Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ahn, J. | - |
dc.contributor.author | Hussain, R. | - |
dc.contributor.author | Kang, K. | - |
dc.contributor.author | Son, J. | - |
dc.date.accessioned | 2025-03-06T06:30:25Z | - |
dc.date.available | 2025-03-06T06:30:25Z | - |
dc.date.issued | 2025-01 | - |
dc.identifier.issn | 1553-877X | - |
dc.identifier.issn | 1553-877X | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/122187 | - |
dc.description.abstract | Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor vulnerabilities can make protocols an easy target for cyber attackers. Therefore, it is essential to investigate the threats and vulnerabilities stemming from the cryptographic network protocols. Furthermore, it is necessary to comprehensively investigate the weaknesses of network protocols that use cryptographic primitives to inform users and developers about potential attack points. This comprehensive survey examines the relationship between encryption schemes and network protocols and presents an in-depth review of associated threats and vulnerabilities. Given that most cryptographic protocols operate in the Transport and Application layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack, our investigation primarily centers around encryption algorithms used by representative and notable cryptographic network protocols such as Transport Layer Security (TLS) and Secure Shell (SSH). Furthermore, we delve into the attackers' methods to exploit the already identified and existing vulnerabilities, seeking to understand the mechanisms employed to compromise these protocols. Through this survey, we aim to provide the readership with an in-depth understanding of the existing and new vulnerabilities associated with modern cryptographic protocols and provide valuable insights into securing them effectively. We also discuss the existing challenges and future research directions in this domain. © 1998-2012 IEEE. | - |
dc.format.extent | 28 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/COMST.2025.3526605 | - |
dc.identifier.scopusid | 2-s2.0-85214709268 | - |
dc.identifier.bibliographicCitation | IEEE Communications Surveys and Tutorials, pp 1 - 28 | - |
dc.citation.title | IEEE Communications Surveys and Tutorials | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 28 | - |
dc.type.docType | Article in press | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Cryptographic Network Protocols | - |
dc.subject.keywordAuthor | Encryption Algorithms | - |
dc.subject.keywordAuthor | HyperText Transport Protocol Secure (HTTPS) | - |
dc.subject.keywordAuthor | Secure Shell (SSH) | - |
dc.subject.keywordAuthor | Transport Layer Security (TLS) | - |
dc.subject.keywordAuthor | Vulnerabilities | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.