Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013, IJSRD
…
3 pages
1 file
Presently on a daily basis sharing the information over web is becoming a significant issue due to security problems. Thus lots of techniques are needed to protect the shared info in academic degree unsecured channel. The present work target cryptography to secure the data whereas causing inside the network. Encryption has come up as a solution, and plays an awfully necessary role in data security. This security mechanism uses some algorithms to scramble info into unclear text which can be exclusively being decrypted by party those possesses the associated key. This paper is expounded the varied forms of algorithmic rule for encryption & decryption: DES, AES, RSA, and Blowfish. It helps to hunt out the best algorithmic rule.
In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work focus on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm in cryptography. Secondly, by using decryption technique the receiver can view the original data. In this paper we implemented three encrypt techniques like AES, DES and RSA algorithms and compared their performance of encrypt techniques based on the analysis of its stimulated time at the time of encryption and decryption. Experiments results are given to analyses the effectiveness of each algorithm.
Global journal of computer science and technology, 2013
In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work focus on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm in cryptography. Secondly, by using decryption technique the receiver can view the original data. In this paper we implemented three encrypt techniques like AES, DES and RSA algorithms and compared their performance of encrypt techniques based on the analysis of its stimulated time at the time of encryption and decryption. Experiments results are given to analyses the effectiveness of each algorithm.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023
Cryptography is the technique for hiding data and information from unauthorized users. It is the art of achieving security by encoding messages to make them non-readable. When we send simple message from one location to another then this message called plain text is visible to anybody. If we want to codify the message called cipher text so that no one can easily understand the meaning of message then we use cryptography techniques. There are numerous applications where this technology is used such as ATM pin, Password, Credit Card number or any other secret communication. Cryptography can be divided into following three categories depending upon the types of key used: secret key (symmetric) cryptography, public key (asymmetric) cryptography and hash functions. In this paper we provide review of various types of cryptography techniques.
Encryption is such a process of scrambling the messages so that intended messages can only be read. Encryption provides a means where information is secured. With more information stored in computers and send via computer networks, the need to ensuring that the information is not vulnerable to snooping or tampering becomes quite relevant. With this fast progression towards the digital form of data exchange especially in digital media, Information security is thus becoming more significant in transmission and storage of data. Information confidentiality being a prominent significance in research and study of law, ethics and information systems. With the evolution of the human form of intelligence, the art of cryptography has hence become complex as a way of making information more secure. Encryption systems arrays are being the deployed mostly into the world of by various Information systems agencies [1]. Cryptography is such an integral aspect of a modern world of informatics unintelligible to any unauthorized people. There are many algorithms with such cost-performance tradeoff. Thus, among this cryptographic algorithm, we choose one which bests suits the end user requirements. The study of Algorithms weaknesses, strengths and performance will provide much-needed insights. In this paper, we will analyze in details performance visa -vis cost of popular cryptographic algorithms as 3DES, RSA, DES and AES to ascertain their effectiveness in data security.
International Journal of Science Technology & Engineering
In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is which technique should be used to provide secure transmission. This paper provides an analysis of various encryption algorithms i.e. AES, DES, 3DES, Blowfish, RC4, RC6. The Comparison is also provided.
In today's information age, communication play a very important role which help in growth of new technologies. So security is an essential parameter to be considered. A mechanism is therefore needed to secure the information that is sent. The process of transforming the original information into an unreadable format is known as encryption. The process of again converting the unreadable format in to the original information is known as decryption. The study of both encryption and decryption is known as cryptography. This paper focuses on analysing different types of cryptography, concept of encryption and decryption, a brief introduction to cryptography techniques. If we are taking about security of information then following services come in mind i.e. Confidentiality (privacy of information), Authentication, Integrity (has not been altered) .This paper provides a detailed description of all these cryptography techniques and a public key cryptography algorithm RSA.
2014
In a recent era, Network security is playing the important role in communication system. Almost all organization either private or government can transfer the data over internet. So the security of electronic data is very important issue. Cryptography is technique to secure the data by using Encryption and Decryption Process. Cryptography is science of “secret information “it is the art of hiding the information by Encryption and Decryption. Encryption is the process to convert the Plaintext into unreadable format known ciphertext and Decryption is the process to convert cipher text into plaintext. Numbers of algorithm used for encryption and Decryption like DES, 2DES, 3DES, RSA, RC2, RC4, RSA, IDEA, Blowfish, AES but AES algorithm is more efficient and Effective AES algorithm is 128 bit block oriented symmetric key encryption algorithm. In this paper I describe the brief introduction of AES algorithm .My paper is divide into following Section. In I Section I Present the brief intro...
In this modern world of communications, cryptography has an important role in the security of data transmission and is the best method of data protection against passive and active fraud. Cryptography is an algorithmic process of converting a plain text or clear text message to a cipher text or cipher message based on an algorithm that both the sender and receiver know. There are a number of algorithms for performing encryption and decryption, but comparatively few such algorithms have stood the test of time. The most successful algorithms use a key. In this paper, we may gain knowledge about the cryptography algorithms and its role in Encryption and Decryption.
2021
In recent years network security has become an important issue. Encryption has come up as a solution and plays an important role in the information security system. Many techniques are needed to protect the shared data. The present work focuses on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm in cryptography, user selects via which technique he wants to encrypt/decrypt data. Secondly, by using the decryption technique (as per the user's choice), the receiver can view the original data. Key is sent via Email using steganography.
2021
With the emerging technology connected with the internet, there is one constant issue related to that is data security. The only solution with which this issue can be resolved at a limit and can be used to protect the data is various algorithms for encryption. Though different approaches were used for the same, Cryptography seems to be efficiently protecting the data while transmitting in network from sender to receiver. Firstly the data is encrypted before sending to receiver using the most secure and reliable encryption algorithm. Secondly, at the receiver end it can be decrypted using the same decryption algorithm. Only receiver will have the key with which the data can be decrypted. In this paper, AES, DSS and RSA algorithms were implemented. These algorithms are encryption algorithms which perform encoding and decoding of data, to be sent from sender to receiver, using the keys. Each have different criteria for encryption and are then compared based on different parameters viz....
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
International Journal of Engineering in Computer Science
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
International Journal of Engineering Development and Research, 2014
International Journal of Computer Applications, 2017
International Journal of Computer Applications, 2012
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2021
International Journal of Engineering And Computer Science, 2014
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022