A Comprehensive Analysis of Cryptographic Algorith
A Comprehensive Analysis of Cryptographic Algorith
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2017.DOI
A Comprehensive analysis of
Cryptographic Algorithms: Evaluating
Security, Efficiency, and Future
Challenges
DONAGANI RAMAKRISHNA1, MOHAMMED ALI SHAIK 1.
1
SR University, Warangal, Telangana-506371, India (e-mail: [email protected])
Corresponding author: Donagani Ramakrishna (e-mail: [email protected])
ABSTRACT Cryptographic techniques are reviewed in this literature study, with particular attention paid
to their applicability, Importance, contributions, And field strengths. These algorithms include DES,
3DES, AES, Blowfish, Two-fish, RC4, One-time pad, RSA, ECC, Diffie-Hellman, MD5, and SHA-256. To
analyze these algorithms ’ Efficiency, A comparative study is carried out utilizing crucial factors
including security, secrecy and integrity. The assessment Also examines known flaws and prospective
attack for each algorithm, as well as highlighting current methods and future research gaps. The study
provides insightful inform on the advantages and disadvantages of different algorithms with a thorough
diagram that summarises performance outcomes based on secrecy, integrity and Security. Additionally,
each algorithm‘s issues are covered in the review, giving readers a clear grasp of their limitations and
possible areas for future.
INDEX TERMS Advanced Encryption Standard, Blowfish, Chaotic Cryptography, Cryptanalysis, Denial
of Service Attack, Hash Functions, RSA Algorithm, Data Intigrity.
I. INTRODUCTION
A. APPLICATION SPANS
Cryptographic techniques form the basis of many different
T HIS process of cryptographic algorithms from
classical to modern methods shows the continuous
progress in protecting digital information. This summary of
kinds of modern technologies, providing essential security
and privacy functions across various applications.
the literature focus on the importance of cryptographic In the domain of financial software and enterprise resource
hashing mecha- nisms, symmetric and asymmetric planning (ERP) systems, cryptographic algorithms ensure the
encryption approaches in managing the secrecy, integrity protection of sensitive financial data and secure
and data consistency. While the design and progress of transactions.
algorithms like DES, AES, RSA, ECC, and Diffie-Hellman [1] They are also pivotal in data warehouse technology and
Show the practical difficulties and advancements in the report preparation systems, safeguarding critical
area, the historical context supplied by the one-time-pad information throughout the data life cycle.
reveals the theoretical under-planning of unbreakable In machine learning, cryptographic methods are employed
encryption, Furthermore, the shift from weak hash to secure the tuning of training parameters and design
algorithms like MD5 to strong substitutes like SHA-256 optimal neural network structures. they facilitate image
highlights how crucial it is to keep improving cryptographic processing and are crucial for maximising or minimising
standards. specific func- tions. These algorithms also help in adjusting
Through this comprehensive review the paper aims to iden- model param- eters, distributing resources efficiently, and
tify key research gaps and potential areas for future explo- optimising net- work configurations and routing protocols
ration contributing to the ongoing development of secure to enhance overall system performance. [2], [3], [4], [5]
cryptographic practises in an increasingly digital world. Secure file storage Utilizes cryptographic techniques across
various domains, including data transmission protocols,
web applications, and database security solutions; these
methods also ensure the protection of mobile applications,
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
API secu- content may change prior to final publication. Citation information: DOI
VOLUME 4, 2016 1
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
rity, and content management systems [CMS], as well as E- faster encryption and decryption processes that assure better
commerce platforms and IOT device security. [6], [7], [8]. information security [24].
Key management is crucial in cryptographic algorithms, es- Various studies contribute to improving secure messag-
pecially during key generation, the encryption process, and ing and information security through modified AES algo-
security testing. For emerging technologies like the Internet rithms. One presents a lightweight AES algorithm evaluated
of Things (IoT) and autonomous vehicles, these algorithms on FPGA for efficient resource utilization and minimized
are essential in areas like cloud computing, robotics, latency [25]. Another presents an inventive approach to
machine vision, smart home automation, and video strengthening image security in IoT services, protecting the
surveillance. They also play a significant role in improving confidentiality and fidelity visual data [4] . Additionally, a
facial recognition systems and enabling advanced medical research deals with digital image privacy while transmitting
diagnostics. [4], [9], [10], [11][12]. by enhancing image encoding efficiency and security with a
Data encryption is essential for secure communications, file modified AES algorithm [5]. Finally, an AES-based image
encryption, and cryptographic protocols, making sure that encoding method is exhibited to protect sensitive image
private information is kept safe and secret while it is being data from illegal entry in a collection of vital applications
transmitted [13]. This includes advanced applications such [26].
as digital image enciphering, secure image transmission, One study highlights a hybrid chaotic blowfish encryption
and secure image storage [14]. technique that improves the security of digital images, espe-
In the realm of real time communications, cryptographic cially in Aerial imagery, by combining chaotic dynamics
algorithms secure audio chat applications, real time audio with classic techniques [12]. Another study highlights
streaming, and cyber security solutions. They are also Blowfish’s superior speed over DES in wireless sensor
crucial for maintaining the confidentiality of image data and networks and its improved performance with a random key
support- ing smart card security and data integrity. [15], generator for image encryption [27]. Additionally, it is
[16], [17] Advanced encryption techniques such as honey emphasized how important strong key management and
encryption, homomorphic encryption, and DNA encryption advanced data analyt- ics are to maintaining the secrecy and
address com- plex security challenges. These methods are integrity of large-scale data applications and cryptographic
used in smart city surveillance and other high security systems.[28] Demonstrates the use of integers in the
environments. [18], [19]. Vernam cipher to enhance system security through simple
Blockchain technology relies on cryptographic algorithms encryption and de- cryption processes [29]. A novel
like SHA-256 for high performance blockchain platforms mechanism integrating the one-time-pad technique to
and satellite chain formation algorithms, ensuring the in- improve NTSA communication security and performance
tegrity and security of digital records [20]. Similarly, cryp- in IOT systems, addressing key exchange challenges and
tocurrencies utilize cryptography for data security, data in- supporting high security solutions [30]. Additionally, the
tegrity, and digital signatures, while ASIC implementation robustness of the OTP is explored as a means to ensure
and optimization techniques enhance hardware performance unbreakable security in data storage and transmission
[21], [22]. within cloud computing environments [31].
