Review on Encryption Ciphers of Cryptography in Network Security
@inproceedings{Gupta2012ReviewOE, title={Review on Encryption Ciphers of Cryptography in Network Security}, author={Gunjan Gupta and R. Chawla}, year={2012} }
With the explosive growth in the Internet, network security has become an inevitable concern for any organization whose internal private network is connected to the Internet. Network security is setup to guard against unauthorized access, alteration, or modification of information, and unauthorized denial of service. When a network is connected to the network that is vulnerable to potential intrusions and attacks. Security of data can be done by a technique called cryptography. So one can say…
No Paper Link Available
23 Citations
A Review on Cryptography, Attacks and Cyber Security
- Computer Science, Mathematics
- 2017
This paper will review cryptography with its goals, types and algorithms used for it, Also types of attack used for intrusion and cyber security technology.
A Survey on Performance Analysis of Block Cipher Algorithms
- Computer Science, Mathematics2020 International Conference on Inventive Computation Technologies (ICICT)
- 2020
A comparison among the commonly used symmetric key cryptography algorithms: DES (Data Encryption standard), Blowfish, TDES (Triple Data Encryption Standard), PRESENT, KLEIN is offered.
Study of Symmetric Cryptography Algorithms
- Computer Science, Mathematics
- 2015
This paper has defined and analyzed various cryptographic symmetric algorithms like DES, Triple DES, AES, AES which are used for symmetric key cryptography.
Role of Different Cryptographic Algorithms in Information Security on Web
- Computer Science
- 2016
Different algorithms for information security on web are analyzed to provide necessary data security by providing different algorithms.
A Review on Various Methods of Cryptography for Cyber Security
- Computer Science
- 2018
An attempt has been made to review the various methods of Cryptography and how these methods will help to secure data from unauthenticated users.
Enhancing the Security of Data Using DES Algorithm along with Substitution Technique
- Computer Science
- 2016
Substitution technique is added before the DES algorithm to improve the security of DES algorithm using substitution technique, which is the method of encoding by which unit of plaintext are replaced with cipher text.
Efficient Text Data Encryption System to Optimize Execution Time and Data Security
- Computer Science, Mathematics
- 2014
The aim of the paper is to develop stronger encryption system that results in minimum execution time and maximum security to encrypt the plain text messages.
A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security
- Computer ScienceInternational Journal of Scientific and Research Publications (IJSRP)
- 2019
A comparative study for most important algorithms for encryption and decryption of data in all fields in terms of speed (implementation) and security (special keys) determine whether an encryption algorithm is good.
Survey of Various Encryption Techniques for Audio Data
- Computer Science, Mathematics
- 2014
A study and comparison of basic symmetric encryption standards and a literature survey encryption technique that have been used for encryption on audio data are presented and this suggests a more secure algorithm for audio encryption.
Study on symmetric key encryption: An Overview
- Computer Science, Mathematics
- 2015
An overview on symmetric key is provided to provide an overview on asymmetric key design and its applications in cryptography.
References
SHOWING 1-10 OF 13 REFERENCES
A Performance Comparison of Data Encryption Algorithms
- Computer Science2005 International Conference on Information and Communication Technologies
- 2005
It has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation, and their performance is compared by encrypting input files of varying contents and sizes, on different Hardware platforms.
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
- Computer ScienceIEEE Transactions on Dependable and Secure Computing
- 2007
A framework called opportunistic encryption is proposed that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints and produces significant improvement in the performance compared to traditional approaches.
Internet and Network Security
- Computer Science
- 2011
This paper analyses main problem existed in the current network information security and proposes some solutions from technical aspects, hoping to gradual eliminate network Information security risks through its construction.
Network security: Focus on security, skills, and stability
- Computer Science2007 37th Annual Frontiers In Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports
- 2007
Network security skills emphasize business practices, legal foundations, attack recognition, security architecture, and network optimization, and these skills tend to stabilize network security course(s).
Investigation of feasible cryptographic algorithms for wireless sensor network
- Computer Science2006 8th International Conference Advanced Communication Technology
- 2006
The RC4 and MD5 turned out to be most suitable algorithms for a wireless sensor network utilizing MICAz-type motes in terms of the total cryptographic processing time used.
PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC VLSI DATA
- Computer Science
- 2012
An optimized coding for the implementation of Rijndael algorithm for 256 bytes has been developed and the speed factor of the algorithm implementation has been targeted and a software code in verilog which boasts of a throughput of 2.18 Gb/sec have been developed.
A laboratory-based course on internet security
- PhysicsSIGCSE
- 2003
This paper discusses the course and explains how others can set up their own labs to teach this course, a laboratory-based course on Internet Security aimed at the senior undergraduate.
Shebani, “Communication Cryptography”,2004
- RF and Microwave Conference,
- 2004
Younus Javed , “ A performance comparison of data Encryption Algorithm ” , Global Telecommunications Conference Workshops , 2004
- IRACST – International Journal of Computer Networks and Wireless Communications ( IJCNWC )