Comparative Study of Security Algorithms

Abstract

At present, through internet lots of confidential data is send across the world and though it is confidential it needs protection from unauthorized person who will try to read that data so to protect the data from unauthorized person security algorithms are used through which the original data can be able to convert into encrypted format and only the legitimate person or receiver can be able to read that data after decrypting it. Algorithms which protect the data and maintain the privacy of data are called Cryptography Algorithms. Cryptography has been very useful for sending the data safer over the internet. Comparative study of security algorithms means analyzing the better performance which has the low cost comparatively and analyzing which is the widely used algorithm through which we can able to understand the best algorithm for secure transmission. [2] Mr. Sagar Yashwant Jadhav"Comparative Study of Security Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15747.pdf http://www.ijtsrd.com/computer-science/computer-security/15747/comparative-study-of-security-algorithms/mr-sagar-yashwant-jadhav

Authors and Affiliations

Keywords

Related Articles

Cloud Computing Adoption Approach towards Securing Data in Cloud Computing

Present or late investigation on cloud security communicates that the security of customers data has the most astonishing need and furthermore concern. Customers store colossal measures of delicate data on a cloud. Shari...

Factors Influencing Gender Disparities in the Prevalence of HIV AIDS in Fako Division Cameroon Case Study of Limbe and Buea Regional Hospitals

There is a prevalence of HIV AIDS in the society among men and women and there is gender disparity in the prevalence of HIV AIDS. Biological and other factors are pointing to the fact that the women are more vulnerable a...

Study on Behaviour of Permeable Concrete in the Utilization of Chemical Processing of Ash

Permeable concrete is a distinctive kind of concrete with excessive porosity used for concrete flat work functions that enable the water from precipitation and different sources to ignore without delay through, thereby d...

A Novel Geometry of Multiband Planar Antenna for Wireless Applications

The compact multiband antenna is of practical interest for the fast growing modern communication industry. In this regard radiation performance of modified rectangular multiband antenna, designed on FR 4 substrate is pro...

A Review on Genetic Dominant Disorder-Polydactyly

"Polydactyly is genetic disorder in which there is mutation of gene that is located on short arm of chromosome 7. One gene that can cause polydactyly is GLI3 and it is one among number of genes that are known to be invol...

Download PDF file
  • EP ID EP362184
  • DOI -
  • Views 63
  • Downloads 0

How To Cite

(2018). Comparative Study of Security Algorithms. International Journal of Trend in Scientific Research and Development, 2(4), -. https://europub.co.uk/articles/-A-362184