Volume & Issue no: Volume 3, Issue 4, July - August 2014
____________________________________________________________________________________________________
Title: |
A Survey of Various Cryptography Techniques |
Author Name: |
Mitali, Vijay Kumar and Arvind Sharma |
Abstract: |
Abstract
In modern era, evaluation of networking and wireless
networks has come forward to grant communication
anywhere at any time. Security of wireless networks is main
aspect and the process of cryptography plays an important
role to provide the security to the wireless networks. There are
various cryptography techniques both symmetric and
asymmetric. The survey is done on some of the more popular
and interesting cryptography algorithms currently in use and
their advantages and disadvantages are also discussed. This
paper provides a fair performance comparison between the
various cryptography algorithms on different settings of data
packets. In this paper we analyze the encryption and
decryption time of various algorithms on different settings of
data.
Keywords: Encryption, DES, AES, Blowfish, RSA |
Cite this article: |
Mitali, Vijay Kumar and Arvind Sharma , "
A Survey of Various Cryptography Techniques" , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) ,
Volume 3, Issue 4, July - August 2014 , pp.
307-312 , ISSN 2278-6856.
|
Full Text [PDF] Back to Current Issue |
NOTE: Authors note that paper cannot be withdrawn at any condition once it is accepted. The Team of IJETTCS advise you, do not submit same article to the multiple journals simultaneously. This may create a problem for you. Please wait for review report which will take maximum 01 to 02 week.