Comparative analysis of modern methods and algorithms of cryptographic protection of information (original) (raw)

Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication

Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing. To write this paper we have Study about information security using cryptography technique. After the detailed study of Network security using cryptography, I am presenting my proposed work. This paper is dividing in four sections contain of basic introduction about Information Security using cryptography, detailed description of Information security using cryptography and various algorithms, also; we are presenting proposed algorithm, Presenting summary and references where we have completed my research. The proposed algorithm has the batter speed compared with the comparing encryption algorithm. Nevertheless, the proposed algorithm improves encryption security by inserting the symmetric layer. The proposed algorithm will be useful to the applications which require the same procedure of encryption and decryption. In this paper also, we have developed a new cryptography algorithm which is based on block cipher concept. In this algorithm we have used logical operation like XOR and shifting operation. Experimental results show that proposed algorithm are very efficient and secured, and this paper covers the various techniques and algorithms used for the data security.

CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY

—In today's world of Computer and Internet; most o f the data travel over computer network and it becomes challenging task to secure this data. So there is need of an efficient and simple way of securing the electronic documents from being read or used by people other than authorized one. Some of the mechanisms used to secure data are: authenticating the user, using access control mechanism (such as profiling), restricting physical access (i.e. k eeping media locked) and encrypted communication between two hosts. Cryptography is one of the main categories of information security.

Encryption techniques-Study & Comparison

International Journal of Science Technology & Engineering

In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is which technique should be used to provide secure transmission. This paper provides an analysis of various encryption algorithms i.e. AES, DES, 3DES, Blowfish, RC4, RC6. The Comparison is also provided.

A Review Paper on Encryption Techniques

2019

: Today’s world is depend on internet and its application where transmitting data through network communication via mail, social group, online banking etc., Hence there comes the requirement of securing the information is a must and so cryptography techniques are employed such as symmetric key and asymmetric key techniques. In this paper, few symmetric and asymmetric key encryption techniques are reviewed, compared and tested with cryptography tools to check its security strength.

A Comparative Survey of Various Cryptographic Techniques

Now a days world that is characterized by the rapid rise in the number of attacking or hacking issues and more especially using more superior methods, it is prudent that a lot of IT research be intended for finding answer to the rising threats to the online or internet system , including the network itself and data and the information that carries and store from one location to another. Thus, information is a very important asset and must be kept confidential, have integrity and become available in order to be worth its name and be credible. The thought of information security lead to the development of Cryptography. In other words, Cryptography is the science of keeping information secure. It includes encryption and decryption of data or messages. Cryptography, in addition to providing confidentiality, also provides Integrity, Authentication and Non-repudiation. Based totally on the key distribution, cryptography is categorized into two important types-Symmetric Key Cryptography an...

DATA SECURITY USING VARIOUS CRYPTOGRAPHY TECHNIQUES: A RECENT SURVEY

— Today internet is widely used tool for communication, exchange of information and sending and receiving of data using computers, mobile phones and other electronic gadgets. Unsecured data that travels through different networks are open and can be read, altered or copied by anyone who has access to that data. Cryptographic algorithms are used to encrypt and decrypt messages. In the past year several algorithm have been developed for improving the efficiency of Cryptographic algorithms. Each and every algorithm used different techniques and process to encryption and decryption the data. In this paper we represent a comparative study of various encryptions, decryption algorithms.

Cryptographic Techniques in Information Security

This paper focuses on the role of cryptography in the information security system and discussed some of the techniques which are used in cryptography. Earlier, Cryptography mainly is used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the uses are limited. In the modern days, the Cryptography be expanded a lot in the area of communication, securing e-commerce etc. Cryptography is used to transmit the message confidentially where no any trouble can happen between transmission.

Comparative Study of Cryptography with Different Encryption Algorithm

Journal of emerging technologies and innovative research, 2019

Cryptography can be briefly explained as the study of technique for secure communication and data transfer in presence of intruders. Encryption is quite interesting technology which works on the principle of scrambling and converting data into cipher text which is unreadable format of simple data.One of the most vital piece of IT is cryptography techniques as it responsible for securing sophisticated data which is going to transfer through network. This research paper includes overview study of cryptography techniques and algorithms. The algorithms are classified and conclusions are drawn on the basis of the advantage and disadvantages. The main purpose of this paper is to compare the working and viability of different algorithms available in cryptography.

A Study on Cryptographic Techniques

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020

In current scenario, to store data securely on online is a tedious task as a result proper security over the network. Cryptography is a technique that masks the data over the channel of communication. Hiding the data to outsiders is an art. As the technology grows day by day, the need for data security over the channel of communication is greatly increased. Several cryptographic schemes are used for secure communication. The cryptographic technique and various algorithms are used to ensure the application has the necessary security. Cryptography is the science of both encryption and decryption. This paper describes all of the cryptographic techniques in detail.

A Review Paper on Data Encryption and Decryption

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023

Cryptography is the technique for hiding data and information from unauthorized users. It is the art of achieving security by encoding messages to make them non-readable. When we send simple message from one location to another then this message called plain text is visible to anybody. If we want to codify the message called cipher text so that no one can easily understand the meaning of message then we use cryptography techniques. There are numerous applications where this technology is used such as ATM pin, Password, Credit Card number or any other secret communication. Cryptography can be divided into following three categories depending upon the types of key used: secret key (symmetric) cryptography, public key (asymmetric) cryptography and hash functions. In this paper we provide review of various types of cryptography techniques.