Develops a protocol for storage and energy-efficient, safe
B. SIGNIFICANCE
communication of electronic health records (HER), address-
Numerous studies underscore the importance of the DES ing security and efficiency challenges in medical data man-
algorithm. One addresses the need for robust data protec- agement [7]. Another study proposes a statistical criterion
tion in financial reporting by enhancing the security of us- ing conditional entropies to identify and evaluate
accounting data through encryption methods [1]. Another vulnerabil- ities in RC4 output sequences against iterative
explores nature-inspired meta-heuristic algorithms for the probabilistic attacks [32]. Additionally, it is RC4 GGHN
cryptanalysis of S-DES, demonstrating their efficiency in Cryptography technique provides a reliable and secure way
solving NP-hard problems [2]. Moreover, duration for en- to encrypt communications, enhancing communication
cryption and decryption is significantly reduced in this system‘s data security and processing speed [8].
study‘s high-performance reconfigurable hardware imple- A novel method for increasing the security and complexity
mentation of DES applied on FPGA devices [23]. of the two-fish algorithm by creating a new key scheduling
The strength of 3DES is analyzed in several studies. One scheme that strengthens its defences against cryptographic
study explores the improved genetic algorithm (IGA) for attacks.[13]In Order to further secure communication prac-
securing exponential algnment in time delay systems, im- tises and addresses data security problems in the digital era,
proving safety communication through chaotic concurrence different study provides a strong and effective encryption
and ciphering methods [3]. A further study provides a com- solution for digital images [14]. Furthermore, It is shown
parative analysis of 3DES and Fernet data protection meth- how well this algorithm Secures audio chat Conversations,
ods, proposal insights into their performance for securing Addressing important cyber security issues with real-time
restricted information [6]. As well, an advanced 3DES algo- voice transmission[15]
rithm is noted for its advancements in web security, A novel approach Combining symmetric cryptography with
featuring SHA-256 Hashing to enhance data security in multimedia
communication, Providing a robust defence against hacking
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
2 VOLUME 4,
2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
and breeches [33]. Another study presents a distributed ponential synchronization and optimal performance in time
RSA encryption algorithm that boosts data security and delay chaotic systems, enhancing secure communication
processing efficiency for massive data sets, Addressing the through effective message retrieval and disturbance mini-
limitations of traditional methods[16]. Additionally, The mization [3] It also evaluates and compares The
RK-RSA Algo- rithm is shown to effectively secure and effectiveness of symmetric encryption techniques,
ensure the confiden- tiality of Aadhar card images, With especially 3DES,and Fernet provides guidance on selecting
improved performance metrics for cryptographic appropriate methods for securing sensitive data [6]
applications [17]. Additionally, the study creates a novel method based on
A text encryption algorithm combining Diffie Hellman and Rubik’s cube for creating 3DES keys. Enhancing the
AES for enhanced security [18]. Another study presents an security and effectiveness of encryption [24].
optimized encryption approach for wireless sensor To improve image security in IoT applications, a multiple
networks, reducing computational and response times while key AES encryption method called MECCAES is
preventing various attacks [19]. Additionally, it explores presented, which successfully reduces risks associated with
security in the cloud concerns and solutions, with a focus on single-key encryption [4]. It also introduces a novel image
SaaS, PaaS, and IaaS models[34]. encryption method using a modified AES algorithm that
A lightweight ECC-based cryptographic algorithm to en- reduces com- putational complexity and improves
hance security for resource-constrained IoT applications, Ad- encryption speed [5]. Additionally, the paper presents a
dressing challenges in data protection and secure communi- robust AES encryption and decryption framework
cation [35]. Another study proposes a novel group security specifically designed to protect confidential image data
algorithm using ECC to improve data transmission security during transmission and storage [26]. In order to improve
and processing speed through M-gram Selection [36]. Ad- confusion and dispersion while lowering costs, an
ditionally, adaptable hardware layout that combines current encryption technique that combines Blowfish with Henon
algorithms and ECC, boosting cryptographic efficiency and and Chen chaotic systems is introduced [12]. It also
security for IoT and embedded systems [37]. demonstrates blowfish’s superior performance over DES in
A machine learning framework using MD5 hash signatures wireless sensor networks, particularly with a random key
for early detection of advanced persistent threats (APTs) generator for image data [27]. Traditionally hit surveys,
with 99% accuracy, Enhancing Cyber Security [38] . An- key management schemes, and big data analytics proposing
other study improves MD5 collision detection efficiency solutions to enhance security and efficiency [28].
and reduces costs by 8.18% with additional conditions [39]. The Vernam Cypher uses integers to make the encryption
Additionally, a medical service data [MSD] framework that and decryption processes simple to do [29] It also develop
enhances medical data integration and analysis for better a lightweight cryptographic mechanism using the On -time-
dis- ease classification and personalized recommendations pad (OTP) to enhance security and efficiency in NTSA for
[40] The significance lies in its multi-mem SHA-256 resource constrained IOT devices along with a simplified
accelerator and new hash code architecture that improves key exchange protocol [30]. Additionally, the paper
system-on- chip (SoC) performance by addressing data showcases the practical use of the One-time-pad in cloud
transfer bottle- necks and improving processing rates computing to provide theoretically unbreakable data
[21]. It also offers a comprehensive evaluation of SHA- security for sensitive information [31].
256 hardware imple- mentations, providing insights into A secure communication and encrypted storage algorithm
performance optimiza- tions for theoretical, ASIC, and for enhancing electronic health records (EHR) security and
FPGA platforms [22]. Ad- ditionally, the paper explores efficiency in medical IOT environments [7]. It also presents
the use of this algorithm in a parallel blockchain a Q-statistic for assessing the vulnerability of RC4 output
technique for securely keeping land- related records by sequences to cryptographic attacks [32] and details the RC4
addressing manual process challenges and improving the GGHN algorithm, which improves encryption speed and
security and efficiency of land record keeping [20] efficiency while ensuring robust security for varying
message lengths [8].
C. CONTRIBUTIONS
A new key scheduling method for two-fish algorithm is
The approach enhances accounting data security by apply- proposed, which creates unique subkeys for each block, for
ing the DES algorithm to protect financial information and the algorithm‘s security and efficiency [13]. Additionally, it
integrating reporting technology with data warehouses for improves digital picture encryption by increasing the
improved management [1]. It also compares nature inspired mathe- matical complexity of this technique by the use of
metaheuristic algorithms for cryptanalyzing S-DES, sophisti- cated S- boxes, which improves security and
showing their effectiveness in solving NP-hard problems efficiency [14]. Furthermore, by encrypting and decrypting
[2]. Addi- tionally, this algorithm is presented in this paper audio chat, the study provides an efficient implementation
in a high- performance FPGA-based implementation that of two-fish to enhance the confidentiality and integrity of
drastically cuts down on the amount of time needed for both voice communi- cation over the Internet [15].
encryption decryption.[23] Data security is improved by the studies presentation of a
The improved genetic algorithm ( IGA) that achieves ex- secure online framework that uses RSA and SHA-256 To
VOLUME 4, 2016 3
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
through a modified
protect multimedia data [33], a distributed RSA algorithm
on Hadoop to address storage and encryption speed
constraints [16], and the RK-RSA algorithm to improve
image security in Aadhar cards with improved performance
metrics [17].
With This work, a novel text encryption algorithm is cre-
ated. It combines AES techniques with an enhanced Diffie-
hellmen to boost security [18]. It also proposes an
encryption approach that reduces computational and
response times, making it ideal for wireless sensor network
(WSN) security while countering various attack types [19].
Additionally, the paper introduces a verification
configuration for the design of cloud technology. to tackle
security concerns and ensure safe information storage. and
transmission with lower computa- tion costs [34].
Elliptic curve cryptography is paired with a linear
congruen- tial methodology to create a lightweight
encryption technol- ogy that improves IoT security while
lowering calculations [35], a group security approach using
ECC for faster encryp- tion and decryption [36], and a
unified hardware architecture for ECC and PRESENT
algorithms to optimize key genera- tion and data encryption
with better resource utilization[37]. Cybersecurity with a
machine learning-based detection framework using MD5
hash signatures to improve accu- racy and response times
against advanced persistent threats (APTs) [38]. It also
advances cryptographic research by identifying additional
conditions in MD5’s second round to enhance collision
detection efficiency [39]. Additionally, it introduces an
improved K-nearest neighbors algorithm (CML-KNN) for
multi label learning, leveraging disease cor- relations. To
improve recommendation accuracy in medical service data
systems [40].
