Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities

Full metadata record
DC Field Value Language
dc.contributor.authorAhn, J.-
dc.contributor.authorHussain, R.-
dc.contributor.authorKang, K.-
dc.contributor.authorSon, J.-
dc.date.accessioned2025-03-06T06:30:25Z-
dc.date.available2025-03-06T06:30:25Z-
dc.date.issued2025-01-
dc.identifier.issn1553-877X-
dc.identifier.issn1553-877X-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/122187-
dc.description.abstractCryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor vulnerabilities can make protocols an easy target for cyber attackers. Therefore, it is essential to investigate the threats and vulnerabilities stemming from the cryptographic network protocols. Furthermore, it is necessary to comprehensively investigate the weaknesses of network protocols that use cryptographic primitives to inform users and developers about potential attack points. This comprehensive survey examines the relationship between encryption schemes and network protocols and presents an in-depth review of associated threats and vulnerabilities. Given that most cryptographic protocols operate in the Transport and Application layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack, our investigation primarily centers around encryption algorithms used by representative and notable cryptographic network protocols such as Transport Layer Security (TLS) and Secure Shell (SSH). Furthermore, we delve into the attackers' methods to exploit the already identified and existing vulnerabilities, seeking to understand the mechanisms employed to compromise these protocols. Through this survey, we aim to provide the readership with an in-depth understanding of the existing and new vulnerabilities associated with modern cryptographic protocols and provide valuable insights into securing them effectively. We also discuss the existing challenges and future research directions in this domain. © 1998-2012 IEEE.-
dc.format.extent28-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleExploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/COMST.2025.3526605-
dc.identifier.scopusid2-s2.0-85214709268-
dc.identifier.bibliographicCitationIEEE Communications Surveys and Tutorials, pp 1 - 28-
dc.citation.titleIEEE Communications Surveys and Tutorials-
dc.citation.startPage1-
dc.citation.endPage28-
dc.type.docTypeArticle in press-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordAuthorCryptographic Network Protocols-
dc.subject.keywordAuthorEncryption Algorithms-
dc.subject.keywordAuthorHyperText Transport Protocol Secure (HTTPS)-
dc.subject.keywordAuthorSecure Shell (SSH)-
dc.subject.keywordAuthorTransport Layer Security (TLS)-
dc.subject.keywordAuthorVulnerabilities-
Files in This Item
There are no files associated with this item.
Appears in
Collections
COLLEGE OF COMPUTING > DEPARTMENT OF ARTIFICIAL INTELLIGENCE > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kang, Kyung tae photo

Kang, Kyung tae
ERICA 소프트웨어융합대학 (DEPARTMENT OF ARTIFICIAL INTELLIGENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE