2021
DOI: 10.1080/03772063.2021.1990141
|View full text |Cite
|
Sign up to set email alerts
|

Efficiency Analysis of Cryptographic Algorithms for Image Data Security in Cloud Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 34 publications
0
0
0
Order By: Relevance
“…DES, on the other hand, has a limited key length of 56 bits, making it vulnerable to brute force attacks as computing power advances (Ghosh et al, 2018). This vulnerability has led to the rise of alternative encryption algorithms like Advanced Encryption Standard (AES) with larger key lengths (Rahul & Kuppusamy, 2021).…”
Section: Introductionmentioning
confidence: 99%
“…DES, on the other hand, has a limited key length of 56 bits, making it vulnerable to brute force attacks as computing power advances (Ghosh et al, 2018). This vulnerability has led to the rise of alternative encryption algorithms like Advanced Encryption Standard (AES) with larger key lengths (Rahul & Kuppusamy, 2021).…”
Section: Introductionmentioning
confidence: 99%