CFP last date
22 April 2024
Reseach Article

Comparitive Study on Various Cryptographic Techniques

Published on March 2015 by K.b. Priya Iyer, R. Anusha, R. Shakthi Priya
International Conference on Communication, Computing and Information Technology
Foundation of Computer Science USA
ICCCMIT2014 - Number 3
March 2015
Authors: K.b. Priya Iyer, R. Anusha, R. Shakthi Priya
f9f955e3-0b2e-4101-89bc-0ef8b2ec7c9f

K.b. Priya Iyer, R. Anusha, R. Shakthi Priya . Comparitive Study on Various Cryptographic Techniques. International Conference on Communication, Computing and Information Technology. ICCCMIT2014, 3 (March 2015), 37-42.

@article{
author = { K.b. Priya Iyer, R. Anusha, R. Shakthi Priya },
title = { Comparitive Study on Various Cryptographic Techniques },
journal = { International Conference on Communication, Computing and Information Technology },
issue_date = { March 2015 },
volume = { ICCCMIT2014 },
number = { 3 },
month = { March },
year = { 2015 },
issn = 0975-8887,
pages = { 37-42 },
numpages = 6,
url = { /proceedings/icccmit2014/number3/19786-7034/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Communication, Computing and Information Technology
%A K.b. Priya Iyer
%A R. Anusha
%A R. Shakthi Priya
%T Comparitive Study on Various Cryptographic Techniques
%J International Conference on Communication, Computing and Information Technology
%@ 0975-8887
%V ICCCMIT2014
%N 3
%P 37-42
%D 2015
%I International Journal of Computer Applications
Abstract

In today's world of internet technology that covers especially communication network security is a challenging issue. Hackers try to gain control over our system and steel data from it. To avoid this providing network security is an important task. Cryptography along with its various methods is used to serve this purpose. Cryptography is a technique to protect message by transforming it into an unreadable format called cipher text. It provides authentication, identification to user data, confidentiality and also provides security and privacy to the data stored. The main objective of this paper is to study the basic terms used in cryptography its purpose and to compare the encryption techniques used in cryptography.

References
  1. Ritu Tripathi, Sanjay Agrawal, "Comparative Study of Symmetric and Asymmetric Cryptography Techniques", International Journal of Advance Foundation and Research in Computer (IJAFRC),volume 1,issue 6,june 2014, ISSN 2348 – 4853.
  2. Ms. Ankita Umale, Ms. Priyanka Fulare, " Comparative Study of Symmetric Encryption techniques for Mobile Data Caching in WMN", The International Journal Of Engineering And Science (IJES) ,volume 3,issue 3,page 7-12,2014, ISSN (p): 2319 – 1805.
  3. E. Thambiraja, G. Ramesh and Dr. R. Umarani," A Survey on Various Most Common Encryption Techniques", International Journal of Advanced Research in Computer Science and Software Engineering, volume 2,Issue 7,july 2012,ISSN: 2277 128X.
  4. Apoorva, Yogesh Kumar," Comparative Study of Different Symmetric Key Cryptography Algorithms", International Journal of Application or Innovation in Engineering & Management (IJAIEM),volume 2,issue 7,july 2013, ISSN 2319 – 4847.
  5. AL. Jeeva, Dr. V. Palanisamy, K. Kanagaram," Comparative analysis of performance efficiency and security measures of some encryption algorithms", International Journal of Engineering Research and Applications (IJERA),volume 2,issue 3,may-jun 2012 ISSN: 2248-9622.
  6. S. Abdul. Elminaam, H. M. Abdul Kader, M. M. Hadhoud, ,"Performance Evaluation of Symmetric Encryption Algorithms" , International Business Information Management Association (IBIMA),2009.
  7. M. Abolhasan, T. Wysocki and E. Dutkiewicz," A review of routing protocols for mobile ad hoc networks, Ad Hoc Networks, Vol. 2, pp. 1-22, 2004.
  8. Mohit Marwaha, Rajeev Bedi, Amritpal Singh, Tejinder Singh "Comparative Analysis of Cryptographic Algorithms", International Journal of Advanced Engineering Technology, EISSN 0976-3945.
  9. Hamdan. O. Alanazi, B. B. Zaidan, A. A. Zaidan, Hamid A. Jalab, M. Shabbir and Y. Al-Nabhani, "New Comparative Study Between DES, 3DES and AES within Nine Factors", Journal Of Computing, ISSN 2151-9617.
  10. Harsh Kumar Verma , Ravindra Kumar Singh "Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms", International Journal of Computer Applications, ISSN: 0975-8887.
  11. Monika Agrawal, Pradeep Mishra," A Comparative Survey on Symmetric Key Encryption Techniques", International Journal on Computer Science and Engineering (IJCSE),Vol. 4 No. 05 May 2012, PP877-882.
  12. Shashi Mehrotra Seth, Rajan Mishra," Comparative Analysis Of Encryption Algorithms For Data Communication", IJCST, Vol. 2, Issue 2, June 2011 pp. 192-192.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Encryption Decryption