A Survey On Some Encryption Algorithms And Verification Of RSA Technique

Al Hadi, Abdul Hai
December 2013
International Journal of Scientific & Technology Research;Dec2013, Vol. 2 Issue 12, p285
Academic Journal
Information security becomes much important in data storage and transmission. The term information security refers to the processes and methodologies which are designed and implemented to protect data from unauthorized access, use, misuse, disclosure, modification or disruption. Encryption algorithm play important roles in information security. This paper provides case study of five encryption algorithms: DES, 3DES, Blowfish, CAST, RSA and also provides encryption and decryption data by using the RSA asymmetric encryption algorithm. Simulation has been conducted using C language. Experimental results are given to analyses the implementation of RSA algorithm.


Related Articles

  • ContSteg: Contourlet-Based Steganography Method. Sajedi, Hedieh; Jamzad, Mansour // Wireless Sensor Network;Oct2009, Vol. 1 Issue 3, p163 

    A category of techniques for secret data communication called steganography hides data in multimedia mediums. It involves embedding secret data into a cover-medium by means of small perceptible and statistical degradation. In this paper, a new adaptive steganography method based on contourlet...

  • Enhance the Data Security Using PGP & DES in MANET. Gupta, Vikas; Singh, Harprabhdeep // International Journal of Computer Science Engineering & Technolo;Jun2014, Vol. 4 Issue 6, p208 

    The goal of security solutions is to provide security services, such as authentication, confidentiality, integrity, and availability to mobile users. In order to enhance the security various algorithms were proposed, such as International Data Encryption Algorithm (IDEA), Data Encryption...

  • Cryptanalysis of Blind Signature Schemes. Singh, Nitu; Das, Sumanjit // International Journal of Computer Science & Network Security;May2014, Vol. 14 Issue 5, p73 

    Security of the consumer's data over internet is the major problem in present time. In this paper we have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security goals. Blind signature scheme is one of the security protocol...

  • Data Encryption and Decryption Using RSA Algorithm in a Network Environment. Goshwe, Nentawe Y. // International Journal of Computer Science & Network Security;May2014, Vol. 14 Issue 5, p82 

    One of the principal challenges of resource sharing on data communication network is its security. This is premised on the fact that once there is connectivity between computers sharing some resources, the issue of data security becomes critical. This paper presents a design of data encryption...

  • Security Analysis of Order Preserving Symmetric Cryptography. Martínez, Santi; Miret, Josep M.; Tomàs, Rosana; Valls, Magda // Applied Mathematics & Information Sciences;Jul2013, Vol. 7 Issue 4, p1285 

    Order preserving encryption is a type of homomorphic encryption in which the homomorphic operation is order comparison. This means that comparing encrypted data returns the same result than comparing the original data. This allows to order encrypted data without the need of decryption. A...

  • The new period encryption technology in the application the study of network security. jinglin // Applied Mechanics & Materials;2014, Issue 685, p599 

    with the rapid development of computer, network is also in constant development. A variety of network attacks and the corresponding means also breed, network security has become now the human network life about to ask. One of the most important methods to protect the network security is a...

  • EDSync: A Secure and Efficient Scheme for File Synchronization over Low-Bandwidth Networks. Xiaoning Jiang; Yang Leng; Yanyan Liu; Binxiao Yu // International Journal of Digital Content Technology & its Applic;Feb2013, Vol. 7 Issue 3, p641 

    In this paper, we propose a framework for remote file synchronization called EDSync (encryption and delta synchronization) and describe several new techniques that result in significant bandwidth savings, transmission security and storage security. We adopt the content-defined chunking...

  • Image Encryption using Modified 4 out of 8 code and chaotic map. K. M., Sunil Kumar; Kiran; Hiremath, Anand U. // International Journal of Computer Applications;Jul2013, Vol. 74 Issue 1-21, p1 

    Recently, several image encryption schemes based on chaotic maps have been proposed. Most of them hinder the system performance, security, and suffer from the small key space problem. This paper presents a image encryption using modified 4 out of 8 code and chaotic map. Generally image...

  • Signcryption Secure Against Linear Related-Key Attacks. Cui, Hui; Mu, Yi; Au, Man Ho // Computer Journal;Oct2014, Vol. 57 Issue 10, p1472 

    A related-key attack (RKA) occurs when an adversary tampers the private key stored in a cryptographic hardware device, and observes the result of the cryptographic primitive under this modified private key. In this paper, we consider the security of signcryption schemes under linear RKAs, where...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics