Investigation into Essential Technologies and Common Applications of Digital Encryption
- DOI
- 10.2991/978-94-6463-300-9_79How to use a DOI?
- Keywords
- Digital encryption; Encryption techniques; Encryption algorithms
- Abstract
This paper provides a thorough examination of diverse encryption techniques, algorithms, and protocols, offering a comprehensive understanding of the present landscape of encryption technology, its applications, challenges, and future possibilities. By meticulously analyzing the strengths and weaknesses inherent in different encryption methods, both researchers and practitioners can make informed decisions when it comes to selecting and implementing encryption approaches that align with their specific security needs. The study delves into various encryption techniques, such as symmetric key encryption, asymmetric key encryption, and homomorphic encryption, shedding light on their underlying principles and mechanisms. It explores prominent encryption algorithms like Advanced Encryption Standard (AES), Rivest-Shamir-Adleman (RSA), and Elliptic Curve Cryptography (ECC), discussing their features, performance, and suitability for different scenarios. Moreover, the analysis extends to encryption protocols employed in diverse domains, including secure communication protocols like Transport Layer Security (TLS) and Internet Protocol Security (IPsec), as well as cryptographic protocols like Secure Multiparty Computation (SMC) and Zero-Knowledge Proofs (ZKP). The examination of these protocols elucidates their role in ensuring confidentiality, integrity, and authenticity of data in various applications.
- Copyright
- © 2023 The Author(s)
- Open Access
- Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
Cite this article
TY - CONF AU - Tengye Xing PY - 2023 DA - 2023/11/27 TI - Investigation into Essential Technologies and Common Applications of Digital Encryption BT - Proceedings of the 2023 International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2023) PB - Atlantis Press SP - 756 EP - 765 SN - 2352-538X UR - https://doi.org/10.2991/978-94-6463-300-9_79 DO - 10.2991/978-94-6463-300-9_79 ID - Xing2023 ER -