Visible to the public Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms

TitleComprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms
Publication TypeConference Paper
Year of Publication2017
AuthorsYassein, M. B., Aljawarneh, S., Qawasmeh, E., Mardini, W., Khamayseh, Y.
Conference Name2017 International Conference on Engineering and Technology (ICET)
Keywords3DES, AES, Asymmetric Encryption, Blowfish, Ciphers, Classification algorithms, cloud computing, compositionality, cryptography, decryption, DES, Diffie-Hellman and RSA, DSA, elliptic curve, Encryption, Human Behavior, Metrics, private and public key encryption, pubcrawl, Public key, resilience, Resiliency, Standards, Three-dimensional displays
Abstract

Cloud computing emerged in the last years to handle systems with large-scale services sharing between vast numbers of users. It provides enormous storage for data and computing power to users over the Internet. There are many issues with the high growth of data. Data security is one of the most important issues in cloud computing. There are many algorithms and implementation for data security. These algorithms provided various encryption methods. In this work, We present a comprehensive study between Symmetric key and Asymmetric key encryption algorithms that enhanced data security in cloud computing system. We discuss AES, DES, 3DES and Blowfish for symmetric encryption algorithms, and RSA, DSA, Diffie-Hellman and Elliptic Curve, for asymmetric encryption algorithms.

URLhttps://ieeexplore.ieee.org/document/8308215/
DOI10.1109/ICEngTechnol.2017.8308215
Citation Keyyassein_comprehensive_2017