Simetrik ve Asimetrik Şifreleme Algoritmalarının Performans Karşılaştırılması
Öz
Anahtar Kelimeler
Kaynakça
- Şatir E, Kendirli O. A symmetric dna encryption process with a biotechnical hardware. Journal of King Saud University – Science 2022; 34(3): 1-10.
- Alenezi MN, Alabdulrazzaq H & Mohammad NQ. Symmetric encryption algorithms: review and evaluation study. International Journal of Communication Networks and Information Security 2020; 12(2): 256-272.
- Kaya A, Türkoğlu İ. Evaluation of symmetric cryptography algorithms in terms of performance analysis. Cukurova 10th Internatıonal Scıentıfıc Researches Conference; 2-4 April 2023; Adana-Türkiye. pp. 4048-462.
- Kaya A, Türkoğlu İ. Evaluation of asymmetric cryptography algorithms in terms of performance analysis. 4. International Cappadocia Scientific Research Congress; 16-17 April 2023; Nevşehir- Türkiye. pp. 1056-1070.
- Sood R, Kaur H. A literature review on rsa, des and aes encryption algorithms. In Vikram Dhiman & Pooja Dhand (eds.), Emerging Trends in Engineering and Management 2023; 57–63.
- Olutola A, Olumuyiwa M. Comparative analysis of encryption algorithms. European Journal of Tech. 2023;7(1): 1 -9.
- Luo Z, Shen K, Hu R, Yang Y & Deng R. Optimization of aes-128 encryption algorithm for security layer in zig bee networking of internet of things. Computational Intelligence and Neuroscience 2022; 1-11.
- Thirupalu U, Reddy EK. Performance analysis of cryptographic algorithms in the information security. International Journal of Engineering Research & Technology (IJERT) 2019; 8(2):63-69.
Ayrıntılar
Birincil Dil
Türkçe
Konular
Bilgi Güvenliği ve Kriptoloji, Kriptografi
Bölüm
Araştırma Makalesi
Yayımlanma Tarihi
1 Eylül 2023
Gönderilme Tarihi
12 Mayıs 2023
Kabul Tarihi
28 Ağustos 2023
Yayımlandığı Sayı
Yıl 2023 Cilt: 35 Sayı: 2
Cited By
Application of Classical and Genomic Cryptography on Textual Dataset
Sakarya University Journal of Computer and Information Sciences
https://doi.org/10.35377/saucis.7.87942.1483300KÖK ŞİFRE ALGORİTMA TASARIMI VE PERFORMANS ANALİZİ
Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi
https://doi.org/10.17780/ksujes.1476219Securing Edge Devices in IoT and 6G: A Trust-Based Approach for Resource-Constrained Environments
IEEE Open Journal of the Communications Society
https://doi.org/10.1109/OJCOMS.2025.3597556The Development of Electronic Signature Processes in Türkiye and an Analysis of the Requirements for the Transition to Elliptic Curve Cryptography (ECC)
Journal of Computer and Communications
https://doi.org/10.4236/jcc.2026.143002Comparative study on most used modern symmetric encryption algorithms for breast cancer ultrasound images
International Advanced Researches and Engineering Journal
https://doi.org/10.35860/iarej.1681592Applying Laplace transforms to cryptography using Bessel and exponential functions and performing detailed time and memory analysis
Gümüşhane Üniversitesi Fen Bilimleri Enstitüsü Dergisi
https://doi.org/10.17714/gumusfenbil.1780179