CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

Overview of Security Algorithms

Published on April 2017 by Saloni Goyal
National Conference on Contemporary Computing
Foundation of Computer Science USA
NCCC2016 - Number 2
April 2017
Authors: Saloni Goyal
2742e06b-4bb5-454a-8a95-541e8d7ff91c

Saloni Goyal . Overview of Security Algorithms. National Conference on Contemporary Computing. NCCC2016, 2 (April 2017), 32-36.

@article{
author = { Saloni Goyal },
title = { Overview of Security Algorithms },
journal = { National Conference on Contemporary Computing },
issue_date = { April 2017 },
volume = { NCCC2016 },
number = { 2 },
month = { April },
year = { 2017 },
issn = 0975-8887,
pages = { 32-36 },
numpages = 5,
url = { /proceedings/nccc2016/number2/27347-6372/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Contemporary Computing
%A Saloni Goyal
%T Overview of Security Algorithms
%J National Conference on Contemporary Computing
%@ 0975-8887
%V NCCC2016
%N 2
%P 32-36
%D 2017
%I International Journal of Computer Applications
Abstract

In ancient times we did not have technology to transfer messages (data) electronically and hence only the receivers receives it. No third could intercept it. Nowadays web apps have become popular and widely used in fields that require high level of security such as finance, military systems, E-mails, medicals, etc. With increase in this, increase in malicious activities and attacks have been observed. Hosts have become botnets[1], number of host scam phishing sites have increased. Actions without a prior thought and thinking without acting can now not be given any place. It's high time to secure our data. This paper comprises of an overview of security algorithms that are a shield to our electronic data.

References
  1. Neelam Paliwal, Ramesh Singh Rawat, Deepak Singh Rana,2015, Survey of Botnet Based DDoS Attack and Recent DDoS Incidents, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 5.
  2. Kartikey Agarwal and Dr. Sanjay Kumar Dubey, 2014, Network Security: Attacks and Defence, International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE), Volume 1, Issue 3.
  3. Ritu Pahal, Vikas Kumar, 2013, Efficient Implementation of AES, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue7.
  4. K. S. Suresh and Prof. K. V Prasad, 2012, Security Issues and Security Algorithms in Cloud Computing, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10
  5. Clay S. Turner, 2008, Euler's Toitent Function and Public Key Cryptography, The Pennsylvania State University
  6. Ekta Lamba and Lalit Garg, 2014, Enhanced Diffie Hellman Algorithm, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 6.
  7. Imad Fakhri Al-shaikhli, Mohammad A. Alahmad and Khanssaa Munthir, 2013, Hash Function of Finalist SHA-3: Analysis Study, International Journal of Advanced Computer Science and Information Technology(IJACSIT), Vol. 2, No. 2
  8. Amar Jaffar and Christofer J. Martinez, 2013, Detail Power Analysis of the SHA-3 Hashing Algorithm Candidates on Xilinx Spartan-3E, Vol. 5, No. 4
  9. Littey P. Oomenn and Anas A S,2013, Skein and Threefish Implementation on FPGA, International Journal of Science and Research (IJSR), Vol. 4,Issue 5.
  10. Dmitry Khovratovich, Ivica Nikoli´c, and Ralf-Philipp Weinmann, 2009, Meet-in-the-Middle Attacks on SHA-3 Candidates, International Association for Cryptologic Research.
  11. Rashmi A. Gandhi and Atul M. Gosai, 2015, A Study on Current Scenario of Audio Encryption, International Journal of Computer Applications, Vol. 116, No 7.
  12. Rajeev Sobti, G. Geetha, 2012, Cryptographic Hash Functions: A Review, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 2.
  13. Rajeev Sobti, G. Geetha, 2012, Cryptographic Hash Functions: A Review, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 2
  14. SIGCHI Conference on Human Factors in Computing Systems
  15. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  16. Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398. , University of Washington.
  17. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  18. Brown, L. D. , Hua, H. , and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  19. Y. T. Yu, M. F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
Index Terms

Computer Science
Information Sciences

Keywords

Secret Key Cryptography Public Key Cryptography Rsa Cryptographic Algorithms Aes Ecc