A high-performance multi-mem SHA-256 accelerator that
minimizes data transfer time through advanced techniques
[21], evaluates SHA-256 hardware across theoretical, ASIC
and FPGA platforms for optimization insights [22], and
develops a secure SHA-256 based digitized system using
blockchain technology for enhanced land document security
[20].
D. FIELD STRENGTH
DES and 3DES, enhancing financial software security [1]
Innovatively applies meta-heuristic algorithms like cuckoo
search, firefly, and black-hole optimization for S-DES
crypt- analysis [2] and demonstrates a high-speed,
reconfigurable DES implementation on FPGA devices [23].
Time delay synchronization combined with 3DES encryption
and a fuzzy observer strengthens communication security
by making it more complex and resistant to attacks [3].
Underscores the importance of symmetric encryption for
data security [6] and enhances 3DES performance by
53.54% through a novel Rubik’s cube-based key generation
method [24].
A thorough assessment of multiple-key AES encryption
tech- nique is carried out, demonstrating its efficiency in
enhancing image security for IoT applications [4]. It also
presents an innovative approach to image encryption
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
demonstrating its efficiency in secure data encryption
AES algorithm, untracing modern challenges in digital across various message lengths and key sizes [8].
image security and privacy [5]. Additionally, the study The main scheduling architecture of the two-fish algorithm
explores AES techniques tailored for image data, tackling is thoroughly examined and refined to meet current security
security is- sues, and practical implementation across various issues in cryptographic systems [13]. it also innovatively
application areas [26]. enhances two fish by integrating advanced cryptographic
By combining chaotic systems with cryptographic algo- techniques for digital image security, contributing to the
rithms, information security can be improved, especially broader field of cryptography and information security [14].
when it comes to safeguarding satellite imagery [12].it also Additionally, the paper demonstrates two fish’s efficiency
compares DES and Blowfish, showing Blowfish’s superior and reliability in securing audio chat for real time
speed and encryption for wireless sensor networks [27]. communication environments [15].
Additionally, it examines classical and modern cryptographic Secure data transmission and user authentication are en-
algorithms with big data analytics to address current hanced by employing advanced hashing and RSA
security challenges [28]. encryption techniques [33]. it also innovatively enhances
In vernam cipher cryptography, integers are creatively used RSA encryp- tion through distributed computing on the
to improve system security through simple encoding and Hadoop platform, boosting encryption speed and scalability
decoding [29]. it also combines high-security encryption for massive data processing [16]. Additionally, the paper
with lightweight cryptographic techniques, specifically applies the Runge- Kutta method combined with RSA for
addressing the challenges of IoT environments [30]. image encryption, specifically for Aadhar card encryption
Additionally, the paper focuses on this technique, offering a [17].
blend of theoreti- cal security and practical applicability for By applying the Diffie-Hellman method twice with a strong
safeguarding data in cloud computing [31]. shared secret key, cryptographic security is improved [18],
Advanced cryptographic techniques are integrated with improves wireless sensor network (WSN) security by re-
energy-efficient communication protocols for the secure ducing computational and response times while preventing
management of digital medical records in the medical IoT attacks [19] and proposes a cloud computing verification
[7]. It also intersects information theory and cryptography configuration to address security threats and optimize data
by analyzing stream cipher security using entropy-based protection computational time, and cost[34].
met- rics [32] Additionally, the source includes a Efficient cryptography techniques optimized for limited de-
comprehensive analysis of the RC4 GGHN technique, vices improve IoT cybersecurity[35], integrates ECC with
4 VOLUME 4,
2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
VOLUME 4, 2016 5
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
TABLE 1. Detailed summary of cryptographic algorithms, data sets, sources, and features
6 VOLUME 4,
2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
TABLE 3. Analysis of 3DES algorithm, Techniques, Research Gaps, and Attacks explored
VOLUME 4, 2016 7
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
DES-key Integration,
It needs to investigate the
suggested key generation
Substitutions Layer,
approaches residents to target the key schedule ,
[53] MODIFIED AES and MD5 various assaults, Study its linear cryptanalysis,
MD5 Hash Function,
scalability and address any
potential limitations or
Statistical Tests,
vulnerabilities
Attack Simulations
Practical evaluation of the
enhanced AES-256 Algorithm Side-Channel Attacks,
Enhanced AES-256 Cipher examine the Performance and Known-Plaintext
[10] AES-256 cipher Attacks, Differential
Round Algorithm efficiency of IoT in real-world
scenarios compatibility across Cryptanalysis
diverse IoT platforms and
devices
investigating the adaptability brute force attacks,
and resilience of the AES-256 cryptanalysis attacks,
AES-256 cryptographic algorithm
algorithm in the face of emerging and unauthorized data
[11] in conjunction with Android- AES-256 cybersecurity threats and evolving access attempts by
based application
technological landscapes in e- providing robust encryption
voting systems. and data protection
mechanisms.
More in-depth analysis of the
scalability to larger Key Timing attack, side
Pipelined key expansion architecture seizes, a detailed security channel attack, Algebraic
[54] AES 128 bit block assessment, Attacks, Fault Injection
for AES encryption
comparison to cutting-edge techniques, Attacks, Cache Timing
Exploration into real- world Attacks
implementation challenges
exploring the adaptability and
performance of the Multiple Key Known-Plain text key extraction
[4] Multi-Key AES Encryption AES-128 bits AES algorithm in dynamic IoT attacks, chosen-plain text key
environments with varying network extraction attacks
conditions and security
requirements.
Exploring the integration of
hardware security features,
such as physical
FPGA-based System-on-Chip (SoC)
unclonable functions Exhaustive key search attacks,
Design, Xilinx Vivado Design Suite,
(PUFs), secure key storage known plain text cryptanalysis,
[55] VHDL Implementation, Pipelined High-performance AES-128 algorithm mechanisms, and side- Chosen-plaintext cryptanalysis,
Approach, Post-Implementation
channel attack Differential cryptanalysis techniques
and Post-Synthesis Simulations
countermeasures, directly
into the FPGA-based AES-
128 implementation for
enhanced
security in 5G communication systems.
Investigate the suggested fault
detection methods scalability
Composite Field-based S-Box, and adaptability in various
Arithmetic Report Approach, hardware platforms and Differential Fault Analysis (DFA)
Polynomial Residue Number scenarios to evaluate its Attacks, Hidden Channel Assaults
[56] Systems (PRNS), AES-128 efficiency and suitability (Side-Channel Analysis, SCA) ,Intrusive
Relationship Leveraging, Temporal for a range of environments. Attacks, Non-intrusive Attacks.
Redundancy-Based Scheme The method‘s robust security
features and rapid key
exchange
procedures contribute to its usability.
