作者
Simrandeep Singh Thapar, Himali Sarangal
发表日期
2018/11/1
研讨会论文
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
页码范围
819-824
出版商
IEEE, DOI: 10.1109/IEMCON.2018.8614943
简介
The digital world is engulfed by the imminent threat from digital perpetrators. Cryptography and authentication is necessary for digital communication to make sure that connecting parties are the authorized ones to have access to the exclusive data or information. It can be enforced by using cryptography and authentication algorithms. We present a study of the data threats and the role of symmetric and asymmetric key algorithms which may be used to circumvent such threats. A comparison is presented to identify the pros and cons of these algorithms. It is observed that these algorithms are still in a nascent phase and are improving gradually.
引用总数
201920202021202220233131
学术搜索中的文章
SS Thapar, H Sarangal - 2018 IEEE 9th Annual Information Technology …, 2018