全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2016 

Comparative Analysis of Cryptographic Algorithms

Keywords: cryptography, symmetric, asymmetric, architecture, security, limitations, DES, 3DES, CAST-128, BLOWFISH, IDEA, AES, RC6, RSA

Full-Text   Cite this paper   Add to My Lib

Abstract:

Sa?etak Cyber security ensures a secure information exchange and enables communication through the Internet. The data needs to be protected from unauthorized access and transmitted to the intended receiver with confidentiality and integrity. Cryptography enhances security by encrypting and decrypting raw data in a secured network. Many cryptographic algorithms are available, and they fall under either symmetric or asymmetric techniques. To choose an algorithm for secure data communication, the candidate algorithm should provide higher accuracy, security and efficiency. This paper presents the implementation limitations of existing cryptographic algorithms such as DES, 3DES, CAST-128, BLOWFISH, IDEA, AES, and RC6 of symmetric techniques and RSA of asymmetric techniques. This paper also analyzes parameters like key exchange, flexibility and security issues of the algorithms which determines the efficiency of the cryptosystem

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133