Open Access Open Access  Restricted Access Subscription Access

Highlighting Issues Relevant to Encryption Algorithms and Security Schemes


Affiliations
1 UTM Big Data Centre. Ibnu Sina Institute for Scientific and Industrial Research, Universiti Teknologi Malaysia,81310 Skudai, Johor, Malaysia
2 Faculty of Computing, Universiti Teknologi Malaysia, 81310 Skudai, Johor, Malaysia
 

Cryptography provides a security backbone for most Electronic-Services (E-Services). Computer systems’ users trust encryption techniques and protocols as robust mechanisms that deliver the required security services. Therefore, security researchers should act proactively to identify and resolve potential threats in current security schemes in order to preserve this relation of trust between average users and Secure E-Services. This research paper aims to address some of the potential threats in order to urge scholars to take action towards discussing and resolving them.

Keywords

Certification Authority, Cryptography, Cryptanalysis, Information Security, Security Breaches
User

Abstract Views: 158

PDF Views: 0




  • Highlighting Issues Relevant to Encryption Algorithms and Security Schemes

Abstract Views: 158  |  PDF Views: 0

Authors

Abdelrahman Altigani
UTM Big Data Centre. Ibnu Sina Institute for Scientific and Industrial Research, Universiti Teknologi Malaysia,81310 Skudai, Johor, Malaysia
Siti Mariyam Shamsuddin
Faculty of Computing, Universiti Teknologi Malaysia, 81310 Skudai, Johor, Malaysia

Abstract


Cryptography provides a security backbone for most Electronic-Services (E-Services). Computer systems’ users trust encryption techniques and protocols as robust mechanisms that deliver the required security services. Therefore, security researchers should act proactively to identify and resolve potential threats in current security schemes in order to preserve this relation of trust between average users and Secure E-Services. This research paper aims to address some of the potential threats in order to urge scholars to take action towards discussing and resolving them.

Keywords


Certification Authority, Cryptography, Cryptanalysis, Information Security, Security Breaches



DOI: https://doi.org/10.17485/ijst%2F2017%2Fv10i39%2F168065