ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey On Some Encryption Algorithms And Verification Of RSA Technique

Journal: International Journal of Scientific & Technology Research (Vol.2, No. 12)

Publication Date:

Authors : ;

Page : 285-287

Keywords : Index Terms Encryption; Secret key encryption; Public key encryption; DES; 3DES; Blowfish; CAST; RSA encryption.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Abstract Information security becomes much important in data storage and transmission. The term information security refers to the processes and methodologies which are designed and implemented to protect data from unauthorized access use misuse disclosure modification or disruption. Encryption algorithm play important roles in information security. This paper provides case study of five encryption algorithms DES 3DES Blowfish CAST RSA and also provides encryption and decryption data by using the RSA asymmetric encryption algorithm. Simulation has been conducted using C language. Experimental results are given to analyses the implementation of RSA algorithm.

Last modified: 2014-03-17 17:43:58