Comparative Study of Cryptographic Algorithms

👇Download Article👇 https://www.ijert.org/comparative-study-of-cryptographic-algorithms IJERTV9IS110240 Comparative Study of Cryptographic Algorithms Kuma...

IJERT73 views14:55

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Thailand under the topic 'สภาพอากาศ'.

About this video

👇Download Article👇 https://www.ijert.org/comparative-study-of-cryptographic-algorithms IJERTV9IS110240 Comparative Study of Cryptographic Algorithms Kumar K , Dr. K. Sasikala This paper pinpoints on the resource utilization and analysis of the performance of different cryptographic algorithms. Security is the most challenging issue that involves computers and communication and has to face prime risks. To overcome this security concern numerous cryptographic encryption procedures exists and do compare seven different algorithms namely DES, Triple DES, Blowfish, Twofish, AES and RSA. Keywords:- Cryptography, Symmetric, Asymmetric, Triple DES, Blowfish, Twofish, AES, RSA 1. INTRODUCTIONThe conversion of plaintext to cipher text is encryption and the reverse process is decryption. The type and length of the keys depends on the encryption algorithm and the measures of security needed. The use of Single key pertains to encryption and decryption in symmetric else it is asymmetric. With this key, the message is encrypted by the sender and is decrypted by the recipient, the key security is a challenge.

Video Information

Views
73

Total views since publication

Likes
1

User likes and reactions

Duration
14:55

Video length

Published
Mar 9, 2022

Release date

Quality
hd

Video definition

About the Channel