Integrating P-AES With novel
technologies like Blockchain
or edge processing cloud be Implementation attacks,
A Polymorphic Advanced
[57] AES-128 a promising topic of future Side-channel attacks,
Encryption Standard
research to improve data Linear attacks
security and privacy in
expanding digital ecosystems
Investigating advanced safety
features and performance
optimization methods to
Adaptive iterative encryption improve the AES image Related-key attack, Known-key
[26] with key-specific rounds AES encryption framework to attack against AES-128
provide robust protection
against increasing cyber
attacks and increased efficiency
Testing the model with various
A hybrid encryption method types of data kept in clouds
AES-Fernet Hybrid data exposure, data theft, data
combining AES and Fernet And evaluating the use of
[58] Algorithm with Concurrent forging, data manipulation,
with concurrent neural different hybrid algorithms
Neural Networks (CNN) and image loss
network (CNN) connectivity for encryption and
decryption processes
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication.the encryption
Citation process forDOI
information: Brute force exploits,
securing large volumes Differential cryptanalysis
[59] Fixed-Block SPN Encryption AES-128,192,256 of medical data in real-time attacks, Linear cryptanalysis
healthcare systems. techniques
Evaluate the algorithm’s
real-world performance, Brute force assaults,
robustness against advanced Differential Cryptanalysis,
[5] modified version AES AES Known-Plaintext exploits,
attacks, and explore
8 integration with blockchain or Chosen-Plaintext exploitVs OLUME 4,
AI for enhanced image 2016
security
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
VOLUME 4, 2016 9
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
Cryptanalysis Attacks,
Broader Testing, Optimization,
[64] Modified f Function, Custom S-Box, modified version of the Blowfish algorithm Real-World Applications
Differential Cryptanalysis,
Linear Cryptanalysis
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
10 VOLUME 4,
2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
TABLE 6. Table 6: Analysis of ONE TIME PAD algorithm, technique, Research Gaps, and Attacks explored
VOLUME 4, 2016 11
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
12 VOLUME 4,
2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
TABLE 8. Table 8: Examining Two-fish algorithm, Techniques, Research Gap, Attacks Explored
VOLUME 4, 2016 13
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
TABLE 9. examining the RSA algorithm, Technique, Research gap, attacks explored
14 VOLUME 4,
2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
TABLE 10. Diffie Hellman Algorithm analysis, used Technique, Research Gap, Explored attacks
VOLUME 4, 2016 15
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
TABLE 11. ECC algorithm analysis, Technique, Research Gap, attacks investigated
16 VOLUME 4,
2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
TABLE 12. Table 12: Analysis of MD5 algorithm, Technique, Research gap, attacks explored
TABLE 13. Analysis SHA-256 algorithm, technique, Research gap, Attacks explored.
VOLUME 4, 2016 17
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
18 VOLUME 4,
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
2016 content may change prior to final publication. Citation information: DOI
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
TABLE 14. An assessment of the security, integrity, and confidentiality of cryptographic algorithms
VOLUME 4, 2016 19
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
techniques develop. content may change prior to final publication. Citation information: DOI
20 VOLUME 4,
2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
V. CONCLUSION
[15] A. A. Nurdin and D. Djuniadi, “Securing Audio Chat With Cryptool-
Key cryptographic techniques, such as DES, 3DES, AES, Based Twofish Algorithm,” Journal of Soft Computing Exploration, vol.
Blowfish, Twofish, RC4, one-time pad, RSA, ECC, Diffie- 3, no. 1,
pp. 37–43, Mar. 2022, doi: 10.52465/joscex.v3i1.65.
Hellman, MD5, and SHA-256, are thoroughly evaluated in [16] Y. Xu, S. Wu, M. Wang, and Y. Zou, “Design and implementation of
this study with an emphasis on their services and distributed RSA algorithm based on Hadoop,” J Ambient Intell Humaniz
applications ranges. We created a thorough table that Comput, vol. 11, no. 3, pp. 1047–1053, Mar. 2020, doi: 10.1007/s12652-
018-1021-y.
outlines methods, areas for further research, and [17] R. Felista Sugirtha Lizy, V. Joseph Raj, and A. Professor, “Image Encryp-
investigated threats. We also created a chart and scoring tion Using RK-RSA Algorithm in Aadhaar Card,” 2021.
system to evaluate each algo- rithm‘s confidentiality, [18] K. N. Kishore and S. Chhetri, “A Novel Text Encryption Algorithm using
enhanced Diffie Hellman and AES,” International Journal of Advance
integrity, and security. According to the investigation, MD5 Research in Computer Science and Management Studies, vol. 8, no. 6,
was determined to be less dependable due to its 2020, [Online]. Available: www.ijarcsms.com
vulnerability to attacks, while AES and RSA offer better [19] S. Ali et al., “An efficient cryptographic technique using modified
Diffie–Hellman in wireless sensor networks,” Int J Distrib Sens Netw,
performance in terms of security and data protection, vol. 16, no. 6, Jun. 2020, doi: 10.1177/1550147720925772.
making them more appropriate for modern applications. [20] F. Jahan, M. Mostafa, and S. Chowdhury, “SHA-256 in Parallel
These results highlight the necessity of further research to Blockchain Technology: Storing Land Related Documents,” Int J Comput
Appl, vol. 175, no. 35, pp. 33–38, Dec. 2020, doi:
close known gaps and enhance cryptographic techniques in 10.5120/ijca2020920911
order to guarantee strong data security in a changing threat [21] T. H. Tran, H. L. Pham, and Y. Nakashima, “A High-Performance Mul-
environment. timem SHA-256 Accelerator for Society 5.0,” IEEE Access, vol. 9, pp.
39182–39192, 2021, doi: 10.1109/ACCESS.2021.3063485
[22] H. L. Pham, T. H. Tran, T. D. Phan, V. T. Duong Le, D. K. Lam,
REFERENCES and Y. Nakashima, “Double SHA-256 Hardware Architecture with Com-
pact Message Expander for Bitcoin Mining,” IEEE Access, vol. 8, pp.
[1] Retraction: Accounting Data Encryption Processing Based on
139634–139646, 2020, doi: 10.1109/ACCESS.2020.3012581
Data Encryption Standard Algorithm (Complexity (2021) 2021
[23] S. R. M. Zeebaree, “DES encryption and decryption algorithm imple-
(7212688) DOI: 10.1155/2021/7212688),” 2023, Hindawi Limited.
mentation based on FPGA,” Indonesian Journal of Electrical Engineer-
doi: 10.1155/2023/9856582
ing and Computer Science, vol. 18, no. 2, pp. 774–781, 2020, doi:
[2] R. Kamal, M. Bag, and M. Kule, “On the cryptanalysis of S-DES using
10.11591/ijeecs.v18.i2.pp774-781.
nature inspired optimization algorithms,” Evol Intell, vol. 14, no. 1, pp.
[24] S. M. Saadi, “A Modern mechanism for Generating 3DES Algorithm
163–173, Mar. 2021, doi: 10.1007/s12065-020-00417-5.
Keys Based on Rubik’s Cube,” Int J Sci Res Sci Eng Technol, pp. 180–
[3] F. H. Hsiao, “Applying 3DES to Chaotic Synchronization Cryptosys-
188, Nov. 2022, doi: 10.32628/ijsrset22966
tems,” IEEE Access, vol. 10, pp. 1036–1050, 2022, doi: 10.1109/AC-
[25] K. Kumar, K. R. Ramkumar, and A. Kaur, “A lightweight AES algo-
CESS.2021.3137356.
rithm implementation for encrypting voice messages using field pro-
[4] K. G. Salim, S. M. K. Al-Alak, and M. J. Jawad, “Improved image
grammable gate arrays,” Journal of King Saud University - Computer
security in internet of thing (IOT) using multiple key AES,” Baghdad
and Information Sciences, vol. 34, no. 6, pp. 3878–3885, Jun. 2022, doi:
Science Jour- nal, vol. 18, no. 2, pp. 417–429, 2021, doi:
10.1016/j.jksuci.2020.08.005.
