2022
DOI: 10.14445/22315381/ijett-v70i8p219
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Algorithms for IoT Privacy: A Technical Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…It is important to remember that the security of an encryption system depends not only on the algorithm used but also on its implementation and management. Strong keys and good security practices are key components in keeping data safe when using encryption algorithms such as Unimodular Hill Cipher or RSA (Feng et al, 2021;Akinboboye et al, 2022).…”
Section: Fig 3: An Illustration Of the Combined Methods Of Unimodularmentioning
confidence: 99%
“…It is important to remember that the security of an encryption system depends not only on the algorithm used but also on its implementation and management. Strong keys and good security practices are key components in keeping data safe when using encryption algorithms such as Unimodular Hill Cipher or RSA (Feng et al, 2021;Akinboboye et al, 2022).…”
Section: Fig 3: An Illustration Of the Combined Methods Of Unimodularmentioning
confidence: 99%
“…One method commonly used in cryptography is symmetric encryption, which is an encryption method that uses one key to encrypt and decrypt messages. The key must guard confidentiality so that messages are encrypted no can be recovered by the party that is not authorized [2]. In addition, there is also an asymmetric encryption method, which uses two keys, namely the key public and the key private.…”
Section: Introductionmentioning
confidence: 99%