会议论文详细信息
2nd Nommensen International Conference on Technology and Engineering
Systematic literature review: comparison study of symmetric key and asymmetric key algorithm
Santoso, Priasnyomo Prima^1 ; Rilvani, Elkin^1 ; Trisnawan, Ahmad Budi^1 ; Adiyarta, Krisna^1 ; Napitupulu, Darmawan^1,2 ; Sutabri, Tata^3 ; Rahim, Robbi^4
Program Studi Magister Ilmu Komputer, Universitas Budi Luhur, Jakarta, Indonesia^1
Research Center for Quality System and Testing Technology, Indonesian Institute of Sciences, Banten, Indonesia^2
Fakultas Teknologi Informasi, Universitas Respati Indonesia, Jakarta, Indonesia^3
School of Computer and Communication Engineering, Universiti Malaysia Perlis, Malaysia^4
关键词: Asymmetric key;    Comparison study;    Cryptographic algorithms;    Encryption and decryption;    Symmetric keys;    Systematic literature review;    Third parties;   
Others  :  https://iopscience.iop.org/article/10.1088/1757-899X/420/1/012111/pdf
DOI  :  10.1088/1757-899X/420/1/012111
来源: IOP
PDF
【 摘 要 】

Cryptography is a science that studies how to keep data or messages safe when sent, from sender to recipient without interference from third parties. This paper presents a comparison of cryptographic algorithms of simetris keys and asymmetric keys. Cryptographic research related journals are collected and analyzed to find the correct comparison of cryptographic algorithms to implement. The results of this study, namely: symmetric and asymmetric keys have differences in the process of encryption and decryption. There are many cryptographic algorithms that can be applied to symmetric and asymmetric keys, but the selection and use of certain algorithms cannot be said to be forever the best because they depend on the circumstances encountered in developing the applied system.

【 预 览 】
附件列表
Files Size Format View
Systematic literature review: comparison study of symmetric key and asymmetric key algorithm 155KB PDF download
  文献评价指标  
  下载次数:22次 浏览次数:36次