πŸ”’ In-Depth Comparison of Popular Cryptographic Algorithms

Explore the strengths and weaknesses of various cryptographic algorithms in this comprehensive study. Download the full article to enhance your understanding of data security methods.

πŸ”’ In-Depth Comparison of Popular Cryptographic Algorithms
IJERT
73 views β€’ Mar 9, 2022
πŸ”’ In-Depth Comparison of Popular Cryptographic Algorithms

About this video

πŸ‘‡Download ArticleπŸ‘‡

https://www.ijert.org/comparative-study-of-cryptographic-algorithms
IJERTV9IS110240
Comparative Study of Cryptographic Algorithms

Kumar K , Dr. K. Sasikala

This paper pinpoints on the resource utilization and analysis of the performance of different cryptographic algorithms. Security is the most challenging issue that involves computers and communication and has to face prime risks. To overcome this security concern numerous cryptographic encryption procedures exists and do compare seven different algorithms namely DES, Triple DES, Blowfish, Twofish, AES and RSA. Keywords:- Cryptography, Symmetric, Asymmetric, Triple DES, Blowfish, Twofish, AES, RSA 1. INTRODUCTIONThe conversion of plaintext to cipher text is encryption and the reverse process is decryption. The type and length of the keys depends on the encryption algorithm and the measures of security needed. The use of Single key pertains to encryption and decryption in symmetric else it is asymmetric. With this key, the message is encrypted by the sender and is decrypted by the recipient, the key security is a challenge.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

73

Likes

1

Duration

14:55

Published

Mar 9, 2022

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.

Trending Now