{"title":"A COMPARATIVE ANALYSIS OF CRYPTOGRAPHY ALGORITHMS","authors":"M. Nivetha, MR. S.SIVARAMAKRISHNAN","doi":"10.17148/ijireeice.2014.0210010","DOIUrl":null,"url":null,"abstract":"This paper is based on the analysis of the various algorithms in cryptography technique. With the fast changing technologies in today, more data are generated and transmitted. If the confidentiality of the information is very high, it should be protected. Cryptography is used to protect the personal or important data from the unauthorized people who try to access it . Cryptography is widely used by government and intelligence agencies around the world for the transmission of information. It can be either online offline. In this paper various cryptography algorithms are studied and compared.","PeriodicalId":6305,"journal":{"name":"2003 IEEE Topical Conference on Wireless Communication Technology","volume":"30 1","pages":"304-307"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2003 IEEE Topical Conference on Wireless Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17148/ijireeice.2014.0210010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
This paper is based on the analysis of the various algorithms in cryptography technique. With the fast changing technologies in today, more data are generated and transmitted. If the confidentiality of the information is very high, it should be protected. Cryptography is used to protect the personal or important data from the unauthorized people who try to access it . Cryptography is widely used by government and intelligence agencies around the world for the transmission of information. It can be either online offline. In this paper various cryptography algorithms are studied and compared.