The importance of encryption in most organizations, therefore, it became necessary to encrypt data because data security is an essential component in order to maintain the security of data and information in various institutions. Encryption also helps to ensure the confidentiality and integrity of data during transmission through communication channels. Given the importance of the keys used in encryption as a key part in the strength of the algorithm and increase its security in most encryption algorithms, thus generating the key in many research the most important part in data encryption and its importance lies in the non-duplication of keys to ensure better results and theoretically impossible to break. In this paper, we try to describe and review many of the papers that were used to create the keys and compare them with each other.
The mobile phone environment represents one of the important environments in encryption various multimedia (audio, image, and video) , and this depends on the type of algorithm used in the encryption process, as phones have limited memory and computational resources, Therefore the selection of the algorithm must be compatible with the mobile environment in terms of speed, safety and flexibility in addition to choosing an algorithm that The simplicity and safety of the image encryption process was investigated with lightweight and efficient computing. In this paper, Hybrid Cube Encryption (HiSec) was used. When implementing this algorithm in a smart phone environment, the results showed the ease of encrypting images and retrieving the original image, in addition to that it only requires small computational resources, and the algorithm was very effective in encrypting images on mobile phones. This suggested method has been implemented in the mobile environment with android OS. The proposed method has been programmed in JAVA, and the method has been tried on different types of mobile phones (such as Huawei Nova 2, Huawei Nova 7, HTC, NOT 8, Galaxy S 20, and HONOR).
Encryption technology is one of the main means of protecting information security and includes many forms in terms of digital signatures, authentication, system security, confidentiality and data integrity and other functions. Therefore, Encryption and decryption are the best solution to protect data, especially not only sensitive data and protect them from attackers who aim to steal information. In this paper we use asymmetric encryption algorithms such as (RSA, Elliptic Curve, NTRU) that are used to send data over the network to provide security to users. We work on a review of the algorithms mentioned because of their importance in the encryption side and will give a summary of the performance of its work.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.