2020
DOI: 10.32890/jict2020.19.3.1
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Ofthings Applications: A Review

Abstract: Cryptography is described as the study of encrypting or secret writing of data using logical and mathematical principles to protect information. This technique has grown in importance in computing technologies for banking services, medical systems, transportation and other Internet of Things (IoT)based applications which have been subjected to increasing security concerns. In cryptography, each scheme is built with its own respective strength, but the implementation of single cryptographic scheme into the syst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 69 publications
0
9
0
Order By: Relevance
“…The ECC is utilized to encrypt and transfer the Private Keys as AES Private Keys while AES encrypts the plain text (communication data). The process is applied when an entity needs to encrypt/decrypt the message [ 37 , 38 ]. The encryption/decryption processes are shown in Figure 2 , and the steps are explained as follow: Data are the users’ information, i.e., their identities, passwords, and biometrics.…”
Section: Preliminariesmentioning
confidence: 99%
“…The ECC is utilized to encrypt and transfer the Private Keys as AES Private Keys while AES encrypts the plain text (communication data). The process is applied when an entity needs to encrypt/decrypt the message [ 37 , 38 ]. The encryption/decryption processes are shown in Figure 2 , and the steps are explained as follow: Data are the users’ information, i.e., their identities, passwords, and biometrics.…”
Section: Preliminariesmentioning
confidence: 99%
“…Mohamed [13] stated that communication devices must provide a strong communication capacity to secure data transmission of various data types to prevent cyber-attacks, including implementing cryptographic methods. As data transmission security, each cryptographic scheme is built with its strengths.…”
Section: Related Workmentioning
confidence: 99%
“…Mohamed [13] reviewed some of the hybrid cryptographic approach to data transmission security. As for comparison to the proposed method, as shown in Table 3.…”
Section: Speed Test Analysismentioning
confidence: 99%
“…To prevent cyberattacks, any data communication system must include strong data transmission security, perhaps using cryptography [54]. Every cryptographic scheme has its own strengths and weaknesses, and thus the application of a single cryptographic technique has severe shortcomings.…”
Section: Computer Sciencementioning
confidence: 99%