A Comparative Study of Various Cryptographic Algorithm Used in Bouncy Castle Toolkit

Download Now
Provided by: International Journal of Emerging Technology and Advanced Engineering (IJETAE)
Topic: Security
Format: PDF
In today's world communication mobile computing device has increased a lot. However, the communication over the mobile device must be secure. There must be secure transfer of information in order to provide security, integrity and secure message transfer. HTTPS might not be sufficient. Developer needs to take the help of various cryptographic packages. These packages are available as third party mobile cryptographic toolkit. This paper shows a comparison of various algorithms that are included in the bouncy castle toolkit. There key generation and relative study of both symmetric and asymmetric algorithm perform and will proves which algorithm is better and efficient.
Download Now

Find By Topic