HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW
Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein computing technologies for banking services, medicalsy...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
UUM Press
2020
|
Materias: | |
Acceso en línea: | https://doaj.org/article/f457f68142834d15952a733179dc096f |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:f457f68142834d15952a733179dc096f |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:f457f68142834d15952a733179dc096f2021-11-15T04:01:20ZHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW10.32890/jict2020.19.3.11675-414X2180-3862https://doaj.org/article/f457f68142834d15952a733179dc096f2020-06-01T00:00:00Zhttp://e-journal.uum.edu.my/index.php/jict/article/view/jict2020.19.3.1https://doaj.org/toc/1675-414Xhttps://doaj.org/toc/2180-3862Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein computing technologies for banking services, medicalsystems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasingsecurity concerns. In cryptography, each scheme is built withits own respective strength, but the implementation of singlecryptographic scheme into the system has some disadvantages.For instance, symmetric encryption method provides a costeffectivetechnique of securing data without compromisingsecurity. However, sharing the secret key is a vital problem. Onthe other hand the asymmetric scheme solves the secret keydistribution issue; yet the standalone technique is slow andconsumes more computer resources compared to the symmetricencryption. In contrast, hashing function generates a unique andfixed-length signature for a message to provide data integritybut the method is only a one-way function which is infeasibleto invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographicof every single scheme, integration of several cryptographicschemes which are also called the hybridization techniqueis being proposed offering the efficiency of securing data andsolving the issue of key distribution. Herein, a review study ofarticles related to hybrid cryptographic approach from 2013to 2018 is presented. Current IoT domains that implementedhybrid approaches were identified and the review was conductedaccording to the category of the domain. The significant findingsfrom this literature review included the exploration of variousIoT domains that implemented hybrid cryptographic techniquesfor improving performance in related works. From the findings,it can be concluded that the hybrid cryptographic approach hasbeen implemented in many IoT cloud computing services. Inaddition, AES and ECC have been found to be the most popularmethods used in the hybrid approach due to its computing speedand security resistance among other schemes. Nur Nabila MohamedYusnani Mohd YussoffMohammed Ahmed SalehHabibah HashimUUM Pressarticlecryptographyinternet of thingsencryptionpublic key cryptographysecurityInformation technologyT58.5-58.64ENJournal of ICT, Vol 19, Iss 3, Pp 279-319 (2020) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
cryptography internet of things encryption public key cryptography security Information technology T58.5-58.64 |
spellingShingle |
cryptography internet of things encryption public key cryptography security Information technology T58.5-58.64 Nur Nabila Mohamed Yusnani Mohd Yussoff Mohammed Ahmed Saleh Habibah Hashim HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW |
description |
Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein computing technologies for banking services, medicalsystems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasingsecurity concerns. In cryptography, each scheme is built withits own respective strength, but the implementation of singlecryptographic scheme into the system has some disadvantages.For instance, symmetric encryption method provides a costeffectivetechnique of securing data without compromisingsecurity. However, sharing the secret key is a vital problem. Onthe other hand the asymmetric scheme solves the secret keydistribution issue; yet the standalone technique is slow andconsumes more computer resources compared to the symmetricencryption. In contrast, hashing function generates a unique andfixed-length signature for a message to provide data integritybut the method is only a one-way function which is infeasibleto invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographicof every single scheme, integration of several cryptographicschemes which are also called the hybridization techniqueis being proposed offering the efficiency of securing data andsolving the issue of key distribution. Herein, a review study ofarticles related to hybrid cryptographic approach from 2013to 2018 is presented. Current IoT domains that implementedhybrid approaches were identified and the review was conductedaccording to the category of the domain. The significant findingsfrom this literature review included the exploration of variousIoT domains that implemented hybrid cryptographic techniquesfor improving performance in related works. From the findings,it can be concluded that the hybrid cryptographic approach hasbeen implemented in many IoT cloud computing services. Inaddition, AES and ECC have been found to be the most popularmethods used in the hybrid approach due to its computing speedand security resistance among other schemes.
|
format |
article |
author |
Nur Nabila Mohamed Yusnani Mohd Yussoff Mohammed Ahmed Saleh Habibah Hashim |
author_facet |
Nur Nabila Mohamed Yusnani Mohd Yussoff Mohammed Ahmed Saleh Habibah Hashim |
author_sort |
Nur Nabila Mohamed |
title |
HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW |
title_short |
HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW |
title_full |
HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW |
title_fullStr |
HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW |
title_full_unstemmed |
HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW |
title_sort |
hybrid cryptographic approach for internet ofhybrid cryptographic approach for internet ofthings applications: a review |
publisher |
UUM Press |
publishDate |
2020 |
url |
https://doaj.org/article/f457f68142834d15952a733179dc096f |
work_keys_str_mv |
AT nurnabilamohamed hybridcryptographicapproachforinternetofhybridcryptographicapproachforinternetofthingsapplicationsareview AT yusnanimohdyussoff hybridcryptographicapproachforinternetofhybridcryptographicapproachforinternetofthingsapplicationsareview AT mohammedahmedsaleh hybridcryptographicapproachforinternetofhybridcryptographicapproachforinternetofthingsapplicationsareview AT habibahhashim hybridcryptographicapproachforinternetofhybridcryptographicapproachforinternetofthingsapplicationsareview |
_version_ |
1718428901406932992 |