Comparative Analysis of Some Encryption Algorithms and Secured Remote Protocol

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4

Abstract

"The need for information assurance and security all over the world cannot be overemphasized. Attacks on security of a computer or network are generally characterized as interruption, interception, modification and fabrication. The four main security issues related to these are confidentiality, authentication, integrity and non-repudiation. Cryptography is necessary and must be applied on many network layers. The Research work intends to compare some encryption algorithms and secured remote protocol based on the four main security issues and also developed a prototype attached in the appendix. "

Authors and Affiliations

Keywords

Related Articles

Genetic Variation and Phylogeny Assessment of Aciagrion Occidentale (Odonata: Coenagrionidae) Using Mitochondrial Cytochrome Oxidase Subunit I Gene

Aciagrion occidentale is a migratory species widely distributed in montane and submontane areas in open grass besides weedy ponds and herbage. Here we used the COI barcode locus (522bp) to clarify the specific taxonomic...

Recent trends in Audiology: A Review

Recent trends in Audiology: A Review

Survey of Mining Order-Preserving Submatrices from Data with Repeated Measurements

There some situations, where relative magnitude of data items have more importance than their accurate values. In those situations, Order-preserving submatrices (OPSM’s) are proving to be successful in detecting concurre...

Detecting the Rootkit through Dynamic Analysis

Network security provides a security for all the programs or files or system. Some attackers attack a programs or files or passwords or other personal details of the user. Like the same way Rootkit is one of the maliciou...

Gateway Antivirus Implementation using Open Source along with Performance Testing and Improvement Analysis

Gateway Antivirus Implementation using Open Source along with Performance Testing and Improvement Analysis

Download PDF file
  • EP ID EP363940
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

(2015). Comparative Analysis of Some Encryption Algorithms and Secured Remote Protocol. UNKNOWN, 4(4), -. https://europub.co.uk/articles/-A-363940