Comparative Study of Security Algorithms

Abstract

At present, through internet lots of confidential data is send across the world and though it is confidential it needs protection from unauthorized person who will try to read that data so to protect the data from unauthorized person security algorithms are used through which the original data can be able to convert into encrypted format and only the legitimate person or receiver can be able to read that data after decrypting it. Algorithms which protect the data and maintain the privacy of data are called Cryptography Algorithms. Cryptography has been very useful for sending the data safer over the internet. Comparative study of security algorithms means analyzing the better performance which has the low cost comparatively and analyzing which is the widely used algorithm through which we can able to understand the best algorithm for secure transmission. [2] Mr. Sagar Yashwant Jadhav"Comparative Study of Security Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15747.pdf http://www.ijtsrd.com/computer-science/computer-security/15747/comparative-study-of-security-algorithms/mr-sagar-yashwant-jadhav

Authors and Affiliations

Keywords

Related Articles

Physico Chemical Parameter of River Ajnal at Harda M.P.

Rapid Industrialization and urbanization affect the natural system including water. Ajnal river is a small river of Harda M.P. . In the recent decade it was polluted and become a Nalla. Sample was collected from the Rive...

Understanding Stock Returns as a Combination of Speculative and Fundamental Growth An Emperical Study

The Indian stock market returns are largely speculative in nature. Taking twenty stocks off of the Sensex, the Total return of the stock was split into the fundamentally arising returns and the speculative return. This r...

Comparison between Reinforced Cement Concrete and Fibre Reinforced Beam using Finite Element Method

Concrete is one of the most widely recognized development material for the most part delivered by utilizing locally accessible ingredients. This paper investigates the study of workability, mechanical properties and fini...

Foreign Experience in the Development of Agricultural Tourism and its Application in the Republic of Uzbekistan

Agrotourism is agricultural tourism, classified as the activity of farmers providing services related to recreation and education of the population in order to sell agricultural products and earn additional income Purdue...

The Concept of Good Governance in Ramayana

Good Governance is the basic necessity for keeping the peace and harmony in any humanity. We all the time hear the mention 'Rajya of Ram' as an model form of good governance that tells us about 'The Empire of Rama', ther...

Download PDF file
  • EP ID EP362184
  • DOI -
  • Views 76
  • Downloads 0

How To Cite

(2018). Comparative Study of Security Algorithms. International Journal of Trend in Scientific Research and Development, 2(4), -. https://europub.co.uk/articles/-A-362184