10.21123/BSJ.2021.18.2.0417.
[26] P. Gaur, “AES Image Encryption (Advanced Encryption Standard),” Int J
[5] A. Gupta and A. Gupta, “A New Technique of Image Encryption using Res Appl Sci Eng Technol, vol. 9, no. 12, pp. 1357–1363, Dec. 2021, doi:
Modified AES Algorithm,” 2021. [Online]. Available: https://www.ciir.in 10.22214/ijraset.2021.39542.
[6] S. Munirah Mohd et al., “THE PERFORMANCE OF THE 3DES AND [27] A. E. Adeniyi, S. Misra, E. Daniel, and A. Bokolo, “Computational
FERNET ENCRYPTION IN SECURING DATA FILES,” J Theor Appl Complexity of Modified Blowfish Cryptographic Algorithm on Video
Inf Technol, vol. 15, no. 3, 2024, [Online]. Available: www.jatit.org Data,” Algorithms, vol. 15, no. 10, Oct. 2022, doi: 10.3390/a15100373
[7] J. Zhang, H. Liu, and L. Ni, “A Secure Energy-Saving Communication [28] R. Walia, P. Garg, and M. Kumar, “Blowfish based encryption model in
and Encrypted Storage Model Based on RC4 for EHR,” IEEE Access, real cloud environment,” Journal of Autonomous Intelligence, vol. 6, no.
vol. 8, 3, 2023, doi: 10.32629/jai.v6i3.695
pp. 38995–39012, 2020, doi: 10.1109/ACCESS.2020.2975208. [29] P. D. P. Silitonga and S. Pakpahan,
[8] S. An-Nissa, H. Mawengkang, and S. Efendi, “RC4 GGHN Cryptography “http://infor.seaninstitute.org/index.php/infokum/index INFOKUM is
Algorithm for Message Security,” vol. 6, no. 2, 2022, doi: 10.30743/in- licensed under a Creative Commons Attribution-Non Commercial
fotekjar.v6i2.4531. 4.0 International License (CC BY-NC 4.0) Application of
[9] K. Kumar, K. R. Ramkumar, and A. Kaur, “A lightweight AES algo- Integers in Vernam Cipher Cryptography (One Time Pad),”
rithm implementation for encrypting voice messages using field pro- JURNAL INFOKUM, vol. 9, no. 2, 2021, [Online]. Available:
grammable gate arrays,” Journal of King Saud University - Computer http://infor.seaninstitute.org/index.php/infokum/index
and Information Sciences, vol. 34, no. 6, pp. 3878–3885, Jun. 2022, doi: [30] M. A. Al-Shareeda, S. Manickam, and M. A. Saare, “Enhance-
10.1016/j.jksuci.2020.08.005. ment of NTSA Secure Communication with One-Time Pad (OTP)
[10] S. M, M. L. K, and M. S. G M, “Enhanced AES-256 cipher round in IoT,” Informatica (Slovenia), vol. 47, no. 1, pp. 1–10, 2023, doi:
algorithm for IoT applications,” The Scientific Temper, vol. 14, no. 01, 10.31449/inf.v47i1.4463.
pp. 184–190, Mar. 2023, doi: 10.58414/scientifictemper.2023.14.1.22. [31] A. N. Bhavana Kumari HalavathBalaji Ch S N Iyengar, “One Time
Ed., Pad Encryption Technique in Cryptography.” [Online]. Available:
[11] F. N. Amrulloh and Y. Asriningtias, “Implementation of AES-256 Al- www.milestoneresearch.in
gorithm in Android-Based E-Voting Data Security,” Jurnal Penelitian [32] E. J. Madarro-Capó, C. M. Legón-Pérez, O. Rojas, and G. Sosa-Gómez,
Pendidikan IPA, vol. 9, no. 9, pp. 7757–7766, Sep. 2023, doi: “Information theory based evaluation of the rc4 stream cipher outputs,”
10.29303/jp- pipa.v9i9.4543 Entropy, vol. 23, no. 7, Jul. 2021, doi: 10.3390/e23070896.
[12] S. Z. Abbas, H. Ibrahim, and M. Khan, “A hybrid chaotic blowfish [33] “A Novel Approach for Encryption and 2022”.
encryption for high-resolution satellite imagery,” Multimed Tools Appl, [34] H. Chaudhary, H. Chaudhary, and A. Kumar Sharma, “Optimized Genetic
vol. 80, no. 17, pp. 26069–26091, Jul. 2021, doi: 10.1007/s11042-021- Algorithm and Extended Diffie Hellman as an Effectual Approach for
10898-w. DOS-Attack Detection in Cloud,” International Journal of Software En-
[13] A. A. Hattab and A. H. Saieed, “Developing the Complexity and gineering and Computer Systems, vol. 8, no. 1, pp. 69–78, Jan. 2022, doi:
Security of the Twofish Algorithm Through a New Key Scheduling 10.15282/ijsecs.8.1.2022.7.0097.
Design,” Iraqi Journal of Science, pp. 5923–5939, Nov. 2023, doi: [35] R. H. Aswathy and N. Malarvizhi, “A design of lightweight ECC based
10.24996/ijs.2023.64.11.37. cryptographic algorithm coupled with linear congruential method for
[14] T. U. Haq, T. Shah, G. F. Siddiqui, M. Z. Iqbal, I. A. Hameed, and H. resource constraint area in IoT,” J Ambient Intell Humaniz Comput, vol.
Jamil, “Improved Twofish Algorithm: A Digital Image Enciphering Ap- 14, no. 5, pp. 5097–5106, May 2023, doi: 10.1007/s12652-020-02788-0.
plication,” IEEE Access, vol. 9, pp. 76518–76530, 2021, doi:
10.1109/AC- CESS.2021.3081792
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
VOLUME 4, 2016 content may change prior to final publication. Citation information: DOI 21
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
[36] P. C. Sethi, N. Sahu, and P. K. Behera, “Group security using ECC,” [57] A. Altigani, S. Hasan, B. Barry, S. Naserelden, M. A. Elsadig, and
International Journal of Information Technology (Singapore), vol. 14, no. H. T. Elshoush, “A Polymorphic Advanced Encryption Standard - A
2, pp. 955–963, Mar. 2022, doi: 10.1007/s41870-021-00613-1. Novel Approach,” IEEE Access, vol. 9, pp. 20191–20207, 2021, doi:
[37] M. Rashid, O. S. Sonbul, M. Arif, F. A. Qureshi, S. S. Alotaibi, and 10.1109/ACCESS.2021.3051556.
