Main Article Content
Survey of cryptography algorithms for Sub-Saharan countries
Abstract
With the increase of Internet of Things (IoT) and threats on Information Systems (IS) resources, it is urgent for Africa countries to stop being spectator on cyber security and begin to play a more active role. This paper aimed at helping Africa country governments and organizations to understand security challenges that they may face, and propose solutions. The paper described security investment factors, proposed a survey of IoT Worldwide and in Africa, and details as well a survey of cryptography algorithms (symmetric and asymmetric). Indeed, information security, in particular cryptography, seems alien to Africa IT professionals. This lack stems from a deep ignorance about this wonderful field of cryptography and its importance in the system. The authors believe that this trend must be reversed as soon as possible, as Africa strives opening up to the world. Henceforth, this paper presented a comprehensive introductory survey on cryptographic algorithms especially tailored for Africans.
Key Words: Internet, Things, (IoT), Security, costs, cryptography, algorithms, Ciphers, Encryption, Decryption, methods.