RSA and Elliptic Curve Encryption System: A Systematic Literature Review

RSA and Elliptic Curve Encryption System: A Systematic Literature Review

Musa Ugbedeojo, Marion O. Adebiyi, Oluwasegun Julius Aroba, Ayodele Ariyo Adebiyi
Copyright: © 2024 |Pages: 27
DOI: 10.4018/IJISP.340728
Article PDF Download
Open access articles are freely available for download

Abstract

Almost every living species has a motive to communicate electronically with one another and preserve data for immediate or future use. These data are becoming too large to be maintained on personal storage devices. Technological innovation has cleared the path for vast, remote storage known as the cloud. This innovation is being provided as a service to people and organizations due to the high cost of investment and the high-tech skills needed for its maintenance. Despite the many benefits of cloud computing, data privacy, integrity, and access control are issues that require immediate attention. Many studies have been conducted in order to find solutions to these challenges. In this review, the authors look at the numerous methods that have been proposed to address these security challenges. The research revealed that elliptic curve cryptography and the advance encryption system (AES) were the techniques that were most frequently used to address security issues in the digital world.
Article Preview
Top

Introduction

Technology advancements have increased the volume of data stored by individuals and businesses. Due to the bulk, this data type could no longer be stored on microcomputers. Organizations and individuals have kept their high-volume data on a third-party cloud with ample storage capacity. While this problem has been solved for organizations and individuals, there is still the issue of data security, integrity, and access restrictions. Sebastian (2022) reported that data breaches costs the United States between $3.86 Million and $4.24 Million. The majority of these treats came from remote work. Researchers have devised several cryptographic algorithms for data security, integrity verification, and access control concerns. As technology improves daily, early cryptographic techniques appear unsuitable for modern-day advances, as various attacks (Alqahtan & Sheldon, 2022) on critical cryptographic systems have been reported. Cloud security challenges have been identified and categorized into security standards, network category, access control, cloud infrastructure, and data category (Khalil et al., 2014).

The rest of this review paper is organized as follows: We first review relevant cryptographic approaches. We then present our review methodology, outline our results and discussions, and conclude with crucial areas for additional work.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing