Analysis in Symmetric and Asymmetric Cryptology Algorithm

In this paper, the authors present a peer analysis in the field of encryption algorithms, in concentrating on private key block ciphers which are generally used for bulk data and link encryption. They have initially survey some of the more popular and efficient algorithms currently in use. This paper focuses mainly on the different kinds of encryption techniques that are existing, and comparative study all the techniques together as a literature survey. Aim an extensive experimental study of implementations of various available encryption techniques. Also focuses on image encryption techniques, information encryption techniques.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Resource Details

Provided by:
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Topic:
Security
Format:
PDF