COMPARATIVE STUDY OF DIFFERENT AUTHENTICATION AND IDENTIFICATION ALGORITHMS IN SECURED CRYPTOGRAPHY

Abstract

 The paper presents comparative study of different authentication and identification algorithms used in secured cryptography. The network security is also a great issue, when the data transfer is taken place over the internet. There are different algorithms available to provide network security like AES, DES, Triple DES, Triple AES, Kasumi, Blowfish, RSA, RC4, XMODES and TACIT. The research can be focused on the integration of network security, authentication, and multiplexing and data communication for a particular network. The wireless communications & technologies coming to homes and offices, demanding to have secure data transmission is of utmost importance. It is very much important that information is sent confidentially, over the network without the fear of hackers or unauthorized access to it. This makes security implementation in networks a crucial demand. Symmetric Encryption Cores provide data protection via the use of secret key only known to the encryption and decryption ends of the communication path. In the paper, study is carried out on the different security algorithms.

Authors and Affiliations

Keywords

Related Articles

EXPERIMENTAL STUDY ON UTILIZATION OF WASTE PLASTIC AS AGGREGATE IN CEMENT MORTAR

Solid waste management is one of the major environmental concerns in our country now a days. The present study covers the use or recycled plastics as replacement of coarse aggregates in concrete. The main aim of the stud...

 EMOTIONAL MANIPULATION WITH THE HELP OF EMOTIONAL RECOGNITION-A SURVEY

 It is a rule written by government that robots can kill others to save their kinds. So, a robot should know how to decide who is its enemy and who is its friend. It should feel the emotion of love or hate. We...

PORTABLE SECURITY SYSTEM WITH PANIC SWITCH INCLUDING LOCAL AND REMOTE ALARM

An earnest attempt has been made to devise a multifunctional system for Security. This portable system can be efficiently used for security against leakage of LPG, intruder detection and overheating. Some innovative...

EXPERIMENTAL STUDY OF BLAST FURNACE SLAG CONCRETE

The study presents the experimental investigation carried out to evaluate effects of replacing fine aggregate with that of blast furnace slag on various concrete properties. The basic objective of this study was to ide...

 COMPRESSIVE STRENGTH EVALUATION OF CONCRETE: A PARADIGMATIC USE OF WASTE (SAWDUST AND COW DUNG)

 This research aims to find out the optimum compressive strength of concrete produced with partial replacement of cement with cow dung and fine aggregates with sawdust. The concrete mix of 1:2:4 was prepared using...

Download PDF file
  • EP ID EP100238
  • DOI -
  • Views 103
  • Downloads 0

How To Cite

(2015).  COMPARATIVE STUDY OF DIFFERENT AUTHENTICATION AND IDENTIFICATION ALGORITHMS IN SECURED CRYPTOGRAPHY. International Journal of Engineering Sciences & Research Technology, 4(1), 221-228. https://europub.co.uk/articles/-A-100238