• DocumentCode
    3774355
  • Title

    A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap

  • Author

    Juliet N. Gaithuru;Majid Bakhtiari;Mazleena Salleh;Alwuhayd M. Muteb

  • Author_Institution
    Faculty of Computing, Universiti Teknologi Malaysia, 81310, Skudai, Johor Bahru, Malaysia
  • fYear
    2015
  • Firstpage
    236
  • Lastpage
    244
  • Abstract
    Information security has become a key concern for communication over public channels thus necessitating the use of cryptography to safeguard communication. In this paper, we present a comprehensive review of the asymmetric key algorithms, beginning from the inception of asymmetric cryptography in 1976 till the present day. This paper provides a description of their encryption and decryption operations, points out their security basis, areas of implementation, their strengths and weaknesses during operation. Finally, the paper pinpoints the existing gap based on conclusions drawn from the review, with particular emphasis on an algorithm most suited for industrial application given the current trends in cryptography towards quantum computing. This paper then narrows down on the earnest need for an algorithm that has no trade-off in encryption and decryption speeds, has low computation overhead and is secure enough to withstand quantum algorithm attacks.
  • Keywords
    "Encryption","Elliptic curve cryptography","Electronic mail"
  • Publisher
    ieee
  • Conference_Titel
    Software Engineering Conference (MySEC), 2015 9th Malaysian
  • Print_ISBN
    978-1-4673-8226-7
  • Type

    conf

  • DOI
    10.1109/MySEC.2015.7475227
  • Filename
    7475227