Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Comparative Analysis of Cryptography Algorithms


Affiliations
1 Department of Electronics and Communication, United Institute of Technology, Coimbatore, India
     

   Subscribe/Renew Journal


This paper is based on the analysis of the various algorithms in cryptography technique. With the fast changing technologies in today, more data are generated and transmitted. If the confidentiality of the information is very high, it should be protected. Cryptography is used to protect the personal or important data from the unauthorized people who try to access it . Cryptography is widely used by government and intelligence agencies around the world for the transmission of information. It can be either online offline. In this paper various cryptography algorithms are studied and compared.


Keywords

Cryptography, Hashing, Symmetric Key.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 354

PDF Views: 3




  • A Comparative Analysis of Cryptography Algorithms

Abstract Views: 354  |  PDF Views: 3

Authors

M. B. Nivetha
Department of Electronics and Communication, United Institute of Technology, Coimbatore, India
S. Sivaramakrishnan
Department of Electronics and Communication, United Institute of Technology, Coimbatore, India

Abstract


This paper is based on the analysis of the various algorithms in cryptography technique. With the fast changing technologies in today, more data are generated and transmitted. If the confidentiality of the information is very high, it should be protected. Cryptography is used to protect the personal or important data from the unauthorized people who try to access it . Cryptography is widely used by government and intelligence agencies around the world for the transmission of information. It can be either online offline. In this paper various cryptography algorithms are studied and compared.


Keywords


Cryptography, Hashing, Symmetric Key.