Universiti Teknologi Malaysia Institutional Repository

A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap

Gaithuru, J. N. and Bakhtiari, M. and Salleh, M. and Muteb, A. M. (2016) A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap. In: 9th Malaysian Software Engineering Conference, MySEC 2015, 16 December 2015 through 17 December 2015, Kuala Lumpur; Malaysia.

Full text not available from this repository.

Official URL: https://www.scopus.com/inward/record.uri?eid=2-s2....

Abstract

Information security has become a key concern for communication over public channels thus necessitating the use of cryptography to safeguard communication. In this paper, we present a comprehensive review of the asymmetric key algorithms, beginning from the inception of asymmetric cryptography in 1976 till the present day. This paper provides a description of their encryption and decryption operations, points out their security basis, areas of implementation, their strengths and weaknesses during operation. Finally, the paper pinpoints the existing gap based on conclusions drawn from the review, with particular emphasis on an algorithm most suited for industrial application given the current trends in cryptography towards quantum computing. This paper then narrows down on the earnest need for an algorithm that has no trade-off in encryption and decryption speeds, has low computation overhead and is secure enough to withstand quantum algorithm attacks.

Item Type:Conference or Workshop Item (Paper)
Uncontrolled Keywords:ECC, ElGamal, Knapsack, McEliece, NTRU, Public key cryptography, Rabin, RSA
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Computing
ID Code:73267
Deposited By: Muhammad Atiff Mahussain
Deposited On:23 Nov 2017 05:09
Last Modified:23 Nov 2017 05:09

Repository Staff Only: item control page