A Survey on Cryptography
2024, Conference
Abstract
This survey presents a comprehensive examination of diverse encryption and decryption techniques, encompassing historical methods like DES to modern approaches such as elliptic curve cryptography and genetic algorithms applied to 3-DES encryption. The paper explores the operational principles, security features, and practical considerations of each cryptographic method, shedding light on strengths, potential vulnerabilities, and real-world applicability. Key aspects such as encryption and decryption efficiency, security mechanisms, and the interplay between symmetric and asymmetric cryptography are addressed. The survey aims to guide researchers, practitioners, and policymakers in making informed decisions for robust and secure data communication and storage. Additionally, the paper identifies potential areas for future research, emphasizing advanced encryption techniques, secure key management, and the integration of cryptographic methods to address emerging challenges in data security.
References (20)
- Hamza and B. Kumar, "A Review Paper on DES, AES, RSA Encryption Standards," 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), Moradabad, India, 2020, pp. 333-338, doi: 10.1109/SMART50582.2020.9336800.
- Maqsood, Faiqa & Ahmed, Muhammad & Mumtaz, Muhammad & Shah, Munam. (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal of Advanced Computer Science and Applications. 8. 10.14569/IJACSA.2017.080659.
- M. Srinivas and S. Porika, "Encryption and decryption using elliptic curves for public key cryptosystems," 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2017, pp. 1300-1303, doi: 10.1109/ICCONS.2017.8250678.
- E. Jintcharadze, T. Sarajishvili, A. Surmanidze and D. Khojava, "Implementation and Comparative Analysis of Symmetric Encryption Model Based on Substitution Cipher Techniques," 2021 IEEE East-West Design & Test Symposium (EWDTS), Batumi, Georgia, 2021, pp. 1-6, doi: 10.1109/EWDTS52692.2021.9580978.
- J. Li, Y. Wang, Y. Zhang and J. Han, "Full Verifiability for Outsourced Decryption in Attribute Based Encryption," in IEEE Transactions on Services Computing, vol. 13, no. 3, pp. 478-487, 1 May-June 2020, doi: 10.1109/TSC.2017.2710190.
- Yang W, Wang S, Cui H, Tang Z, Li Y. A Review of Homomorphic Encryption for Privacy-Preserving Biometrics. Sensors (Basel). 2023 Mar 29;23(7):3566. doi: 10.3390/s23073566. PMID: 37050626; PMCID: PMC10098691.
- Wang, Wei & Hu, Yin & Chen, Lianmu & Huang, Xinming & Sunar, Berk. (2015). Exploring the Feasibility of Fully Homomorphic Encryption. IEEE Transactions on Computers. 64. 698-706. 10.1109/TC.2013.154.
- G. Feng, L. Lang, Y. Si and K. Wang, "The Research of Dynamic Encryption & Decryption Methods Based on the Binary Random Hash," 2019 International Conference on Information Technology and Computer Application (ITCA), Guangzhou, China, 2019, pp. 180-183, doi: 10.1109/ITCA49981.2019.00046.
- A. M. Qadir and N. Varol, "A Review Paper on Cryptography," 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Barcelos, Portugal, 2019, pp. 1-6, doi: 10.1109/ISDFS.2019.8757514.
- Y. Lin, X. Xia and J. Yang, "Document Encryption Method with Mechanism of Enigma Machine," 2021 International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA), Xi'an, China, 2021, pp. 259-262, doi: 10.1109/CAIBDA53561.2021.00061.
- Alenezi, Mohammed & Alabdulrazzaq, Haneen & Mohammad, Nada. (2020). Symmetric Encryption Algorithms: Review and Evaluation study. International Journal of Communication Networks and Information Security. 12. 256.
- Gamido, Heidilyn & Sison, Ariel & Medina, Ruji. (2018). Modified AES for Text and Image Encryption. 11. 942-948. 10.11591/ijeecs.v11.i3.pp942-948.
- Patil, Priyadarshini & Narayankar, Prashant & Narayan, DG & S M, Meena. (2016). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science. 78. 617-624. 10.1016/j.procs.2016.02.108.
- R. K. Meyers and A. H. Desoky, "An Implementation of the Blowfish Cryptosystem," 2008 IEEE International Symposium on Signal Processing and Information Technology, Sarajevo, Bosnia and Herzegovina, 2008, pp. 346-351, doi: 10.1109/ISSPIT.2008.4775664.
- N. M. M. Alhag and Y. A. Mohamed, "An Enhancement of Data Encryption Standards Algorithm (DES)," 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), Khartoum, Sudan, 2018, pp. 1-6, doi: 10.1109/ICCCEEE.2018.8515843.
- Wang, Li & Jiang, Guangling. (2019). The Design of 3-DES Encryption System Using Optimizing Keys. 56-58. 10.1109/AIAIM.2019.8632786.
- Ratnadewi, Ratnadewi & Adhie, Roy & Hutama, Yonatan & Ahmar, Ansari & Setiawan, Muhammad. (2018). Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC). Journal of Physics: Conference Series. 954. 012009. 10.1088/1742-6596/954/1/012009.
- Priti V. Bhagat, Kaustubh S. Satpute, Vikas R. Palekar, "Reverse encryption algorithm: a technique for encryption & decryption", Volume 2 Issue 1 -January 2013
- M. Thangavel, P. Varalakshmi, Mukund Murrali, K. Nithya, An Enhanced and Secured RSA Key Generation Scheme (ESRKGS), Journal of Information Security and Applications, Volume 20, 2015
- R. S. Dhakar, A. K. Gupta and P. Sharma, "Modified RSA Encryption Algorithm (MREA)," 2012 Second International Conference on Advanced Computing & Communication Technologies, Rohtak, India, 2012, pp. 426-429, doi: 10.1109/ACCT.2012.74.