Comparative Analysis of Some Encryption Algorithms and Secured Remote Protocol
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)Publication Date: 2015-04-05
Authors : Ojekudo Nathaniel Akpofure Ph.D; Nwankwe Dimie M.Sc;
Page : 731-741
Keywords : Cryptography; Encryption; Algorithm;
Abstract
The need for information assurance and security all over the world cannot be overemphasized. Attacks on security of a computer or network are generally characterized as interruption, interception, modification and fabrication. The four main security issues related to these are confidentiality, authentication, integrity and non-repudiation. Cryptography is necessary and must be applied on many network layers. The Research work intends to compare some encryption algorithms and secured remote protocol based on the four main security issues and also developed a prototype attached in the appendix.
Other Latest Articles
- A Review of Carrier Based Modulation Techniques
- A Mathematical Skew-Logistic Model for G-Flip is An Effective Treatment for Chemotherapy Refractory Metastatic Pancreatic Cancer
- Use of Geoinformation Technology in Assessing Nexus between Ecosystem Changes and Wildlife Distribution: A Case Study of Mt. Marsabit Forest
- Enhanced MIMO Based Anti-Jamming Technique in Wireless Networks
- Overview of State-of-the-Art Image Set Compression Techniques
Last modified: 2021-06-30 21:44:39