2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE) 2014
DOI: 10.1109/icecce.2014.7086640
|View full text |Cite
|
Sign up to set email alerts
|

A comparative survey of Symmetric and Asymmetric Key Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
76
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 160 publications
(76 citation statements)
references
References 36 publications
0
76
0
Order By: Relevance
“…Generally, authentication protocols may be classified into three main groups [88]: (1) based on symmetric cryptosystems; (2) based on asymmetric cryptosystems; and (3) hybrid. The majority of those utilize hash functions as their basis, thus allowing to combine the secret information "shares" into one specific secret key.…”
Section: Authentication Methods For Massive Content Deliverymentioning
confidence: 99%
“…Generally, authentication protocols may be classified into three main groups [88]: (1) based on symmetric cryptosystems; (2) based on asymmetric cryptosystems; and (3) hybrid. The majority of those utilize hash functions as their basis, thus allowing to combine the secret information "shares" into one specific secret key.…”
Section: Authentication Methods For Massive Content Deliverymentioning
confidence: 99%
“…As is described in [2], having a larger key means more security due to the encrypted information will be more resistant to a brute force attack. However, computing a larger key also means more time, energy and resource consumption, which could lead to a lost in performance [3]. This fact makes asymmetric key algorithms have a stronger security level with a lower performance |104 Ingeniería y Ciencia in comparison with symmetric key algorithms, which demonstrated in [1].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, we can use the important advantages of these two algorithms such as the convenience and security of RSA secret key management, and AES high speed encryption [15] [16]. Additionally, we have execute HMAC function using the secret key and produced cipher text to attach the produced value at the end of encrypted message in order to send them to cloud server to insure the integrity and authenticity of message [17].…”
Section: Proposed Modelmentioning
confidence: 99%