A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Cryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. These algorithms include DES, 3DES, AES, blowfish, two-fish, RC4, one-time pad, RSA, ECC, Diffie-Hellman, MD5, and SHA-256. To analy...
Saved in:
Main Authors: | Donagani Ramakrishna, Mohammed Ali Shaik |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10804125/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes
by: Ammar S. Alanazi, et al.
Published: (2021-01-01) -
Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos
by: Yuzhuo Zhao, et al.
Published: (2025-01-01) -
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
by: Zaffar Ahmed Shaikh, et al.
Published: (2024-01-01) -
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
by: Junling Pei, et al.
Published: (2023-05-01) -
New indifferentiability security proof of MDPH hash function
by: Chun Guo, et al.
Published: (2022-07-01)