. Springer, 2018, pp. 70–81.

[33] Z. Hercigonja, “Comparative analysis of cryptographic algorithms,” International Journal of Digital Tech-
nology & Economy, vol. 1, no. 2, pp. 127–134, 2016.
[34] P. Hämäläinen, M. Hännikäinen, and T. D. Hämäläinen, “Review of hardware architectures for ad-
vanced encryption standard implementations considering wireless sensor networks,” in International
Workshop on Embedded Computer Systems. Springer, 2007, pp. 443–453.

[35] S.-S. Wang and W.-S. Ni, “An efficient fpga implementation of advanced encryption standard algo-
rithm,” in 2004 IEEE International Symposium on Circuits and Systems (ISCAS), vol. 2. IEEE, 2004, pp.
II–597.
[36] A. Kahate, Cryptography and Network security, 2003. Tata McGraw-Hill publishing Company Limited,
Eighth reprint, 2006.
[37] A. Jesudoss and N. Subramaniam, “A survey on authentication attacks and countermeasures in a
distributed environment,” Indian Journal of Computer Science and Engineering (IJCSE), vol. 5, no. 2, pp.
71–77, 2014.
[38] W. Stallings, Cryptography and network security, 4/E. Pearson Education India, 2006.

[39] L. Zhang, “Key management scheme for secure channel establishment in fog computing,” IEEE Trans-
actions on Cloud Computing, vol. 9, no. 3, pp. 1117–1128, 2019.
[40] T. Ecarot, S. Dussault, A. Souid, L. Lavoie, and J.-F. Ethier, “Apparmor for health data access control:
Assessing risks and benefits,” in 2020 7th International Conference on Internet of Things: Systems, Man-
agement and Security (IOTSMS). IEEE, 2020, pp. 1–7.
[41] B. Schneier, Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007.
[42] G. Conti, Security data visualization: graphical techniques for network analysis. No Starch Press, 2007.
[43] S. Ahmad, S. Mehfuz, and J. Beg, “Hybrid cryptographic approach to enhance the mode of key man-
agement system in cloud environment,” The Journal of Supercomputing, vol. 79, no. 7, pp. 7377–7413,
2023.

304
VAWKUM Transactions on Computer Sciences

[44] M. Campanelli, B. David, H. Khoshakhlagh, A. Konring, and J. B. Nielsen, “Encryption to the future:
a paradigm for sending secret messages to future (anonymous) committees,” in International Confer-
ence on the Theory and Application of Cryptology and Information Security. Springer, 2022, pp. 151–180.
[45] A. C. Cinar and T. B. Kara, “The current state and future of mobile security in the light of the recent
mobile security threat reports,” Multimedia Tools and Applications, pp. 1–13, 2023.
[46] S. J. Islam, Z. H. Chaudhury, and S. Islam, “A simple and secured cryptography system of cloud com-
puting,” in 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE). IEEE, 2019,
pp. 1–3.
[47] S. Nalajala, K. Akhil, V. Sai, D. C. Shekhar, and P. Tumuluru, “Light weight secure data sharing scheme
for mobile cloud computing,” in 2019 third international conference on I-SMAC (IoT in social, mobile,
analytics and cloud)(I-SMAC). IEEE, 2019, pp. 613–617.

[48] M. S. Darup, A. B. Alexandru, D. E. Quevedo, and G. J. Pappas, “Encrypted control for networked
systems: An illustrative introduction and current challenges,” IEEE Control Systems Magazine, vol. 41,
no. 3, pp. 58–78, 2021.
[49] M. Du, Q. Chen, J. Xiao, H. Yang, and X. Ma, “Supply chain finance innovation using blockchain,” IEEE
Transactions on Engineering Management, vol. 67, no. 4, pp. 1045–1058, 2020.

[50] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in
cloud computing,” IEEE transactions on Services Computing, vol. 5, no. 2, pp. 220–232, 2011.

305

View publication stats

You might also like