Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Comparitive Study on Various Cryptographic Techniques

Print
PDF
IJCA Proceedings on International Conference on Communication, Computing and Information Technology
© 2015 by IJCA Journal
ICCCMIT 2014 - Number 3
Year of Publication: 2015
Authors:
K. B. Priya Iyer
R. Anusha
R. Shakthi Priya

Priya K b Iyer, R Anusha and Shakthi R Priya. Article: Comparitive Study on Various Cryptographic Techniques. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2014(3):37-42, March 2015. Full text available. BibTeX

@article{key:article,
	author = {K.b. Priya Iyer and R. Anusha and R. Shakthi Priya},
	title = {Article: Comparitive Study on Various Cryptographic Techniques},
	journal = {IJCA Proceedings on International Conference on Communication, Computing and Information Technology},
	year = {2015},
	volume = {ICCCMIT 2014},
	number = {3},
	pages = {37-42},
	month = {March},
	note = {Full text available}
}

Abstract

In today's world of internet technology that covers especially communication network security is a challenging issue. Hackers try to gain control over our system and steel data from it. To avoid this providing network security is an important task. Cryptography along with its various methods is used to serve this purpose. Cryptography is a technique to protect message by transforming it into an unreadable format called cipher text. It provides authentication, identification to user data, confidentiality and also provides security and privacy to the data stored. The main objective of this paper is to study the basic terms used in cryptography its purpose and to compare the encryption techniques used in cryptography.

References

  • Ritu Tripathi, Sanjay Agrawal, "Comparative Study of Symmetric and Asymmetric Cryptography Techniques", International Journal of Advance Foundation and Research in Computer (IJAFRC),volume 1,issue 6,june 2014, ISSN 2348 – 4853.
  • Ms. Ankita Umale, Ms. Priyanka Fulare, " Comparative Study of Symmetric Encryption techniques for Mobile Data Caching in WMN", The International Journal Of Engineering And Science (IJES) ,volume 3,issue 3,page 7-12,2014, ISSN (p): 2319 – 1805.
  • E. Thambiraja, G. Ramesh and Dr. R. Umarani," A Survey on Various Most Common Encryption Techniques", International Journal of Advanced Research in Computer Science and Software Engineering, volume 2,Issue 7,july 2012,ISSN: 2277 128X.
  • Apoorva, Yogesh Kumar," Comparative Study of Different Symmetric Key Cryptography Algorithms", International Journal of Application or Innovation in Engineering & Management (IJAIEM),volume 2,issue 7,july 2013, ISSN 2319 – 4847.
  • AL. Jeeva, Dr. V. Palanisamy, K. Kanagaram," Comparative analysis of performance efficiency and security measures of some encryption algorithms", International Journal of Engineering Research and Applications (IJERA),volume 2,issue 3,may-jun 2012 ISSN: 2248-9622.
  • S. Abdul. Elminaam, H. M. Abdul Kader, M. M. Hadhoud, ,"Performance Evaluation of Symmetric Encryption Algorithms" , International Business Information Management Association (IBIMA),2009.
  • M. Abolhasan, T. Wysocki and E. Dutkiewicz," A review of routing protocols for mobile ad hoc networks, Ad Hoc Networks, Vol. 2, pp. 1-22, 2004.
  • Mohit Marwaha, Rajeev Bedi, Amritpal Singh, Tejinder Singh "Comparative Analysis of Cryptographic Algorithms", International Journal of Advanced Engineering Technology, EISSN 0976-3945.
  • Hamdan. O. Alanazi, B. B. Zaidan, A. A. Zaidan, Hamid A. Jalab, M. Shabbir and Y. Al-Nabhani, "New Comparative Study Between DES, 3DES and AES within Nine Factors", Journal Of Computing, ISSN 2151-9617.
  • Harsh Kumar Verma , Ravindra Kumar Singh "Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms", International Journal of Computer Applications, ISSN: 0975-8887.
  • Monika Agrawal, Pradeep Mishra," A Comparative Survey on Symmetric Key Encryption Techniques", International Journal on Computer Science and Engineering (IJCSE),Vol. 4 No. 05 May 2012, PP877-882.
  • Shashi Mehrotra Seth, Rajan Mishra," Comparative Analysis Of Encryption Algorithms For Data Communication", IJCST, Vol. 2, Issue 2, June 2011 pp. 192-192.