Autors: Pleshkova, P. S., Kinanev, K. D. Title: Method for comparative performance analyse of encryption algorithms used in Public Key Infrastructure for secure transmitting of audio information Keywords: symmetric, asymmetric, encryption, decryption, audio Abstract: The primary advantage of public-key cryptography is that private keys never need to be transmitted or revealed to anyone. In a secret-key system for protecting audio information, by contrast, the secret keys must be transmitted (either manually or through a communication channel) since the same key is used for encryption and decryption. A serious concern is that there may be a chance that an enemy can discover the secret key during transmission of the audio information. Another major advantage of public-key systems is that they can provide digital signatures that cannot be repudiated. Authentication via secret-key systems requires the sharing of some secret and sometimes requires trust of a third party as well. As a result, a sender can repudiate a previously authenticated message by claiming the shared secret was somehow compromised by one of the parties sharing the secret. A disadvantage of using public-key cryptography for encryption of audio information is the speed. There are man References
Issue
|
Цитирания (Citation/s):
1. Rathod C., Gonsay A.Performance Analysis of AES, Blowfish and Rijndael: Cryptographic Algorithms for Audio(Conference Paper). Volume 1187, 2021, Pages 203-2091st FICR International Conference on Rising Threats in Expert Applications and Solutions, FICR-TEAS 2020; Jaipur; India; 17 January 2020 through 19 January 2020; Code 249679 - 2020 - в издания, индексирани в Scopus или Web of Science
Вид: публикация в международен форум, публикация в издание с импакт фактор, публикация в реферирано издание