Abstract:
The field of Cybersecurity methods and algorithms looks like a huge ocean. The selection of suitable methods is a challenging job based on the application. In the light o...Show MoreMetadata
Abstract:
The field of Cybersecurity methods and algorithms looks like a huge ocean. The selection of suitable methods is a challenging job based on the application. In the light of emerging new technologies, the selected cryptographic algorithm should be compatible with the new technology. This study helps in the selection of the appropriate key exchange cryptography method for a given application which requires secured communication. The strong, efficient, fast and quantum safe method chosen should further be analyzed, tested and verified for providing the desired throughput under heavy load conditions. The vulnerability of major cryptography algorithms to security attacks by Quantum algorithms is discussed in this study. The security level status of a few popular cryptography methods are compared with the post quantum resistant method of cryptography.
Date of Conference: 24-26 February 2022
Date Added to IEEE Xplore: 16 June 2022
ISBN Information: