2023
DOI: 10.1007/978-3-031-28073-3_42
|View full text |Cite
|
Sign up to set email alerts
|

Python Cryptographic Secure Scripting Concerns: A Study of Three Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…One drawback is the relatively slow execution speed compared to other programming languages that use direct compilation. Although Python has optimized performance by using interpreters and other techniques, in some cases that require large data processing or complex calculations, Python may not be as fast as other programming languages that are closer to machine language (LaMalva et al, 2023;Saraswat and Raj, 2021). Also, because Python is a dynamic language, meaning that variable types do not need to be declared explicitly, this can cause some problems during debugging if a variable is miswritten or an unwanted data type change occurs.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…One drawback is the relatively slow execution speed compared to other programming languages that use direct compilation. Although Python has optimized performance by using interpreters and other techniques, in some cases that require large data processing or complex calculations, Python may not be as fast as other programming languages that are closer to machine language (LaMalva et al, 2023;Saraswat and Raj, 2021). Also, because Python is a dynamic language, meaning that variable types do not need to be declared explicitly, this can cause some problems during debugging if a variable is miswritten or an unwanted data type change occurs.…”
Section: Methodsmentioning
confidence: 99%
“…By combining these two methods, this research can provide a more comprehensive understanding of how similar or different the original text and the encrypted text are, so that it can provide valuable insights into evaluating the quality of the encryption method used. By using simple short text and long text from the "lorem.txt" file, we can present comprehensive and relevant results on the effectiveness and security of the combination of the Unimodular Hill Cipher and RSA methods in the text encryption process (LaMalva et al, 2023;Saraswat and Raj, 2021;Patel, 2022;Jatmoko et al, 2018).…”
Section: Fig 3: An Illustration Of the Combined Methods Of Unimodularmentioning
confidence: 99%