2019 8th International Conference on Information and Communication Technologies (ICICT) 2019
DOI: 10.1109/icict47744.2019.9001945
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Literature Review of Data Encryption Techniques in Cloud Computing and IoT Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…The 56-bit keys required by the original DES symmetric encryption technique were insufficient by 1999 to fend against actual brute force attacks. For a total key length of 168 bits, Triple DES calls for the usage of three different DES keys [7].…”
Section: Triple Data Encryption Standard (Des) Algorithmmentioning
confidence: 99%
“…The 56-bit keys required by the original DES symmetric encryption technique were insufficient by 1999 to fend against actual brute force attacks. For a total key length of 168 bits, Triple DES calls for the usage of three different DES keys [7].…”
Section: Triple Data Encryption Standard (Des) Algorithmmentioning
confidence: 99%
“…Rijndael algorithm have been selected as the AES by NIST in 2001 among several encryption candidates to be the official standard [9], [31]. Data are encrypted-decrypted on 128-bit blocks using a secret key of three options, 128, 192, or 256 bits' length.…”
Section: Aesmentioning
confidence: 99%
“…Other works suggest using lightweight encryption as a low-power, memory-efficient encryption standard that requires low computing power [6]. In [7], [8], two comprehensive reviews have been conducted on the literature relating to encryption standards used for IoT applications. The reviews concluded that classic encryption standards like AES, DES, RSA and TDES cannot be used efficiently due to their complex implementation requiring large memory and high computing facilities.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As with any asymmetric technique, RSA uses two key pairs for encrypting and decrypting data. The data are encrypted with a public key shared with other users, while the private key is only used to decrypt the data and must be secret [37]. The encryption and decryption processes in the RSA algorithm could be calculated as follows:…”
Section: Rivest-shamir-adleman (Rsa) Algorithmmentioning
confidence: 99%