π In-Depth Comparison of Popular Cryptographic Algorithms
Explore the strengths and weaknesses of various cryptographic algorithms in this comprehensive study. Download the full article to enhance your understanding of data security methods.

IJERT
73 views β’ Mar 9, 2022

About this video
πDownload Articleπ
https://www.ijert.org/comparative-study-of-cryptographic-algorithms
IJERTV9IS110240
Comparative Study of Cryptographic Algorithms
Kumar K , Dr. K. Sasikala
This paper pinpoints on the resource utilization and analysis of the performance of different cryptographic algorithms. Security is the most challenging issue that involves computers and communication and has to face prime risks. To overcome this security concern numerous cryptographic encryption procedures exists and do compare seven different algorithms namely DES, Triple DES, Blowfish, Twofish, AES and RSA. Keywords:- Cryptography, Symmetric, Asymmetric, Triple DES, Blowfish, Twofish, AES, RSA 1. INTRODUCTIONThe conversion of plaintext to cipher text is encryption and the reverse process is decryption. The type and length of the keys depends on the encryption algorithm and the measures of security needed. The use of Single key pertains to encryption and decryption in symmetric else it is asymmetric. With this key, the message is encrypted by the sender and is decrypted by the recipient, the key security is a challenge.
https://www.ijert.org/comparative-study-of-cryptographic-algorithms
IJERTV9IS110240
Comparative Study of Cryptographic Algorithms
Kumar K , Dr. K. Sasikala
This paper pinpoints on the resource utilization and analysis of the performance of different cryptographic algorithms. Security is the most challenging issue that involves computers and communication and has to face prime risks. To overcome this security concern numerous cryptographic encryption procedures exists and do compare seven different algorithms namely DES, Triple DES, Blowfish, Twofish, AES and RSA. Keywords:- Cryptography, Symmetric, Asymmetric, Triple DES, Blowfish, Twofish, AES, RSA 1. INTRODUCTIONThe conversion of plaintext to cipher text is encryption and the reverse process is decryption. The type and length of the keys depends on the encryption algorithm and the measures of security needed. The use of Single key pertains to encryption and decryption in symmetric else it is asymmetric. With this key, the message is encrypted by the sender and is decrypted by the recipient, the key security is a challenge.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
73
Likes
1
Duration
14:55
Published
Mar 9, 2022
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now