Cryptography Algorithm
Abstract
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user’s increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we will discuss various algorithm used so far starting from classical ciphers to the modern day’s hash function for ensuring safer transmission of information.
Full Text:
PDFReferences
Global journals GJCST_Volume13/4-A-Study-of-Encryption-Algorithms
https://globaljournals.org/GJCST_Volume13/4-A-Study-of-Encryption-Algorithms.pdf
Volume 8, No. 4, May 2017 International Journal of Advanced Research in Computer Science REVIEW ARTICLE Available Online at www.ijarcs.info© 2015-19, IJARCS
A Review on Symmetric Key Cryptography Algorithms
http://ijarcs.info/index.php/Ijarcs/article/viewFile/3777/3258
International Journal of Computer Applications (0975 –8887) Volume 61–No.20, January 2013 12 Symmetric
Algorithm Survey: A Comparative Analysis
https://arxiv.org/ftp/arxiv/papers/1405/1405.0398.pdf
International Journal of Computer Applications (0975 –8887) International Conference on Advancements in Engineering and Technology (ICAET 2015) 1 Asymmetric Algorithms and Symmetric Algorithms
http://research.ijcaonline.org/icaet2015/number4/icaet4049.pdf
An overview on cryptography by Gary C. Kessler
https://www.garykessler.net/library/crypto.html
http://www.geeksforgeeks.org/
http://cryptofundamentals.com/
https://www.tutorialspoint.com/
http://www.ijettcs.org/Volume4Issue1/IJETTCS-2015-01-01-12.pdf/
Refbacks
- There are currently no refbacks.