M. [58] Pronika and S. S. Tyagi, “Enhancing security of cloud data through
H. Sinky, “A Flexible Architecture for Cryptographic Applications: ECC encryption with AES and fernet algorithm through Convolutional-
and PRESENT,” Computers, Materials and Continua, vol. 76, no. 1, pp. Neural-Networks (CNN),” International Journal of Computer Net-
1009–1025, 2023, doi: 10.32604/cmc.2023.039901. works and Applications, vol. 8, no. 4, pp. 288–299, Aug. 2021, doi:
[38] R. C. Veena and S. H. Brahmananda, “A Significant Detection of APT 10.22247/ijcna/2021/209697.
us- ing MD5 Hash Signature and Machine Learning Approach,” [59] B. Langenberg, H. Pham, and R. Steinwandt, “Reducing the Cost of
International Journal of Engineering Trends and Technology, vol. 70, no. Implementing the Advanced Encryption Standard as a Quantum Cir-
4, pp. 95–106, cuit,” IEEE Transactions on Quantum Engineering, vol. 1, 2020, doi:
Apr. 2022, doi: 10.14445/22315381/IJETT-V70I4P208 10.1109/TQE.2020.2965697.
[39] L. Fang et al., “Improved collision detection of MD5 with additional su [60] C. Kumar and A. Raghuwanshi, “Issue 3 www.jetir.org (ISSN-2349-
fficient conditions,” Electronic Research Archive, vol. 30, pp. 2018–2032, 5162),” JETIR, 2021. [Online]. Available: www.jetir.org
2022, doi: 10.3934/era.2022102. [61] T. F. G. Quilala and R. L. Quilala, “Modified blowfish algorithm analysis
[40] “MEDICAL DATA SECURITY USING MD5 ALGORITHM,” Interna- using derivation cases,” Bulletin of Electrical Engineering and
tional Research Journal of Modernization in Engineering Technology and Informatics, vol. 10, no. 4, pp. 2192–2200, Aug. 2021, doi:
Science, Sep. 2023, doi: 10.56726/irjmets44844. 10.11591/EEI.V10I4.2292.
[41] M. Barhoush, B. Alguni, R. Hammad, M. Fawareh, and R. Hassan, [62] A. P. Cahyani and A. Susanto, “A Good Result for Blowfish Image
“DES22: DES BASED ALGORITHM WITH IMPROVED SECURITY,” Encryption Based on Stepic,” Advance Sustainable Science, Engineering
Jordanian Journal of Computers and Information Technology, no. 0, p. 1, and Technology, vol. 6, no. 1, p. 0240107, Dec. 2023, doi: 10.26877/as-
2022, doi: 10.5455/jjcit.71-1632868199 set.v6i1.17332.
[42] H. K. A. Alsuwaiedi and A. M. S. Rahma, “A new modified DES [63] “UTILIZING MULTI-STAGE AUTHENTICATION AND AN OPTI-
algorithm based on the development of binary encryption functions,” MIZED BLOWFISH ALGORITHM FOR EFFECTIVE SECURE DATE
Journal of King Saud University - Computer and Information Sciences, RETRIEVAL ON CLOUD COMPUTING”, doi: 10.5281/zenodo.777958.
vol. 35, no. 8, Sep. 2023, doi: 10.1016/j.jksuci.2023.101716. [64] A. Samod, “Modified Blowfish Algorithm,” 2022. [Online]. Available:
[43] Z. Lu, “Encryption Management of Accounting Data Based on des Al- www.ijisrt.com
gorithm of Wireless Sensor Network,” Wirel Commun Mob Comput, vol. [65] L. Sun, X. Lu, P. Liu, J. Wu, X. You, and X. Tao, “Approaching
2022, 2022, doi: 10.1155/2022/7203237 Shannon’s One-Time Pad: Metrics, Architectures, and Enabling
Technologies,” Mar. 2023, [Online]. Available:
[44] “Retraction: Accounting Data Encryption Processing Based on
http://arxiv.org/abs/2303.06359
Data Encryption Standard Algorithm (Complexity (2021) 2021
[66] G. Li, Z. Zhang, J. Zhang, and A. Hu, “Encrypting Wireless Communica-
(7212688) DOI: 10.1155/2021/7212688),” 2023, Hindawi Limited.
tions On the Fly Using One-Time Pad and Key Generation.”
doi: 10.1155/2023/9856582.
[67] A. M. Al-Smadi, A. Al-Smadi, R. M. Ali Aloglah, N. Abu-Darwish, and
[45] S. Arshad and M. Khan, “New extension of data encryption standard
A. Abugabah, “Files cryptography based on one-time pad algorithm,”
over 128-bit key for digital images,” Neural Comput Appl, 2021, doi:
International Journal of Electrical and Computer Engineering, vol. 11, no.
10.1007/s00521-021-06023-5.
3, pp. 2335–2342, Jun. 2021, doi: 10.11591/ijece.v11i3.pp2335-2342.
[46] N. Tihanyi, “Report on the First DES Fixed Points for Non-Weak Keys:
[68] Z. Indra and R. Cyra Nabila, “Implementation of the RSA Algorithm
Case-Study of Hacking an IoT Environment,” IEEE Access, vol. 10, pp.
and the One Time Pad Algorithm for Text Message Security,” Formosa
77802–77809, 2022, doi: 10.1109/ACCESS.2022.3192399.
Journal of Science and Technology (FJST), vol. 2, no. 1, p. 379, 2023,
[47] D. Chowdhury et al., “DeCrypt: a 3DES inspired optimised crypto- doi: 10.55927/fjst.v2i1.2999.
graphic algorithm,” J Ambient Intell Humaniz Comput, vol. 14, no. 5, pp. [69] B. Singh, G. Athithan, and R. Pillai, “On extensions of the one-time-pad,”
4745–4755, May 2023, doi: 10.1007/s12652-022-04379-7. 2021.
[48] “Bit-level Parallelization of 3DES Encryption on GPU”. [70] L.: Jurnal, T. Komputer, A. Simangunsong, and R. M. Simanjorang,
[49] “Retracted: Application Research of Data Encryption Algorithm in Com- “Sim- ulation of The Application of Intelligence in Vernam Cipher
puter Security Management,” Wirel Commun Mob Comput, vol. 2023, Cryptography (One Time Pad),” vol. 15, no. 1, pp. 2723–8695, 2021.
pp. 1–1, Jul. 2023, doi: 10.1155/2023/9829526. [71] L. Kumar, S. Kumar Mandal, O. Singh, and S. Giri Murugan, “A Se-
[50] S. A. Shawkat, B. A. Tuama, and I. Al-Barazanchi, “Proposed system cure Communication with One Time Pad Encryption and Steganography
for data security in distributed computing in using triple data encryption Method in Cloud,” 2021.
standard and Rivest Shamir Adlemen,” International Journal of Electrical [72] S. Kareem and A. M. Rahma, “A Modification on Key Stream Generator
and Computer Engineering, vol. 12, no. 6, pp. 6496–6505, Dec. 2022, doi: for RC4 Algorithm,” Engineering and Technology Journal, vol. 38, no.
10.11591/ijece.v12i6.pp6496-6505. 2B,
[51] W. A. Awadh, M. S. Hashim, and A. S. Alasady, “Implementing the pp. 54–60, Jul. 2020, doi: 10.30684/etj.v38i2b.404.
