2020
DOI: 10.17577/ijertv9is080328
|View full text |Cite
|
Sign up to set email alerts
|

A Survey for Comparative Analysis of various Cryptographic Algorithms used to Secure Data on Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Key k 1 uses the least, i.e., 128 bits, and k 2 uses the most, i.e., 128 bits. The values of x 0 and c for each key are derived from the hash using Equation (6) to Equation (9). In these equations, x 0,k 1 and c k 1 denote the Least and Most 64 bits of k 1 , respectively.…”
Section: Encryption Stepsmentioning
confidence: 99%
See 1 more Smart Citation
“…Key k 1 uses the least, i.e., 128 bits, and k 2 uses the most, i.e., 128 bits. The values of x 0 and c for each key are derived from the hash using Equation (6) to Equation (9). In these equations, x 0,k 1 and c k 1 denote the Least and Most 64 bits of k 1 , respectively.…”
Section: Encryption Stepsmentioning
confidence: 99%
“…Homomorphic encryption is a more complex method that allows computations to be performed on encrypted data without the need for decryption [7], which is primarily meant for noncryptographers. The process of encryption is commonly judged by how strong the proposed method is in terms of protection against different types of attacks [8,9]. It involves the use of an encryption mechanism using an encryption key, a communication channel for data transmission, a decryption system, and a key to decrypt the encrypted data.…”
Section: Introductionmentioning
confidence: 99%
“…Homomorphic encryption is a more complex method that allows computations to be performed on encrypted data without the need for decryption [7] that is primarily meant for non-cryptographers. The process of encryption is a commonly judged by the way how strong the proposed method stands for protection against different types of attacks [8,9]. It involves the use of an encryption mechanism using an encrypt key, a communication channel for data transmission, a decryption system, and a key to decrypt the encrypted data.…”
Section: Of 16mentioning
confidence: 99%
“…Chaudhary et al 19 conducted an efficiency comparison of cryptographic algorithms such as DES, 3DES, AES, RSA, DH, and hybrid approaches such as dual RSA, AES‐RSA, and RSA‐AES‐DS. The study concluded that symmetric algorithms are more efficient than asymmetric algorithms, and hybrid techniques are less efficient but more safe.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As stated by the author 70 Based on numerous survey characteristics, the comparison of different cryptographic methods for cloud data security is shown in Table 2. Key size, block size, number of rounds, execution time, key utilized, and memory use are the criteria taken into account.…”
Section: Cryptographic Techniques In Cloud Computingmentioning
confidence: 99%