Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms

IF 1.4 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS International Journal of Computational Science and Engineering Pub Date : 2015-01-30 DOI:10.26472/IJCES.V1I1.20
Meghna H. Vekariya
{"title":"Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic Algorithms","authors":"Meghna H. Vekariya","doi":"10.26472/IJCES.V1I1.20","DOIUrl":null,"url":null,"abstract":"Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.","PeriodicalId":47380,"journal":{"name":"International Journal of Computational Science and Engineering","volume":"102 1","pages":"1-8"},"PeriodicalIF":1.4000,"publicationDate":"2015-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computational Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.26472/IJCES.V1I1.20","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 15

Abstract

Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
密码算法与高级密码算法的比较分析
今天是互联网和网络应用的时代。因此,在当今的技术世界中,信息安全是一个具有挑战性的问题。人们需要一种更强的加密技术,这种技术很难破解。密码学在网络安全领域中发挥着至关重要的作用。用于保护网络安全的加密算法种类繁多,目前对新加密算法的研究正在不断进行,以发展更先进的通信安全技术。本文主要对AES、DES、RSA、blowfish等加密算法进行了比较和性能评价。此外,还描述了一些增强算法,并与增强算法进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Computational Science and Engineering
International Journal of Computational Science and Engineering COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS-
CiteScore
4.00
自引率
40.00%
发文量
73
期刊介绍: Computational science and engineering is an emerging and promising discipline in shaping future research and development activities in both academia and industry, in fields ranging from engineering, science, finance, and economics, to arts and humanities. New challenges arise in the modelling of complex systems, sophisticated algorithms, advanced scientific and engineering computing and associated (multidisciplinary) problem-solving environments. Because the solution of large and complex problems must cope with tight timing schedules, powerful algorithms and computational techniques, are inevitable. IJCSE addresses the state of the art of all aspects of computational science and engineering with emphasis on computational methods and techniques for science and engineering applications.
期刊最新文献
Integer wavelet transform based data hiding scheme for electrocardiogram signals protection Integrated power information operation and maintenance system based on D3QN algorithm with experience replay Availability assessment and sensitivity analysis of an MBaaS platform SLIC-SSA: an image segmentation method based on superpixel and sparrow search algorithm Time series models for web service activity prediction
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1