Triple-Data Encryption Standard for Secure and Efficient Healthcare Data [73] S. Sulistiyanto, I. Satriadi, and A. Rahman, “Electronic Archive Design
Storage in Cloud Computing Environments,” Informatica, vol. 48, no. 6, With RC4 Cryptographic Based File Security,” Journal of Computer
Apr. 2024, doi: 10.31449/inf.v48i6.5641. Networks, Architecture and High Performance Computing, vol. 6, no. 1,
[52] M. A. Xiangliang et al., “Differential Fault Analysis on 3DES Middle pp. 34–44, Dec. 2023, doi: 10.47709/cnahpc.v6i1.3298.
Rounds Based on Error Propagation,” Chinese Journal of Electronics, vol. [74] L.-Y. Deng, D. Bowman, C.-C. Yang, H. Horng, and S. Lu, “EXTEND-
31, no. 1, pp. 68–78, Jan. 2022, doi: 10.1049/cje.2021.00.117. ING RC4 TO CONSTRUCT SECURE RANDOM NUMBER GENERA-
[53] H. Rahmah Zagi Asst Abeer Tariq Maolood, “A New Key Generation to TORS.”
Greate Enhanced Security Version of AES Encryption Method.” [75] N. Sharma, P. Kumar, K. Gautam, and T. Author, “Implementation of
[54] T. M. Kumar and P. Karthigaikumar, “Implementation of a high-speed Stream Cipher RC4 in the Regime of Quantum Communication with
and high-throughput advanced encryption standard,” Intelligent Automa- QKD,” 2023, doi: 10.21203/rs.3.rs-3023177/v1.
tion and Soft Computing, vol. 31, no. 2, pp. 1025–1036, 2022, doi: [76] W. A. Sutrisno, R. A. G. Gultom, and Y. Dwi Wardana, “Implementation
10.32604/iasc.2022.020090. of Text Message Security for Ordering Weapons with the RC4 Algorithm
[55] P. Visconti, R. Velazquez, S. Capoccia, and R. De Fazio, “High- Method,” Journal on Education, vol. 06, no. 02, pp. 14861–14872, 2024.
performance AES-128 algorithm implementation by FPGA-based SoC [77] H. H. Al-Badrei and I. S. Alshawi, “Improvement of RC4 Security Algo-
for 5G communications,” International Journal of Electrical and Com- rithm.”
puter Engineering, vol. 11, no. 5, pp. 4221–4232, Oct. 2021, doi: [78] E. J. Madarro-Capó, C. M. Legón-Pérez, O. Rojas, and G. Sosa-
10.11591/ijece.v11i5.pp4221-4232 Gómez, “Measuring avalanche properties on RC4 stream cipher vari-
[56] M. Bedoui, H. Mestiri, B. Bouallegue, B. Hamdi, and M. Mach- ants,” Applied Sciences (Switzerland), vol. 11, no. 20, Oct. 2021, doi:
hout, “An improvement of both security and reliability for AES im- 10.3390/app11209646.
plementations,” Journal of King Saud University - Computer and In- [79] S. Jiang and E. Kumar, “RC4 Technique Based Biomedical Cell Image
formation Sciences, vol. 34, no. 10, pp. 9844–9851, Nov. 2022, doi: Cryptography Investigation,” 2024.
10.1016/j.jksuci.2021.12.012. [80] K. R. D. Ramachandraiah, N. J. Bommagani, and P. K. Jayapal, “Enhanc-
ing Healthcare Data Security in IoT Environments Using Blockchain and
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
22 VOLUME 4,
2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
DCGRU with Twofish Encryption,” Information Dynamics and Applica- raphy (ECC) 1,” IJCSNS International Journal of Computer Science
tions, vol. 2, no. 4, pp. 173–185, Dec. 2023, doi: 10.56578/ida020402.
[81] R. L. R. Maata, R. S. Cordova, and A. Halibas, “Performance Analysis
of Twofish Cryptography Algorithm in Big Data,” in ACM International
Conference Proceeding Series, Association for Computing Machinery,
Nov. 2020, pp. 56–60. doi: 10.1145/3436829.3436838.
[82] S. Chakrabarti and S. Babu, “Security Threat Detection and Cryptanalysis
of Dynamic and Random S Box Based Two-Fish Algorithm,”
International Journal of Advanced Trends in Computer Science and
Engineering, vol. 10, no. 2, pp. 1073–1078, doi:
10.30534/ijatcse/2021/831022021.
[83] A. Sayed, M. Mahrous, and E. Elgeldawi, “Split-n-Swap: A New
Modification of the Twofish Block Cipher Algorithm,” Computers,
Materials and Continua, vol. 74, no. 1, pp. 1723–1734, 2023, doi:
10.32604/cmc.2023.032838.
[84] D. Kumar, “Two Fish Encryption Based Blockchain Technology for Se-
cured Data Storage.”
[85] R. Lin and S. Li, “An Image Encryption Scheme Based on Lorenz
Hyperchaotic System and RSA Algorithm,” Security and Communication
Networks, vol. 2021, 2021, doi: 10.1155/2021/5586959.
[86] N. Karthikeyan, K. Kousalya, N. Jayapandian, and G. Mahalakshmi,
“Assessment of composite materials on encrypted secret message in
image steganography using RSA algorithm,” in Materials Today:
Proceedings, Elsevier Ltd, 2021, pp. 848–852. doi:
10.1016/j.matpr.2021.04.260.
[87] U. H. Mir, D. Singh, and P. N. Lone, “Color image encryption us-
ing RSA cryptosystem with a chaotic map in Hartley domain,” In-
formation Security Journal, vol. 31, no. 1, pp. 49–63, 2022, doi:
10.1080/19393555.2021.1963018.
[88] W. Susilo, J. Tonien, and G. Yang, “Divide and capture: An improved
cryptanalysis of the encryption standard algorithm RSA,” Comput Stand
Interfaces, vol. 74, Feb. 2021, doi: 10.1016/j.csi.2020.103470.
[89] O. F. A. Wahab, A. A. M. Khalaf, A. I. Hussein, and H. F. A. Hamed,
“Hid- ing data using efficient combination of RSA cryptography, and
compres- sion steganography techniques,” IEEE Access, vol. 9, pp.
31805–31815, 2021, doi: 10.1109/ACCESS.2021.3060317.
[90] K. Sharma, A. Agrawal, D. Pandey, R. A. Khan, and S. K. Dinkar, “RSA
based encryption approach for preserving confidentiality of big data,”
Jour- nal of King Saud University - Computer and Information Sciences,
vol. 34, no. 5, pp. 2088–2097, May 2022, doi:
10.1016/j.jksuci.2019.10.006.
[91] M. Kara, A. Laouid, M. AlShaikh, A. Bounceur, and M. Hammoudeh,
“Se- cure Key Exchange Against Man-in-the-Middle Attack: Modified
Diffie- Hellman Protocol,” Jurnal Ilmiah Teknik Elektro Komputer dan
Infor- matika, vol. 7, no. 3, p. 380, Dec. 2021, doi:
10.26555/jiteki.v7i3.22210.
[92] R. Flores-Carapia, V. M. Silva-García, and M. A. Cardona-López, “A Dy-
namic Hybrid Cryptosystem Using Chaos and Diffie–Hellman Protocol:
An Image Encryption Application,” Applied Sciences (Switzerland), vol.
13, no. 12, Jun. 2023, doi: 10.3390/app13127168.
[93] Y. Peng, T. Nagase, T. Kanamoto, T. Zeniya, and S. You, “A Virtual
Optical Holographic Encryption System Using Expanded Diffie-Hellman
Algo- rithm,” IEEE Access, vol. 9, pp. 22071–22077, 2021, doi:
10.1109/AC- CESS.2021.3055866.
