Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilitiesopen access

Authors
Ahn, J.Hussain, R.Kang, K.Son, J.
Issue Date
Jan-2025
Publisher
Institute of Electrical and Electronics Engineers Inc.
Keywords
Cryptographic Network Protocols; Encryption Algorithms; HyperText Transport Protocol Secure (HTTPS); Secure Shell (SSH); Transport Layer Security (TLS); Vulnerabilities
Citation
IEEE Communications Surveys and Tutorials, pp 1 - 28
Pages
28
Indexed
SCIE
SCOPUS
Journal Title
IEEE Communications Surveys and Tutorials
Start Page
1
End Page
28
URI
https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/122187
DOI
10.1109/COMST.2025.3526605
ISSN
1553-877X
1553-877X
Abstract
Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor vulnerabilities can make protocols an easy target for cyber attackers. Therefore, it is essential to investigate the threats and vulnerabilities stemming from the cryptographic network protocols. Furthermore, it is necessary to comprehensively investigate the weaknesses of network protocols that use cryptographic primitives to inform users and developers about potential attack points. This comprehensive survey examines the relationship between encryption schemes and network protocols and presents an in-depth review of associated threats and vulnerabilities. Given that most cryptographic protocols operate in the Transport and Application layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack, our investigation primarily centers around encryption algorithms used by representative and notable cryptographic network protocols such as Transport Layer Security (TLS) and Secure Shell (SSH). Furthermore, we delve into the attackers' methods to exploit the already identified and existing vulnerabilities, seeking to understand the mechanisms employed to compromise these protocols. Through this survey, we aim to provide the readership with an in-depth understanding of the existing and new vulnerabilities associated with modern cryptographic protocols and provide valuable insights into securing them effectively. We also discuss the existing challenges and future research directions in this domain. © 1998-2012 IEEE.
Files in This Item
There are no files associated with this item.
Appears in
Collections
COLLEGE OF COMPUTING > DEPARTMENT OF ARTIFICIAL INTELLIGENCE > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kang, Kyung tae photo

Kang, Kyung tae
ERICA 소프트웨어융합대학 (DEPARTMENT OF ARTIFICIAL INTELLIGENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE