slugAn Analytical Analysis of Stream Cipher and Block cipher Algorithms
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 5
Abstract
Cryptography is an art or science to provid e security for sharing of information over the internet. Cryptography changes the format of original text into another format that is not easy to understand by unwanted user. There are different types of cryptography techniques are available. Cryptography algorithm is generally described into twp types - Symmetric key encryption and asymmetric key encryption. This paper gives the overview of some symmetric key encryption algorithm. In this paper we also compared these algorithms on their architecture.
Authors and Affiliations
Harsh Dhiman, Md Asif Mushtaque, Shahnawaz Hussain
Analysis of Boiler Efficiency
A boiler (heat producer) is like the heart of a car, this provides the necessary heat that the facility needs to warm itself up. There are two types of boilers: Fire-tube and water-tube. In fire-tube boilers, combustion...
Performing Adaptive Channel Equalization by Hybrid Differential Evolution Particle Swarm Optimization
Inter symbol interference is the main obstacles for reliable communications. To mitigate the effects of ISI and to obtain reliable data transmission, An adaptive equalizer is required at the receiver. Equalizer is used...
Java Applets Vs Servlets
An applet is a Java program that can be included in an HTML page and executed by a Java Technology-enabled browser. It can be used in web-page enhancement and on enterprise intranets for sharing resource and data. Apple...
Analysis on Combination of Local And Globle Contrast Image Enhancement Method
Enhancement is one of the tough factors in photo processing (IP). The objective of enhancement is to enhance the structural appearance of an image without any degradation within the enter picture. The enhancement techni...
DatComm: Scheduling of the Network Traffic based on Mobility Bandwidth via Segment Resizing & Redundancy Elimination Mechanism
The wireless mobile network for efficient data communication through employment of wireless sensor nodes for network monitoring is considered as research paradigm in this work. The Monitoring nodes in the Wireless Netwo...