ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Checking EABC performance in comparison others cryptography algorithms

Journal: International Journal of Computer Science and Network Solutions (IJCSNS) (Vol.1, No. 1)

Publication Date:

Authors : ;

Page : 51-57

Keywords : Execution time; CPU Utilization; Throughput of encrypting/decrypting; EABC;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Nowadays, selecting algorithm to encryption data is very important considering attacks are varied and according to there are many encryption algorithms to protect information. Therefore choosing one algorithm is hard among many algorithms. Data confidentiality is one of the most important functions of encryption algorithms, it means when the transferring data between different systems is vague for unauthorized systems or people. Moreover, Encryption algorithms must maintain data integrity and provide availability for information. New encryption methods cause the attackers cannot simply access to the information and do not allow discovering the relationship between information and the encrypted one. Therefore, availability can be difficult for them. Existing complexities make their longevity and effectiveness increase. In This Article, It has been tried to check EABC performance considering execution time, CPU Utilization, Throughput of encrypting/decrypting database.

Last modified: 2013-09-23 04:45:39