Security

Survey Report on Implementation of Optimized Cryptographic Algorithm

Free registration required

Executive Summary

Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Cryptographic algorithms are widely used in Internet Systems. Applications of cryptographic algorithms include credentials establishment i.e. authentication, securing contents i.e. encryption/decryption of communication data or rights managed objects, & IP protection. Optimized cryptographic algorithms are cryptographic algorithms that are tuned to consume as little system resources as possible, while at the same time providing reasonable performance and security. This paper gives a brief overview of various optimization methods for different encryption and decryption techniques.

  • Format: PDF
  • Size: 509.22 KB