COMPARATIVE STUDY OF DIFFERENT AUTHENTICATION AND IDENTIFICATION ALGORITHMS IN SECURED CRYPTOGRAPHY
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 1)Publication Date: 2015-01-30
Authors : Nitin Gupta; Manoj Kumar;
Page : 221-228
Keywords : AES Encryption; DES Encryption; Blowfish; TACIT Network Security.;
Abstract
The paper presents comparative study of different authentication and identification algorithms used in secured cryptography. The network security is also a great issue, when the data transfer is taken place over the internet. There are different algorithms available to provide network security like AES, DES, Triple DES, Triple AES, Kasumi, Blowfish, RSA, RC4, XMODES and TACIT. The research can be focused on the integration of network security, authentication, and multiplexing and data communication for a particular network. The wireless communications & technologies coming to homes and offices, demanding to have secure data transmission is of utmost importance. It is very much important that information is sent confidentially, over the network without the fear of hackers or unauthorized access to it. This makes security implementation in networks a crucial demand. Symmetric Encryption Cores provide data protection via the use of secret key only known to the encryption and decryption ends of the communication path. In the paper, study is carried out on the different security algorithms.
Other Latest Articles
- APPLYING ANALYTIC HIERARCHY PROCESS AND MULTIPLE CRITERIA ANALYSIS FOR MUNICIPAL LANDFILL SITE SELECTION IN BOJNOURD, IRAN
- HAMILTONIAN LACEABILITY IN MIDDLE GRAPHS
- A REVIEW ON CLUSTERING-BASED FEATURE SUBSET SELECTION ALGORITHM FOR HIGH DIMENSIONAL DATA
- SIMULATION OF IMPULSE VOLTAGE TESTING OF POWER TRANSFORMERS USING PSPICE
- FINGERPRINT BASED IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
Last modified: 2015-01-17 21:15:59