Cryptography Algorithm

Anurag Rawal, Gaurav Chhikara, Gaganjot Kaur, Hitesh Khanna

Abstract


With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second.  Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user’s increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we will discuss various algorithm used so far starting from classical ciphers to the modern day’s hash function for ensuring safer transmission of information.


Full Text:

PDF

References


Global journals GJCST_Volume13/4-A-Study-of-Encryption-Algorithms

https://globaljournals.org/GJCST_Volume13/4-A-Study-of-Encryption-Algorithms.pdf

Volume 8, No. 4, May 2017 International Journal of Advanced Research in Computer Science REVIEW ARTICLE Available Online at www.ijarcs.info© 2015-19, IJARCS

A Review on Symmetric Key Cryptography Algorithms

http://ijarcs.info/index.php/Ijarcs/article/viewFile/3777/3258

International Journal of Computer Applications (0975 –8887) Volume 61–No.20, January 2013 12 Symmetric

Algorithm Survey: A Comparative Analysis

https://arxiv.org/ftp/arxiv/papers/1405/1405.0398.pdf

International Journal of Computer Applications (0975 –8887) International Conference on Advancements in Engineering and Technology (ICAET 2015) 1 Asymmetric Algorithms and Symmetric Algorithms

http://research.ijcaonline.org/icaet2015/number4/icaet4049.pdf

An overview on cryptography by Gary C. Kessler

https://www.garykessler.net/library/crypto.html

http://www.geeksforgeeks.org/

http://cryptofundamentals.com/

https://www.tutorialspoint.com/

http://www.ijettcs.org/Volume4Issue1/IJETTCS-2015-01-01-12.pdf/


Refbacks

  • There are currently no refbacks.