Analysis and Review of Encryption and Decryption for Secure Communication (original) (raw)
Related papers
A Study of Encryption Algorithms AES, DES and RSA for Security
Global journal of computer science and technology, 2013
In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work focus on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm in cryptography. Secondly, by using decryption technique the receiver can view the original data. In this paper we implemented three encrypt techniques like AES, DES and RSA algorithms and compared their performance of encrypt techniques based on the analysis of its stimulated time at the time of encryption and decryption. Experiments results are given to analyses the effectiveness of each algorithm.
A Literature Review on RSA, DES and AES Encryption Algorithms
Emerging Trends in Engineering and Management
Now a days, as more and more information is communicated via computers, the need is to ensure that this information is secure and information can be secured by the means of encryption algorithms. Securing information refers to the methodologies that are implemented to protect sensitive information from misuse or disclosure as it causes risk. Encryption is the process of conglomerating or scrambling a message so that only the intended recipient can read it. With the fast progression of digital data exchange in electronic way, Information security is becoming much more important in data storage and transmission. With the evolution of human intelligence, the art of cryptography has become more complex in order to make information more secure. Various encryption algorithms are deployed to make information more secure. In this paper, a survey of RSA, DES and AES encryption algorithms are presented.
Implementation of Secured Message Transmission using DES and RSA Cryptosystem
In the past, Cryptography was used in keeping military information, diplomatic correspondence secure and in protection of national security. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations. This is used to ensure that the contents of a message are confidentially transmitted and would not be altered. In this paper, we have implemented a cryptosystem (encrypting/decryption) for text data using both Data Encryption Standard (DES) and Rivest-Shamir-Adleman (RSA) cryptosystem. The asymmetric algorithm was used for the key encryption and decryption process because it provides a means to deliver keys on a secure channel, while the data to be sent will be encrypted and decrypted using the symmetric algorithm. This system was designed to accomplish a number of security features such as authentication, confidentiality, integrity, and non-repudiation. Also the combination of the speed and strength of the symmetric algorithm with the robustness and key management capability of the asymmetric algorithm, thereby producing an enhanced encryption algorithm and we employed text data as our experimental data.
A Comparative Analysis of Different Encryption Algorithms: RSA, AES, DSS for Data Security
2021
With the emerging technology connected with the internet, there is one constant issue related to that is data security. The only solution with which this issue can be resolved at a limit and can be used to protect the data is various algorithms for encryption. Though different approaches were used for the same, Cryptography seems to be efficiently protecting the data while transmitting in network from sender to receiver. Firstly the data is encrypted before sending to receiver using the most secure and reliable encryption algorithm. Secondly, at the receiver end it can be decrypted using the same decryption algorithm. Only receiver will have the key with which the data can be decrypted. In this paper, AES, DSS and RSA algorithms were implemented. These algorithms are encryption algorithms which perform encoding and decoding of data, to be sent from sender to receiver, using the keys. Each have different criteria for encryption and are then compared based on different parameters viz....
Study on Cryptography and Techniques
In today's information age, communication play a very important role which help in growth of new technologies. So security is an essential parameter to be considered. A mechanism is therefore needed to secure the information that is sent. The process of transforming the original information into an unreadable format is known as encryption. The process of again converting the unreadable format in to the original information is known as decryption. The study of both encryption and decryption is known as cryptography. This paper focuses on analysing different types of cryptography, concept of encryption and decryption, a brief introduction to cryptography techniques. If we are taking about security of information then following services come in mind i.e. Confidentiality (privacy of information), Authentication, Integrity (has not been altered) .This paper provides a detailed description of all these cryptography techniques and a public key cryptography algorithm RSA.
JOURNAL OF XI'AN UNIVERSITY OF ARCHITECTURE & TECHNOLOGY, 2020
One of the common problems of sharing resources over a data communication network is security. Generally sharing information's and resources over a network between a huge number of users is important especially in computer science and engineering field, and this becomes a critical problem for data security. Nowadays many algorithms used for encryption and decryption of data. Cryptography algorithms are divided into symmetric and asymmetric algorithms based on the key used between the sender and receiver of the pieces of information. this paper provides a comparison between symmetric and asymmetric algorithms by using two common algorithms such as AES and RSA. The comparison process focused on the execution time for encrypting and decrypting message of various word length.
RSA Encryption and Decryption System
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
For communication in the wireless networking, transmission of data over network sometimes is not safe. In such case security of network is one of the essential aspect in computer networking. Cryptography is antechnique of transforming an plaindata into encrypted one, and then retransform that encrypted data back to its plain (original) form. In this we authenticate the sender to whom you want to send that data file. There are two different techniques of cryptography, symmetric key cryptography (called public-key cryptography) algorithms and asymmetric key cryptography (called public-key cryptography) algorithms. There are also various algorithms for encrypted data using either public or private key or both. This paper describes RSA algorithm which first convert our data into other form and then encrypt it using RSA public key encryption at sender side & at receiver side, first it authenticate the receiver then decrypt the data/ file and convert into original form.
Review on Comparative Study of Various Cryptography Algorithm
Cryptography refers to the tools and techniques used to make messages secure for communication between the participants and make messages immune to attacks by hackers. For private communication through public network, cryptography plays a very crucial role. Cryptography is a method to provide information confidentiality, authenticity and integrity .Cryptography can be categorized into symmetric or asymmetric. In this paper we have defined and analyzed various cryptographic symmetric algorithms like DES, Triple DES, AES and asymmetric key cryptographic algorithms like RSA.
Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security
Edu Komputika Journal
There are many ways to ensure data security, one of the classic way but still effective is to use encryption. Encryption itself has two techniques or algorithms: symmetric-key (also called secret-key) and asymmetric-key encryption (also called public key). In this paper, we proposed an analysis of two algorithm of encryption: RSA and AES algorithm in term of securing digital data. The method used in this research are: RSA and AES analysis, then retrieving the result. The two algorithm is deeply and thoroughly analyzed to discover the effectiveness to secure the data. The Technological Readiness Level (TKT) is at level 6, which means demonstration of a model or prototype or the analysis result of a system or subsystem or a study in a relevant environment. The result concluded that the application of the AES encryption algorithm is more optimal than RSA encryption in digital data security. Because the encryption and decryption process of using the AES algorithm is faster, although the...
A Study of Encryption Algorithms
In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work focus on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm in cryptography. Secondly, by using decryption technique the receiver can view the original data. In this paper we implemented three encrypt techniques like AES, DES and RSA algorithms and compared their performance of encrypt techniques based on the analysis of its stimulated time at the time of encryption and decryption. Experiments results are given to analyses the effectiveness of each algorithm.