Page 103 - IJEEE-2023-Vol19-ISSUE-1
P. 103

Baban & Hameed                                                                                          | 99

[5] R. Amrutha, P. Perumal, S. Balaganesh, D. Ishwarya, [22] N. A. Azeez, and O.J. Chinazo, Achieving Data

"Secured Data Migration using AES Algorithm and Authentication With Hmac-Sha256 Algorithm", Computer

Authentication Techniques in Cloud Environment", Science & Telecommunications, Vol. 54, No. 2, 2018.

International Journal of Research in Engineering, Science and [23] B. Park, J. Song, and S. C. Seo, "Efficient Implementation

Management, Vol. 2, Issue 3, pp. 853-856, March-2019.           of a Crypto Library Using Web Assembly", Electronics, Vol.

[6] I. Nti, E. Gymfi, and O. Nyarko, "Implementation of 9, No. 11, 2020.

advanced encryption standard algorithm with key length of 256 [24] Benmoussa, H., A. Abou El Kalam, and A.A. Ouahman.

bits for preventing data loss in an organization", Int. J. Adv. Towards a new intelligent generation of intrusion detection

Technol, Vol. 8, No. 02, pp. 1-5, 2017.                         system. in Proceedings of the 4th Edition of National Security

[7] S. Mondal, S. and S. Maitra, "Data security-modified AES Days (JNS4). 2014. IEEE.

algorithm and its applications", ACM SIGARCH Computer [25] M. Baykara, and R. Das, "A survey on potential

Architecture News, Vol. 42, No. 2, pp. 1-8, 2014.               applications of honeypot technology in intrusion detection

[8] X. h.Wu, X. j. Ming, "Research of the Database Encryption systems", International Journal of Computer Networks and

Technique Based on Hybrid Cryptography" In 2010 Applications (IJCNA), Vo. 2, No. 5, pp. 203-211, 2015.

International Symposium on Computational Intelligence and [26] D. Mudzingwa, and R. Agrawal, "A study of methodologies

Design, 2010.                                                   used in intrusion detection and prevention systems (IDPS)", in

[9] M. C. Ah Kioon, Z. S. Wang, and S. Deb Das, "Security 2012 Proceedings of IEEE Southeastcon, 2012.

analysis of MD5 algorithm in password storage", In Applied [27] E. Cole, "Network security bible", John Wiley & Sons,

Mechanics and Materials. 2013.                                  2011.

[10] M. S. Hwang, and W. P. Yang, "A two-phase encryption [28] A. Valdes, and K. Skinner, “Probabilistic alert correlation,”

scheme for enhancing database security", Journal of Systems in International Workshop on Recent Advances in Intrusion

and Software, Vol. 31, No. 3, pp. 257-265, 1995.                Detection. Springer, pp. 54–68, 2001.

[11] B. Schneier, et al., "The Twofish team’s final comments on [29] S. Li, Q. Zou, and W. Huang, "A new type of intrusion

AES Selection", AES round, Vol. 2, No. 1, pp. 1-13, 2000.       prevention system", in 2014 international conference on

[12] W. M. Tatun, "The Advanced Encryption System (AES) information science, electronics and electrical engineering,

Development Effort: Overview and Update", SANS Institute, 2014.

2001.                                                           [30] I. Koniaris, et al., "Honeypots deployment for the analysis

[13] H. A. Younis, A. Y. Abdalla, and T. Y. Abdalla, "Partial and visualization of malware activity and malicious

encryption of compressed image using threshold quantization connections", in 2014 IEEE international conference on

and AES cipher", Iraq J. Electrical and Electronic Engineering, communications (ICC), 2014.

Vol. 8, No. 1, 2012.                                            [31] J. Wang, and J. Zeng, "Construction of large-scale

[14] M. G. Singh, M. A. Singla, and M. K. Sandha, honeynet Based on Honeyd", Procedia Engineering, Vol. 15,

"Cryptography algorithm comparison for security pp. 3260-3264, 2011.

enhancement in wireless intrusion detection system", [32] Y. Gökirmak, et al, "IPv6 Balküpü Tasarimi", Tübitak

International Journal of Multidisciplinary Research, Vol.1, No. Ulakbim, Ankara, 2011.

4, pp. 143-151, 2011.                                           [33] N. Shaji, and P. Bonifus, "Design of AES architecture with

[15] S. William, "Cryptography and Network Security: for area and speed tradeoff", Procedia Technology, Vol. 24, pp.

VTU", Pearson education india, 2006.                            1135-1140, 2016.

[16] Z. J. Chowdhury, D. Pishva, and G. Nishantha, "AES and [34] B. Latinovic, Z. Ž. Avramovic, and M. Zajmovic, "Safety

Confidentiality from the Inside Out", in 2010 The 12th Analysis Of Reverse Algorithm Encryption In Databases",

International Conference on Advanced Communication Journal of Information Technology & Applications, Vol. 9, No.

Technology (ICACT), 2010.                                       1, 2019.

[17] K. F. Jasim, et al, "Analysis the Structures of Some

Symmetric Cipher Algorithms Suitable for the Security of IoT

Devices", Cihan University-Erbil Scientific Journal, Vol. 5,

No. 2, pp. 13-19, 2021.

[18] A. K. Mandal, C. Parakash, and A. Tiwari, "Performance

evaluation of cryptographic algorithms: DES and AES", in

2012 IEEE Students' Conference on Electrical, Electronics and

Computer Science, 2012.

[19] M. F. Mushtaq, et al, "A survey on the cryptographic

encryption algorithms", International Journal of Advanced

Computer Science and Applications, Vol. 8, No. 11, 2017.

[20] J. M. Turner, "The keyed-hash message authentication code

(hmac)", Federal Information Processing Standards

Publication, Vol. 198, No. 1, pp. 1-13, 2008.

[21] E. S. I. Harba, "Secure data encryption through a

combination of AES, RSA and HMAC", Engineering,

Technology & Applied Science Research, Vol. 7, No. 4, pp.

1781-1785, 2017.
   98   99   100   101   102   103   104   105   106   107   108