Claim Missing Document
Check
Articles

Found 13 Documents
Search
Journal : Indonesian Journal of Electrical Engineering and Computer Science

Review on Public Key Cryptography Scheme-Based Performance Metrics Jasmin Ilyani Ahmad; Roshidi Din; Mazida Ahmad
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i1.pp386-392

Abstract

Cryptography is a method used to establish secure data communication. The goal of cryptography is to send data to satisfy the criteria of confidentiality, data integrity, authentication and non-repudiation. In line with the goals, the performance metrics is the important evaluation criteria to be analyzed. This paper presents the review of performance metrics of Public Key Cryptography (PKC) that had been analyzed based on the PKC scheme from the previous researchers’ effort since the last four decades. It also displayed the research pattern in different performance metrics over the years. The aim of this paper is to identify the key performance metrics which addressed by the researchers in previous studies. Finally, the critical concern of this paper which shows the overall PKC performance metrics also presented in this paper.
Analysis Review on Public Key Cryptography Algorithms Jasmin Ilyani Ahmad; Roshidi Din; Mazida Ahmad
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp447-454

Abstract

This paper presents several Public Key Cryptography (PKC) algorithms based on the perspective of researchers’ effort since it was invented in the last four decades. The categories of the algorithms had been analyzed which are Discrete Logarithm, Integer Factorization, Coding Theory, Elliptic Curve, Lattices, Digital Signature and Hybrid algorithms. This paper reviewed the previous schemes in different PKC algorithms. The aim of this paper is to present the comparative trends of PKC algorithms based on number of research for each algorithm in last four decades, the roadmap of PKC algorithms since they were invented and the most chosen algorithms among previous researchers. Finally, the strength and drawback of proposed schemes and algorithms also presented in this paper.
A Review on Structured Scheme Representation on Data Security Application Siti Norussaadah Mohd Salleh; Roshidi Din; Nur Haryani Zakaria; Aida Mustapha
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i2.pp733-739

Abstract

With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application.