Ali Mahmood Khalaf , Kamaljit Lakhtaria
Information security is extremely important in terms of maintaining the
security of information (text, image, audio, video) and its confidentiality,
and as a result of the massive expansion in the field of technology and
communications, and the emergence of the role of the internet, and for rapid
communication in the transmission of this information (text, image, audio,
video) There was a need to secure this information from penetration and make it
incomprehensible to people who are not authorized to access this information
(text, image, audio, video). Where many algorithms and techniques have appeared
to protect this information, namely: Cryptography algorithms, and Steganography
techniques. Cryptography is one of the techniques of information security,
which studies the secure communication between the sender and receiver of the
message, which is the process of converting plain text into cipher text through
the use of mathematical operations. In our research paper, a comparative study
and analysis of symmetric key and key asymmetric encryption algorithms in terms
of effectiveness, key size, time, complexity, functionality, attacks, and
research on the most prominent recent technologies such as AES, BLOWFISH, RC2,
RC4, CAST, SERPENT, TEA, E-DES, RSA, DIFFIE HELLMAN, and DSA are the safest.
Compared to other technologies, faster encryption time, security, speed, and
flexibility according to the results.
Cryptography,
information security, symmetric-key of Cryptography algorithms, Asymmetric-key
of Cryptography algorithms
VOL.14, ISSUE No.1, March 2022