A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security

@article{Singh2013ASO,
  title={A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security},
  author={Gurpreet Singh and Supriya},
  journal={International Journal of Computer Applications},
  year={2013},
  volume={67},
  pages={33-38}
}
Encryption is the process of scrambling a message so that only the intended recipient can read it. Encryption can provide a means of securing information. As more and more information is stored on computers or communicated via computers, the need to insure that this information is invulnerable to snooping and/or tampering becomes more relevant. With the fast progression of digital data exchange in electronic way, Information Security is becoming much more important in data storage and… Expand
249 Citations
Performance analysis of encryption algorithms for security
  • M. Panda
  • Computer Science
  • 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES)
  • 2016
  • 40
A New Symmetric Key Encryption Algorithm With Higher Performance
  • 4
A Survey on Cryptography Algorithms
  • 35
  • PDF
A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security
  • 3
  • PDF
PERFORMANCE ENHANCEMENT OF THE ADVANCED ENCRYPTION STANDARD VIA PIPELINED IMPLEMENTATION
  • Highly Influenced
  • PDF
Encryption and Decryption Using Bit Operations
  • PDF
HYBRID APPROACH USING ENCRYPTION ALGORITHMS FOR DATA STORAGE
  • 3
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 23 REFERENCES
Research and implementation of RSA algorithm for encryption and decryption
  • X. Zhou, X. Tang
  • Computer Science
  • Proceedings of 2011 6th International Forum on Strategic Technology
  • 2011
  • 133
Performance evaluation of cryptographic algorithms: DES and AES
  • 120
  • Highly Influential
AES and Confidentiality from the inside out
  • 10
  • PDF
Comparison of Various Encryption Algorithms and Techniques for Secured Data Communication in Multinode Network
  • 41
  • Highly Influential
A Survey on Various Most Common Encryption Techniques
  • 105
New Comparative Study Between DES, 3DES and AES within Nine Factors
  • 179
  • PDF
Performance Evaluation of DES and Blowfish Algorithms
  • Tingyuan Nie, C. Song, Xu Zhi
  • Computer Science
  • 2010 International Conference on Biomedical Engineering and Computer Science
  • 2010
  • 59
PERFORMANCE EVALUATION OF SYMMETRIC ALGORITHMS
  • 18
  • PDF
...
1
2
3
...