HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW

Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein computing technologies for banking services, medicalsy...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Nur Nabila Mohamed, Yusnani Mohd Yussoff, Mohammed Ahmed Saleh, Habibah Hashim
Formato: article
Lenguaje:EN
Publicado: UUM Press 2020
Materias:
Acceso en línea:https://doaj.org/article/f457f68142834d15952a733179dc096f
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:f457f68142834d15952a733179dc096f
record_format dspace
spelling oai:doaj.org-article:f457f68142834d15952a733179dc096f2021-11-15T04:01:20ZHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW10.32890/jict2020.19.3.11675-414X2180-3862https://doaj.org/article/f457f68142834d15952a733179dc096f2020-06-01T00:00:00Zhttp://e-journal.uum.edu.my/index.php/jict/article/view/jict2020.19.3.1https://doaj.org/toc/1675-414Xhttps://doaj.org/toc/2180-3862Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein computing technologies for banking services, medicalsystems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasingsecurity concerns. In cryptography, each scheme is built withits own respective strength, but the implementation of singlecryptographic scheme into the system has some disadvantages.For instance, symmetric encryption method provides a costeffectivetechnique of securing data without compromisingsecurity. However, sharing the secret key is a vital problem. Onthe other hand the asymmetric scheme solves the secret keydistribution issue; yet the standalone technique is slow andconsumes more computer resources compared to the symmetricencryption. In contrast, hashing function generates a unique andfixed-length signature for a message to provide data integritybut the method is only a one-way function which is infeasibleto invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographicof every single scheme, integration of several cryptographicschemes which are also called the hybridization techniqueis being proposed offering the efficiency of securing data andsolving the issue of key distribution. Herein, a review study ofarticles related to hybrid cryptographic approach from 2013to 2018 is presented. Current IoT domains that implementedhybrid approaches were identified and the review was conductedaccording to the category of the domain. The significant findingsfrom this literature review included the exploration of variousIoT domains that implemented hybrid cryptographic techniquesfor improving performance in related works. From the findings,it can be concluded that the hybrid cryptographic approach hasbeen implemented in many IoT cloud computing services. Inaddition, AES and ECC have been found to be the most popularmethods used in the hybrid approach due to its computing speedand security resistance among other schemes. Nur Nabila MohamedYusnani Mohd YussoffMohammed Ahmed SalehHabibah HashimUUM Pressarticlecryptographyinternet of thingsencryptionpublic key cryptographysecurityInformation technologyT58.5-58.64ENJournal of ICT, Vol 19, Iss 3, Pp 279-319 (2020)
institution DOAJ
collection DOAJ
language EN
topic cryptography
internet of things
encryption
public key cryptography
security
Information technology
T58.5-58.64
spellingShingle cryptography
internet of things
encryption
public key cryptography
security
Information technology
T58.5-58.64
Nur Nabila Mohamed
Yusnani Mohd Yussoff
Mohammed Ahmed Saleh
Habibah Hashim
HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW
description Cryptography is described as the study of encrypting or secretCryptography is described as the study of encrypting or secretwriting of data using logical and mathematical principles toprotect information. This technique has grown in importancein computing technologies for banking services, medicalsystems, transportation and other Internet of Things (IoT)-based applications which have been subjected to increasingsecurity concerns. In cryptography, each scheme is built withits own respective strength, but the implementation of singlecryptographic scheme into the system has some disadvantages.For instance, symmetric encryption method provides a costeffectivetechnique of securing data without compromisingsecurity. However, sharing the secret key is a vital problem. Onthe other hand the asymmetric scheme solves the secret keydistribution issue; yet the standalone technique is slow andconsumes more computer resources compared to the symmetricencryption. In contrast, hashing function generates a unique andfixed-length signature for a message to provide data integritybut the method is only a one-way function which is infeasibleto invert. As an alternative to solve the security weakness of every single scheme, integration of several cryptographicof every single scheme, integration of several cryptographicschemes which are also called the hybridization techniqueis being proposed offering the efficiency of securing data andsolving the issue of key distribution. Herein, a review study ofarticles related to hybrid cryptographic approach from 2013to 2018 is presented. Current IoT domains that implementedhybrid approaches were identified and the review was conductedaccording to the category of the domain. The significant findingsfrom this literature review included the exploration of variousIoT domains that implemented hybrid cryptographic techniquesfor improving performance in related works. From the findings,it can be concluded that the hybrid cryptographic approach hasbeen implemented in many IoT cloud computing services. Inaddition, AES and ECC have been found to be the most popularmethods used in the hybrid approach due to its computing speedand security resistance among other schemes.
format article
author Nur Nabila Mohamed
Yusnani Mohd Yussoff
Mohammed Ahmed Saleh
Habibah Hashim
author_facet Nur Nabila Mohamed
Yusnani Mohd Yussoff
Mohammed Ahmed Saleh
Habibah Hashim
author_sort Nur Nabila Mohamed
title HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW
title_short HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW
title_full HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW
title_fullStr HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW
title_full_unstemmed HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW
title_sort hybrid cryptographic approach for internet ofhybrid cryptographic approach for internet ofthings applications: a review
publisher UUM Press
publishDate 2020
url https://doaj.org/article/f457f68142834d15952a733179dc096f
work_keys_str_mv AT nurnabilamohamed hybridcryptographicapproachforinternetofhybridcryptographicapproachforinternetofthingsapplicationsareview
AT yusnanimohdyussoff hybridcryptographicapproachforinternetofhybridcryptographicapproachforinternetofthingsapplicationsareview
AT mohammedahmedsaleh hybridcryptographicapproachforinternetofhybridcryptographicapproachforinternetofthingsapplicationsareview
AT habibahhashim hybridcryptographicapproachforinternetofhybridcryptographicapproachforinternetofthingsapplicationsareview
_version_ 1718428901406932992