全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Comparative Study of the Reliability and Complexity of Symmetrical and Asymmetrical Cryptosystems for the Protection of Academic Data in the Democratic Republic of Congo

DOI: 10.4236/jis.2024.153017, PP. 299-307

Keywords: Comparative Study, Cryptosystems, Symmetric Encryption, Asymmetric Encryption

Full-Text   Cite this paper   Add to My Lib

Abstract:

In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any modern company. A company’s operational and historical data contains strategic and operational knowledge of ever-increasing added value. The emergence of a new paradigm: big data. Today, the value of the data scattered throughout this mother of knowledge is calculated in billions of dollars, depending on its size, scope and area of intervention. With the rise of computer networks and distributed systems, the threats to these sensitive resources have steadily increased, jeopardizing the existence of the company itself by drying up production and losing the interest of customers and suppliers. These threats range from sabotage to bankruptcy. For several decades now, most companies have been using encryption algorithms to protect and secure their information systems against the threats and dangers posed by the inherent vulnerabilities of their infrastructure and the current economic climate. This vulnerability requires companies to make the right choice of algorithms to implement in their management systems. For this reason, the present work aims to carry out a comparative study of the reliability and effectiveness of symmetrical and asymmetrical cryptosystems, in order to identify one or more suitable for securing academic data in the DRC. The analysis of the robustness of commonly used symmetric and asymmetric cryptosystems will be the subject of simulations in this article.

References

[1]  National Bureau of Standards, U.S. Department of Commerce (2001) Advanced Encryption Standard (AES), Federal Information Processing Standard (FIPS), Publication 197. Washington DC.
https://csrc.nist.rip/publications/detail/fips/197/final
[2]  Medien, Z., Mohsen, M., Lazhar, K., Adel, B. and Rached, T. (2007) A Modified AES Based Algorithm for Image Encryption. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 1, 745-750.
[3]  Deamen, J. and Rijimen, V. (2002) The Design of Rijindal: AES-Advanced Encyption Standard (Information Security and Cryptography). Springer-Verlag, Berlin.
[4]  Han, F.L., Hu, J.K., Yu, X.H. and Wang, Y. (2007) Fingerprint Images Encryption via Multi-Scrollchaotic Attractors. Applied Mathematics and Computation, 185, 931-939.
https://doi.org/10.1016/j.amc.2006.07.030
[5]  Wang, Y., Wong, K.W., Liao, X.F. and Chen, G.R. (2011) A New Chaos-Based Fast Image Encryption Algorithm. Applied Soft Computing, 11, 514-522.
https://doi.org/10.1016/j.asoc.2009.12.011
[6]  Pareek, N.K., Patidar, V. and Sud, K.K. (2006) Image Encryption Using Chaotic Logistic Map. Image and Vision Computing, 24, 926-934.
https://doi.org/10.1016/j.imavis.2006.02.021
[7]  Yong, Z. (2011) Image Encryption with Logistic Map and Cheat Image. 2011 3rd International Conference on Computer Research and Development, Shanghai, 11-13 March 2011, 97-101.
[8]  Liu, L.L., Zhang, Q. and Wei, X.P. (2012) A RGB Image Encryption Algorithm Based on DNA Encoding and Chaos Map. Computers and Electrical Engineering, 38, 1240-1248.
https://doi.org/10.1016/j.compeleceng.2012.02.007
[9]  Ariffin, M. and Noorani, M. (2008) Modified Baptista Type Chaotic Cryptosystem via Matrix Secret Key. Physics Letters A, 372, 5427-5430.
https://doi.org/10.1016/j.physleta.2008.06.077
[10]  Lenstra, A.K. and Lenstra Jr., H.W. (1993) The Development of the Number Field Sieve. Springer, Berlin.
https://doi.org/10.1007/BFb0091534
[11]  Lenstra, A.K., Lenstra Jr., H.W. and Lov’asz, L. (1982) Factoring Polynomials with Rational Coefficients. Mathematische Annale, 261, 513-534.
https://doi.org/10.1007/BF01457454
[12]  Krikor, L., Baba, S., Arif, T. and Shaaban, Z. (2009) Image Encryption Using DCT and Stream Cipher. European Journal of Scientific Research, 32, 48-58.
[13]  Gutmann, P. (2011) Engineering Security. University of Auckland, Auckland.
[14]  ISO 27001 Information Security Management Systems.
https://www.intertek.com/assurance/iso-27001/?gad_source=1&gclid=EAIaIQobChMInIjsjp78hQMV3kFBAh2a0QjYEAAYAiAAEgK3gPD_BwE
[15]  ISO/IEC (2005) Information Security Management Systems—Requirements. 27001.
https://info.compliancepoint.com/iso-27001-certification?utm_term=iso 27001 certification&utm_campaign=ISO 27001&utm_source=adwords&utm_medium=ppc&hsa_acc=8022846127&hsa_cam=14298165258&hsa_grp=128815088111&hsa_ad=589060653560&hsa_src=g&hsa_tgt=kwd-3912594368&hsa_kw=iso 27001 certification&hsa_mt=p&hsa_net=adwords&hsa_ver=3&gad_source=1&gclid=EAIaIQobChMI-5rK3p78hQMVyz8GAB3-Gw7iEAAYAiAAEgLKFPD_BwE
[16]  ISO/IEC (2005) Information Technology. Code of Practice for Information Security Management. 17799.
https://webstore.ansi.org/standards/iso/isoiec177992005?gad_source=1&gclid=EAIaIQobChMIrpbJxp_8hQMVlz4GAB1iAAUjEAAYAyAAEgIsDvD_BwE
[17]  Llorens, C., Levier, L. and Valois, D. (2006) Tableaux de bordaux de la sécurité réseau. Eyrolles, Paris.
[18]  Longeon, R. and Archimbaud, J.L. (1999) Guide de la sécurité des systèmes Information—For Managers. Center National de la Recherche Scientifique (CNRS), Paris.
[19]  Lucas, M.W. (2006) PGP & GPG—Assurer la confidentialité de ses e-mails et de ses fichiers. Eyrolles, Paris.
[20]  Mattatia, F. (2013) Personal Data Processing: The Legal Guide. Eyrolles, Paris.
[21]  Eastaway, R. and Wyndham, J. (2001) Why Do Buses Always Come in Threes? Flammarion, Paris, 95-107.
[22]  Hill, L.S. (1929) Cryptography in an Algebraic Alphabet. American Mathematical Monthly, 36, 306-312.
https://doi.org/10.1080/00029890.1929.11986963
[23]  Edward, L.R. (2000) Cryptological Mathematics. The Mathematical Association of America, Washington DC, 124-140.
https://doi.org/10.1090/clrm/016
[24]  Douglas, S. (2001) Cryptographie, Théorie et pratique. Vuibert, Paris, 12-16.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413