slugAn Analytical Analysis of Stream Cipher and Block cipher Algorithms

Abstract

Cryptography is an art or science to provid e security for sharing of information over the internet. Cryptography changes the format of original text into another format that is not easy to understand by unwanted user. There are different types of cryptography techniques are available. Cryptography algorithm is generally described into twp types - Symmetric key encryption and asymmetric key encryption. This paper gives the overview of some symmetric key encryption algorithm. In this paper we also compared these algorithms on their architecture.

Authors and Affiliations

Harsh Dhiman, Md Asif Mushtaque, Shahnawaz Hussain

Keywords

Related Articles

Analysis of Boiler Efficiency

A boiler (heat producer) is like the heart of a car, this provides the necessary heat that the facility needs to warm itself up. There are two types of boilers: Fire-tube and water-tube. In fire-tube boilers, combustion...

Performing Adaptive Channel Equalization by Hybrid Differential Evolution Particle Swarm Optimization

Inter symbol interference is the main obstacles for reliable communications. To mitigate the effects of ISI and to obtain reliable data transmission, An adaptive equalizer is required at the receiver. Equalizer is used...

Java Applets Vs Servlets

An applet is a Java program that can be included in an HTML page and executed by a Java Technology-enabled browser. It can be used in web-page enhancement and on enterprise intranets for sharing resource and data. Apple...

Analysis on Combination of Local And Globle Contrast Image Enhancement Method

Enhancement is one of the tough factors in photo processing (IP). The objective of enhancement is to enhance the structural appearance of an image without any degradation within the enter picture. The enhancement techni...

DatComm: Scheduling of the Network Traffic based on Mobility Bandwidth via Segment Resizing & Redundancy Elimination Mechanism

The wireless mobile network for efficient data communication through employment of wireless sensor nodes for network monitoring is considered as research paradigm in this work. The Monitoring nodes in the Wireless Netwo...

Download PDF file
  • EP ID EP18073
  • DOI -
  • Views 282
  • Downloads 14

How To Cite

Harsh Dhiman, Md Asif Mushtaque, Shahnawaz Hussain (2014). slugAn Analytical Analysis of Stream Cipher and Block cipher Algorithms. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(5), -. https://europub.co.uk/articles/-A-18073