Comparative Study of DES, 3DES, AES and RSA
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 9, Issue 3
Abstract
In today world importance of exchange of data over internet and other media type is eminent; the search for best data protection against security attacks and a method to timely deliver the data without much delay is the matter of discussion among security related communities. Cryptography is one such method that provides the security mechanism in timely driven fashion. Cryptography is usually referred to as "the study of secret", which is most attached to the definition of encryption. The two main characteristics that identify and differentiate encryption algorithm from another are their capability to secure the protected data against attacks and their speed and effectiveness in securing the data. This paper provides a comparative study between four such widely used encryption algorithms DES, of DES, 3DES, AES and RSA on the basis of their ability to secure and protect data against attacks and speed of encryption and decryption.
Authors and Affiliations
Amritpal Singh, Mohit Marwaha, Baljinder Singh, Sandeep Singh
AN APPROACH TO GENERATE MST WITHOUT CHECKING CYCLE
Abstract: A minimum spanning tree of an undirected graph can be easily obtained using classical algorithms by Prim or Kruskal. MST generation is a NP hard problem. Now this paper represents an algorithm to find minimum s...
Feature-based Similarity Method for Aligning the Malay and English News Document
Corpus-based translation approach can be used to obtain reliable translation knowledge in addition to the use of dictionaries or machine translation. But the availability of such corpus is very limited especially for the...
Service Oriented Load Balancing Framework in Computational Grid Environment
Grid computing or computational grid has become a vast research field in academics. It is a promising platform that provides resource sharing through multi-institutional virtual organizations for dynamic problem solving....
CHBR: Contact History Based Routing in Time Varying Approach
In Delay tolerant network having intermittent connectivity so there is no guarantee of finding a complete communication path that connecting the source and destination. There no any end to end connectivity for delay-tole...
Social Networks and WEB ontologys as perfect couple for knowledge management tool/system
The social networks have become a main tool of the XXI century for personal presentation and promotion, connectivity with others, belonging to same ideology, area of expertise or culture. Beside all the exploitations mad...