ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Desperate Attacks and Performance Parameters of Encryption Algorithms

Journal: International Journal of Linguistics and Computational Applications (Vol.3, No. 2)

Publication Date:

Authors : ;

Page : 32-39

Keywords : Cryptography; Security; Authentication; Attacks; Performance.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

All the aspects of human life are driven by information in the present era. Hence, need to protect useful information from malicious activities such as attacks. Security is playing a vital role in the field of communication system and Internet. Providing security services to the important data under timely manner against attacks are the challenges in the security related communities. Cryptographic ciphers have an important role for providing security to these confidential data against unauthorized attacks. During the practical implementation of these cryptographic ciphers for various applications, there are various factors that can affect the performance and selection of cryptographic algorithms including security which is an important factor. This paper discuss about the desperate attacks and procedures for selecting cryptographic algorithms with respect to performance.

Last modified: 2017-12-23 04:11:33