A Review Paper on Encryption Techniques (original) (raw)
Related papers
A Review on Symmetric Key Encryption Techniques in Cryptography
International Journal of Computer Applications, 2016
In the era of digital communication, the information sharing is rapidly increased. All the data which being sent or received are vulnerable to many active and passive attacks. Therefore, secure the data during communication is the most important concern. Cryptography performs an essential role to secure the communication in network and it comes with an amazing solution to supply the needed protection against the intruders of data. Over a considerable time, the techniques of data encryption took a huge leap from very easy methods to very difficult mathematical calculations in an effort to generate a strong security for the communication. However still along with its difficulty, the algorithms of cryptographic are prone to many attacks. this paper is explains many techniques of symmetric key encryption, its comparison and their vulnerabilities to attacks.
A Review on Various Most Common Symmetric Encryptions Algorithms
IJSRD, 2013
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
Overview on Symmetric Key Encryption Algorithms
In today’s digital communication era sharing of information is increasing significantly. The information being transmitted is vulnerable to various passive and active attacks. Therefore, the information security is one of the most challenging aspects of communication. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form by using Encryption and Decryption Techniques. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. There are basically two techniques of cryptography Symmetric and Asymmetric. This paper presents a detailed study of the symmetric encryption techniques.
Encryption techniques-Study & Comparison
International Journal of Science Technology & Engineering
In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is which technique should be used to provide secure transmission. This paper provides an analysis of various encryption algorithms i.e. AES, DES, 3DES, Blowfish, RC4, RC6. The Comparison is also provided.
A comparative survey of symmetric and asymmetric key cryptography
Network security is an important aspect of information sharing. Attempts have been made to remove various insecurities over internet. For this, many technological implementations and security policies have been developed. The amount of data, transferred, is not a factor. The basic factor is, how much security, the channel provides while transmitting data. Cryptography is one such technique, which allows secure data transmission without losing its confidentiality and integrity. Based on the key distribution, cryptography is further classified into two major types-Symmetric Key Cryptography and Asymmetric Key Cryptography. In this paper, we have surveyed the traditional algorithms, along with the proposed algorithms based on their pros and cons, related to Symmetric and Asymmetric Key Cryptography. We have also compared the importance of both these cryptographic techniques. The proposed algorithms proved to be highly efficient in their respective grounds but there are certain areas that remained open, related to these algorithms, and have not yet been thoroughly discussed. This paper also presents an appropriate future scope related to these open fields.
Symmetric Encryption Algorithms: Review and Evaluation Study
International Journal of Communication Networks and Information Security (IJCNIS), 2020
The increased exchange of data over the Internet in the past two decades has brought data security and confidentiality to the fore front. Information security can be achieved by implementing encryption and decryption algorithms to ensure data remains secure and confidential, especially when transmitted over an insecure communication channel. Encryption is the method of coding information to prevent unauthorized access and ensure data integrity and confidentiality, whereas the reverse process is known as decryption. All encryption algorithms aim to secure data; however, their performance varies according to several factors such as file size, type, complexity, and platform used. Furthermore, while some encryption algorithms outperform others, they have been proven to be vulnerable to specific attacks. In this paper, we present a general overview of common encryption algorithms and explain their inner workings. Additionally, we select ten different symmetric encryption algorithms and conduct a simulation in Java to test their performance. The algorithms we compare are AES, BlowFish, RC2, RC4, RC6, DES, DESede, SEED, XTEA, and IDEA. We present the results of our simulation in terms of encryption speed, throughput, and CPU utilization rate for various file sizes ranging from 1MB to 1GB. We further analyze our results for all measures that have been tested, taking into account the level of security they provide.
A Comparative Study of Symmetric Key Encryption Algorithms
2014
Fast growing Internet and network applications have increased the fast the need to protect such applications. Encryption algorithms play the main role in information security systems. On the other hand, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of five most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2 and RC6. A comparative study has been conducted for these encryption algorithms for different sizes of data blocks, battery power consumption, different key size and finally encryption/decryption speed.
A Comparative and Analytical Study on Symmetric Key Cryptography
Science and Technology are updating rapidly. Data are transferred through various communicative mediums. Hence always there been a major requirement of confidentiality and secure authorization of information to prevent the unauthorised access and attacks. Symmetric key cryptography is an integral part of cryptographic technique which ensures high security and confidentiality of data transmitted through the communication channel using a common key for both encryption and decryption. There are so many traditional symmetric key algorithms as well as some proposed algorithms which can provide high confidentiality along with authorized access of data. In this paper we made a comparison analysis of some of those proposed algorithms as well as the traditional algorithms of symmetric cryptography with the merits and demerits of those different types algorithm.
Analysis of Different Cryptography Algorithms
2016
Cryptography is a very important tool for protecting information in Internet. Every time we connect to the Internet the browser uses appropriate cryptographic algorithms on our behalf. There are various cryptography techniques under the symmetric and asymmetric cryptosystem. The perfect selection of specific encryption scheme play important role to exchange the information and to enhance security objectives. The study is done some of the more popular cryptography algorithm currently in used. Practical cryptosystems are either symmetric or asymmetric in nature. This paper compares both the scheme on the basis of different parameter and also compares trendy encryption techniques for convinced selection of both key and cryptographic scheme. Finally this comprehensive analysis thrash outs the latest trends and research issues upon cryptographic elements to conclude forthcoming necessities related to cryptographic key, algorithm structure and enhanced privacy.