Proceedings of the 2023 International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2023)

Investigation into Essential Technologies and Common Applications of Digital Encryption

Authors
Tengye Xing1, *
1School of Economics and Management, Shanghai University of Electric Power, Shanghai, 200090, China
*Corresponding author. Email: jackyxing@mail.shiep.edu.cn
Corresponding Author
Tengye Xing
Available Online 27 November 2023.
DOI
10.2991/978-94-6463-300-9_79How to use a DOI?
Keywords
Digital encryption; Encryption techniques; Encryption algorithms
Abstract

This paper provides a thorough examination of diverse encryption techniques, algorithms, and protocols, offering a comprehensive understanding of the present landscape of encryption technology, its applications, challenges, and future possibilities. By meticulously analyzing the strengths and weaknesses inherent in different encryption methods, both researchers and practitioners can make informed decisions when it comes to selecting and implementing encryption approaches that align with their specific security needs. The study delves into various encryption techniques, such as symmetric key encryption, asymmetric key encryption, and homomorphic encryption, shedding light on their underlying principles and mechanisms. It explores prominent encryption algorithms like Advanced Encryption Standard (AES), Rivest-Shamir-Adleman (RSA), and Elliptic Curve Cryptography (ECC), discussing their features, performance, and suitability for different scenarios. Moreover, the analysis extends to encryption protocols employed in diverse domains, including secure communication protocols like Transport Layer Security (TLS) and Internet Protocol Security (IPsec), as well as cryptographic protocols like Secure Multiparty Computation (SMC) and Zero-Knowledge Proofs (ZKP). The examination of these protocols elucidates their role in ensuring confidentiality, integrity, and authenticity of data in various applications.

Copyright
© 2023 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the 2023 International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2023)
Series
Advances in Computer Science Research
Publication Date
27 November 2023
ISBN
10.2991/978-94-6463-300-9_79
ISSN
2352-538X
DOI
10.2991/978-94-6463-300-9_79How to use a DOI?
Copyright
© 2023 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Tengye Xing
PY  - 2023
DA  - 2023/11/27
TI  - Investigation into Essential Technologies and Common Applications of Digital Encryption
BT  - Proceedings of the 2023 International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2023)
PB  - Atlantis Press
SP  - 756
EP  - 765
SN  - 2352-538X
UR  - https://doi.org/10.2991/978-94-6463-300-9_79
DO  - 10.2991/978-94-6463-300-9_79
ID  - Xing2023
ER  -