[94] S. Pfeiffer and N. Tihanyi, “D(HE)at: A Practical Denial-of-Service
Attack on the Finite Field Diffie–Hellman Key Exchange,” IEEE Access,
vol. 12,
pp. 957–980, 2024, doi: 10.1109/ACCESS.2023.3347422.
[95] H. H. Hadi and A. A. Neamah, “International Journal of INTELLIGENT
SYSTEMS AND APPLICATIONS IN ENGINEERING Diffie-Hellman
Key Exchange Based on Block Matrices Combined with Elliptic Curves.”
[Online]. Available: www.ijisae.org
[96] W. Castryck, M. Houben, F. Vercauteren, and B. Wesolowski, “On the
decisional Diffie–Hellman problem for class group actions on oriented
elliptic curves,” Res Number Theory, vol. 8, no. 4, Dec. 2022, doi:
10.1007/s40993-022-00399-6.
[97] A. O. David and O. Sulaimon, “Text Encryption with Improved Elliptic
Curve Cryptography,” Journal of Advances in Mathematics and Computer
Science, pp. 32–41, Feb. 2023, doi: 10.9734/jamcs/2023/v38i31749.
[98] P. Suthanthiramani, M. Sannasy, G. Sannasi, and K. Arputharaj, “Secured
data storage and retrieval using elliptic curve cryptography in cloud,” Jan.
01, 2021, Zarka Private University. doi: 10.34028/iajit/18/1/7.
[99] S. U. Chandrika and T. P. Perumal, “Modified ECC for Secure Data
Trans- fer in Multi-Tenant Cloud Computing,” International Journal of
Computer Network and Information Security, vol. 14, no. 6, pp. 76–88,
Dec. 2022, doi: 10.5815/ijcnis.2022.06.06.
[100] D. Hweishel AAlfarjat and H. S. A Hamatta, “Implementation of
Bluetooth Secure Simple Pairing (SSP) using Elliptic Curve Cryptog-
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
and Network Security, vol. 21, no. 3, p. 60,may
content 2021, doi: prior
change 10.22937/IJC- [110]
to final publication. M. D.
Citation Mohanty etDOI
information: al., “Design of Smart and Secured Healthcare Service
SNS.2021.21.3.9. Using Deep Learning with Modified SHA-256 Algorithm,” Healthcare
[101] S. Majumder, S. Ray, D. Sadhukhan, M. K. Khan, and M. Dasgupta, (Switzerland), vol. 10, no. 7, Jul. 2022, doi: 10.3390/healthcare10071275.
“ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application [111] M. Kammoun, M. Elleuchi, M. Abid, and A. M. Obeid, “HW/SW
Protocol for Internet of Things,” Wirel Pers Commun, vol. 116, no. 3, pp. architecture exploration for an efficient implementation of the secure hash
1867–1896, Feb. 2021, doi: 10.1007/s11277-020-07769-2. algorithm SHA-256,” Journal of Communications Software and Systems,
[102] O. P. Verma, N. Jain, and S. K. Pal, “Design and analysis of an optimal vol. 17, no. 2, pp. 87–96, 2021, doi: 10.24138/JCOMSS-2021-0006.
ECC algorithm with effective access control mechanism for big data,” [112] M. D. Mohanty et al., “Design of Smart and Secured Healthcare Service
Multimed Tools Appl, vol. 79, no. 15–16, pp. 9757–9783, Apr. 2020, doi: Using Deep Learning with Modified SHA-256 Algorithm,” Healthcare
10.1007/s11042-019-7677-2. (Switzerland), vol. 10, no. 7, Jul. 2022, doi: 10.3390/healthcare10071275.
[103] J. Diema Enoch, B. O. Omijeh, and R. O. Okeke, “A Customized [113] M. Kammoun, M. Elleuchi, M. Abid, and A. M. Obeid, “HW/SW
Encryption and Decryption Solution using Artificial Neural Network,” architecture exploration for an efficient implementation of the secure hash
2023. algorithm SHA-256,” Journal of Communications Software and Systems,
[104] R. Lakshmana Kumar, R. Subramanian, and S. Karthik, “Hash Function vol. 17, no. 2, pp. 87–96, 2021, doi: 10.24138/JCOMSS-2021-0006.
Based Keyword Searchable Encryption Framework in Cloud Server [114] I. Algredo-Badillo, M. Morales-Sandoval, A. Medina-Santiago, C.
Using MD5 and MECC,” Journal of Information Hiding and Privacy A. Hernández-Gracidas, M. Lobato-Baez, and L. A. Morales-Rosales,
Protection, vol. 3, no. 4, pp. 201–226, 2021, doi: “A SHA-256 Hybrid-Redundancy Hardware Architecture for Detect-
10.32604/jihpp.2021.027834. ing and Correcting Errors,” Sensors, vol. 22, no. 13, Jul. 2022, doi:
[105] T. Hameed Obaida, H. Abbas Salman, and H. Najim Zugair, “Improve 10.3390/s22135028.
MD5 Hash Function For Document Authentication.” [Online]. Available:
http://www.webology.org
[106] J. Mantik, K. Nistrina, N. Sri Rahayu, and R. Puja Permana, “MD5 in
a web-based population data management application to improve account
security,” 2024.
DONAGANI RAMAKRISHNA received the
[107] A. Mohammed Ali and A. Kadhim Farhan, “A novel improvement with
an effective expansion to enhance the MD5 hash function for verification B.Tech degree in Computer Science and Engineer-
of a secure E-Document,” IEEE Access, vol. 8, pp. 80290–80304, 2020, ing from Vaagdevi Engineering College, Waran-
doi: 10.1109/ACCESS.2020.2989050. gal, India, in 2019, and the M.Tech degree in
[108] I. A. S. Jabbar and S. H. Shaker, “Adaptive Hiding Algorithm Based on Com- puter Networks and Information Security
Mapping Database,” International Journal of Interactive Mobile from Vaagdevi College of Engineering,
Technolo- gies, vol. 17, no. 1, pp. 96–107, 2023, doi: Warangal, In- dia, in 2021. He worked as an
10.3991/ijim.v17i01.36723. Assistant Professor at CMR Engineering
[109] J. Wu, J. Zhang, D. Liu, and X. Wang, “A Multiple-Medical-Image College, Hyderabad, before becoming a research
Encryption Method Based on SHA-256 and DNA Encoding,” Entropy, scholar at SR University, Warangal. His research
vol. 25, no. 6, Jun. 2023, doi: 10.3390/e25060898. [111] X. Sun and Z. interests include cryptog-
Chen, raphy and network security. He has published a paper on ad-hoc networks
“A Novel Chaotic Image Encryption Algorithm Based on Coordinate and has participated in several Faculty Development Programs (FDPs)
Descent and SHA-256,” IEEE Access, vol. 10, pp. 114597–114611, 2022, conducted by JNTUH.
doi: 10.1109/ACCESS.2022.3217520.
VOLUME 4, 2016 23
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
content may change prior to final publication. Citation information: DOI
24 VOLUME 4,
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully
edited and
2016 content may change prior to final publication. Citation information: DOI
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see
https://creativecommons.org/licenses/by/4.0/