Comparative Study of Security Algorithms

Abstract

At present, through internet lots of confidential data is send across the world and though it is confidential it needs protection from unauthorized person who will try to read that data so to protect the data from unauthorized person security algorithms are used through which the original data can be able to convert into encrypted format and only the legitimate person or receiver can be able to read that data after decrypting it. Algorithms which protect the data and maintain the privacy of data are called Cryptography Algorithms. Cryptography has been very useful for sending the data safer over the internet. Comparative study of security algorithms means analyzing the better performance which has the low cost comparatively and analyzing which is the widely used algorithm through which we can able to understand the best algorithm for secure transmission. [2] Mr. Sagar Yashwant Jadhav"Comparative Study of Security Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15747.pdf http://www.ijtsrd.com/computer-science/computer-security/15747/comparative-study-of-security-algorithms/mr-sagar-yashwant-jadhav

Authors and Affiliations

Keywords

Related Articles

India and China: The Freshwater Dispute Amongst the Two Thirsty Asian Giant’s

Today climate change and global warming have become hot topics in United Nations, and other organization's the global warming has adversely affected the ecosystem of earth and their various predictions that if not contro...

An Investigative Review on Landing Gear of an Aircraft Structure based on Finite Element Monitoring

Landing gear is the critical subsystem of an aircraft. The need is to design the landing gear with minimum weight & volume, high performance, improved life & reduced life cycle cost. Further, it is essential to reduce th...

Indianness in Padmanath Gohainbaruah’s ‘Srikrishna’

The term Indianness is not easy to define as it includes various dimensions. In simple words, Indianness is the feeling of oneness or it is a feeling of unity among the Indians irrespective of caste, religion, sex or sta...

Trafficking of Women and Girls for Commercial Sexual Exploitation: An Analysis on Impact of Violence in Kolkata's Brothel

Trafficking in women girls and children is an organised crime that brutally exploited them for numerous purposes. Trafficking for the prostitution is the worst form of exploitation where they have to face numbers of viol...

Experimental Investigation on Mineral Content of Fly Bottom Ash and Strength Characteristics of Fly Bottom Ash Bricks - A Review

This investigation is to study the mineral contents of fly-bottom ash. After many years of research in sustainable construction materials, the quality of producing construction materials has significantly improved. And t...

Download PDF file
  • EP ID EP362184
  • DOI -
  • Views 58
  • Downloads 0

How To Cite

(2018). Comparative Study of Security Algorithms. International Journal of Trend in Scientific Research and Development, 2(4), -. https://europub.co.uk/articles/-A-362184