2020
DOI: 10.37896/jxat12.03/262
|View full text |Cite
|
Sign up to set email alerts
|

Comparing Symmetric and Asymmetric cryptography in message encryption and decryption by using AES and RSA algorithms

Abstract: One of the common problems of sharing resources over a data communication network is security. Generally sharing information's and resources over a network between a huge number of users is important especially in computer science and engineering field, and this becomes a critical problem for data security. Nowadays many algorithms used for encryption and decryption of data. Cryptography algorithms are divided into symmetric and asymmetric algorithms based on the key used between the sender and receiver of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…The higher the entropy value, the more difficult it is for third parties to deduce or access the encrypted data or keys. Formula for entropy as illustrated in (3).…”
Section: Entropymentioning
confidence: 99%
See 1 more Smart Citation
“…The higher the entropy value, the more difficult it is for third parties to deduce or access the encrypted data or keys. Formula for entropy as illustrated in (3).…”
Section: Entropymentioning
confidence: 99%
“…In spite of the fact that advances in information technology continue to increase the complexity of managing with progressively advanced cyber dangers, they open up many opportunities for advancement [1], [2]. Cryptography [3]- [6] could be a field that examines scientific strategies related to the angles of information and data security, such as information reliability and authentication. Cryptography studies how communication is carried out so that individuals as it are have the correct to use or access the data sent and depends intensely on numerical theory and computer applications [7].…”
Section: Introductionmentioning
confidence: 99%