ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

COMPARATIVE STUDY OF DIFFERENT AUTHENTICATION AND IDENTIFICATION ALGORITHMS IN SECURED CRYPTOGRAPHY

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 1)

Publication Date:

Authors : ; ;

Page : 221-228

Keywords : AES Encryption; DES Encryption; Blowfish; TACIT Network Security.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The paper presents comparative study of different authentication and identification algorithms used in secured cryptography. The network security is also a great issue, when the data transfer is taken place over the internet. There are different algorithms available to provide network security like AES, DES, Triple DES, Triple AES, Kasumi, Blowfish, RSA, RC4, XMODES and TACIT. The research can be focused on the integration of network security, authentication, and multiplexing and data communication for a particular network. The wireless communications & technologies coming to homes and offices, demanding to have secure data transmission is of utmost importance. It is very much important that information is sent confidentially, over the network without the fear of hackers or unauthorized access to it. This makes security implementation in networks a crucial demand. Symmetric Encryption Cores provide data protection via the use of secret key only known to the encryption and decryption ends of the communication path. In the paper, study is carried out on the different security algorithms.

Last modified: 2015-01-17 21:15:59