A Comprehensive Survey on Digital Rights Management Systems (DRM) and Advanced Encryption Techniques | ||||
ALRYADA Journal For Computational Intelligence and Technology | ||||
Volume 1, Issue 1, December 2024, Page 10-38 PDF (1.66 MB) | ||||
Document Type: Surveys in all fields | ||||
DOI: 10.21608/ajcit.2024.320988.1006 | ||||
![]() | ||||
Authors | ||||
Dina Magdy Alhamalawy ![]() | ||||
Computer Systems Engineering, Faculty of Engineering, MSA University, 6 October, Egypt | ||||
Abstract | ||||
The large conversion and revolution in the information world was accompanied by a wave of digital transformation which led us to various information formats, including written documents, images, videos, and audio files. This diversity has highlighted the need for ways to protect copyright and intellectual property rights to prevent unauthorized use and distribution. The DRM System has become an important tool for managing and protecting content by imposing usage rules and preserving the intellectual property rights of content creators. This research paper aims to discuss the evolution of the recent DRM systems, focusing on the traditional encryption algorithms they use and their vulnerability to hacking. The study aims to determine the strengths and weaknesses of each DRM system and recommends replacing traditional encryption methods with newer, more secure algorithms that are less known within the hacking community to improve overall system security and shows the best asymmetric algorithm from the recent survey papers to recommends it for key encryption to add another layer of security. Through a comprehensive review of existing DRM frameworks and an analysis of advanced cryptographic algorithms such as NLCA, SLIM, TIGRIS, and ISL-LWC, this paper provides insights into the future of DRM systems in safeguarding digital content. | ||||
Keywords | ||||
digital right management; encryption algorithms; content protection | ||||
Statistics Article View: 138 PDF Download: 135 |
||||