Analytical Study on Encryption Techniques and Challenges in Network Security
Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.6, No. 6)Publication Date: 2018-01-08
Authors : Anuraj C.K Shelbi joseph;
Page : 153-162
Keywords : The analysis of encryption algorithms based on the performance and vulnerabilities to various attacks gives the significance of the existing security algorithms in future computing trends and the need of more secure encryption techniques.;
Abstract
Abstract Importance of data security and network security is increasing day by day for various hardware and software applications in human life. Now many of the human activities are automated and in future more areas will come as part of network system. So most of the devices will come to the internet and it is important to ensure security of data being transmitted. The encryption algorithms play a huge role to ensure security of data during transmission. This paper presents the various ways to classify and compare different symmetric encryption algorithms based on the process, structure and modes used for encryption and decryption. Also the performance of the widely used symmetric algorithms such as DES, 3DES, AES, and Blowfish are compared in this paper to evaluate the efficiency. The encryption algorithms are used by many application areas, but most of them are not free from attacks. The analysis of block cipher encryption algorithms based on the application areas and vulnerability to various attacks are listed in this paper. These comparisons and analyses will be useful to identify most suitable algorithm for different application areas like cloud, Bigdata, IOT, WSN and MANET.
Other Latest Articles
- Information dissemination using computer and communication technologies for improving agriculture productivity
- A Novel Data Fusion of Navigation and Surveillance Facilities using Multi Dimensional Kalman Filter Algorithm in Linux Environment for Optimal Air Space Management
- Subset Sum Problem-New Representation Approach for finding the solution
- Wireless Power Transfer (WPT) systems for charging consumer devices
- A COMPARATIVE ANALYSIS OF SDLC MODEL WITH SECURE SOFTWARE DEVELOPMENT AND TESTING
Last modified: 2018-01-19 15:11:47