slugFeasibility Evaluation of Symmetric Key Encryption Techniques for Wireless Channel and Disk Storage
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 5
Abstract
Network security has become very important and challenging issue in this world. Cryptography is a technique that provides security for the sender and receiver to exchange their information over a network. There are basically two types of cryptography technique- Symmetric and Asymmetric. Symmetric key algorithm is also categorized into two parts Stream Cipher and Block Cipher. In this paper, we analyzed feasibility of Symmetric Key Block Cipher Encryption techniques for storage space with their advantages and disadvantages and also presented the possible attacks on these algorithms. The main objective of analyzing the feasibility for Storage space, because to increase the transmission speed over wireless channel it is necessary to reduce the size of the encrypted data.
Authors and Affiliations
Md Asif Mushtaque, Mr. Khushal Singh
Design of CMOS Frequency Multiplier in 180nm Technology
CMOS Frequency multipliers are key blocks in new developing applications at microwaves and mm-waves. Frequency multiplication is carried out in Radio Frequency or Microwave equipment to achieve high stability and low no...
Prospecting Forecast of Target with Dynamic Sleep Scheduling in Wireless Sensor Network
Wireless sensor networks are used in various large-scale sensor network systems for many purposes. There are many challenges in wireless sensor networks. In wireless sensor networks, sensor nodes are needed to deploy th...
High Strength Self-Compacting Concrete using Fly Ash
The growing use of concrete in special architectural configurations and closely spaced reinforcing bars have made it very important to produce concrete that ensures proper filling ability, good structural performance an...
Assessment of Ground Water Potential of Five Villages of Jasra Block of Allahabad District
Natural recharge is a vital parameter to be known for ground water budgeting, management and modelling. Percolation of a portion of the rainfall, through the vadose zone, is the principal source of natural recharge to t...
Granular Computing for Data Mining
Granular computing is a rising computing worldview of data handling. It concerns the handling of complex data substances called data granules, which emerge during the time spent information reflection and induction of l...