ارسل ملاحظاتك

ارسل ملاحظاتك لنا







A Review Study on Motivations, Challenges, and Recommendations in Encryption Methods Using AES

المصدر: مجلة الدراسات المستدامة
الناشر: الجمعية العلمية للدراسات التربوية المستدامة
المؤلف الرئيسي: Abboud, Udai Wasmi (Author)
مؤلفين آخرين: Shuwandy, Moceheb L. (Co-Author)
المجلد/العدد: مج5, ملحق
محكمة: نعم
الدولة: العراق
التاريخ الميلادي: 2023
التاريخ الهجري: 1445
الصفحات: 1014 - 1056
ISSN: 2663-2284
رقم MD: 1422155
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: EduSearch
مواضيع:
كلمات المؤلف المفتاحية:
Cryptography | AES | Encryption | Decryption
رابط المحتوى:
صورة الغلاف QR قانون

عدد مرات التحميل

1

حفظ في:
LEADER 02443nam a22002297a 4500
001 2169855
041 |a eng 
044 |b العراق 
100 |9 752547  |a Abboud, Udai Wasmi  |e Author 
245 |a A Review Study on Motivations, Challenges, and Recommendations in Encryption Methods Using AES 
260 |b الجمعية العلمية للدراسات التربوية المستدامة  |c 2023  |m 1445 
300 |a 1014 - 1056 
336 |a بحوث ومقالات  |b Article 
520 |b In our increasingly digital world, data has become one of the most valuable assets for individuals, businesses, and governments alike. From personal information and financial records to sensitive corporate data and national security information, the importance of safeguarding data cannot be overstated. However, with the proliferation of data breaches and cyber threats, ensuring the security and privacy of data has become a paramount concern. To address the growing threats to data security and privacy, Advanced Encryption Standard (AES) has emerged as a critical tool. With the rise of cyber attacks, including ransom ware, phishing, and data theft, encryption acts as a robust defense mechanism. It ensures that even if data falls into the wrong hands, it remains unintelligible without the decryption key. Also, with the widespread adoption of cloud services, data is often stored remotely. AES is crucial to safeguard data hosted in the cloud, mitigating the risk of unauthorized access. Key generation, storage, distribution, and rotation must be handled meticulously to prevent unauthorized access while ensuring availability to authorized users. Encryption can make data access more cumbersome for users, especially when multiple keys and authentication steps are involved. Balancing security with a user-friendly experience is essential. 
653 |a الأنظمة الرقمية  |a حماية البيانات  |a تقنيات التشفير  |a معيار التشفير المتقدم 
692 |b Cryptography  |b AES  |b Encryption  |b Decryption 
700 |9 752548  |a Shuwandy, Moceheb L.  |e Co-Author 
773 |4 التربية والتعليم  |6 Education & Educational Research  |c 042  |e Journal of Sustainable Studies  |f Mağallaẗ al-dirāsāt al-mustadāmaẗ  |l 990  |m مج5, ملحق  |o 2053  |s مجلة الدراسات المستدامة  |v 005  |x 2663-2284 
856 |u 2053-005-990-042.pdf 
930 |d y  |p y  |q y 
995 |a EduSearch 
999 |c 1422155  |d 1422155 

عناصر مشابهة