Investigating the applicable security encryption algorithms

Message:
Article Type:
Research/Original Article (بدون رتبه معتبر)
Abstract:

Recently, the distributed internet applications under the scalable networks are growing rapidly, so the need to protect and secure such applications has also increased. Encryption algorithms are vital in today's cyber world, where there is always the risk of unauthorized access to all types of data. The most sensitive and vulnerable data is financial and payment system data, which can compromise personal identification information or customer payment card details and other personal information. Cryptographic algorithms are critical to protecting this information and reducing the risks that business face in conducting payment transactions. In fact, cryptographic algorithms play a major role in the information security of systems and the production of digital signatures. Existing digital signatures are often based on cryptographic algorithms and lead to the recognition of electronic information so that the identity of the author of the document and the comprehensiveness of its information can be reviewed and controlled. In this article, in addition to defining and classifying common cryptographic algorithms, we try to make a comparison on power and effectiveness of applicable algorithms in this area. This review and comparison can lead to improved functions and improved approaches to using these algorithms.

Language:
Persian
Published:
Arman Process Journal, Volume:2 Issue: 3, 2021
Pages:
21 to 29
https://magiran.com/p2391461