IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 2- Issue 12, December 2013 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Survey On Some Encryption Algorithms And Verification Of RSA Technique

[Full Text]

 

AUTHOR(S)

Abdul Hai Al Hadi

 

KEYWORDS

Index Terms: Encryption, Secret key encryption, Public key encryption, DES, 3DES, Blowfish, CAST, RSA encryption.

 

ABSTRACT

Abstract: Information security becomes much important in data storage and transmission. The term information security refers to the processes and methodologies which are designed and implemented to protect data from unauthorized access, use, misuse, disclosure, modification or disruption. Encryption algorithm play important roles in information security. This paper provides case study of five encryption algorithms: DES, 3DES, Blowfish, CAST, RSA and also provides encryption and decryption data by using the RSA asymmetric encryption algorithm. Simulation has been conducted using C language. Experimental results are given to analyses the implementation of RSA algorithm.

 

REFERENCES

[1]. Shashi Mertra Seth, Rajan Mishra, “Comparative Analysis” of Encryption Algorithoms For Comunication”, IJCST VOL.2, Issue 2, June 2011.

[2]. Erik Olson, Woojin Yu, “Eneryption for Mobil;e Compoting”

[3]. Dr.S.A.M Rizvi, Dr.Syed Zeeshan Hussain and Neeta Wadhwa, “A Comparative Study of Two Symentirc Encryption Algorithoms Across Different Platfroms”

[4]. Abdel-Karim AI Tamimi, “Perpormance Analysis of Data Encryption Algorithom”

[5]. M A Matin, Md. Monir Hossain2, Md Foizul Islam2, Muhammad Nazrul Islam2, M Mofazzal Hossain3 “Performance Evaluation of Symmetric Encryption Algorithm in MANET and WLAN”

[6]. P.Ruangchaijatupon, P.Krishnamurthy, “Encryption and power consumption in wireless LANs-n,” The Third IEEE workshop on wireless LANS, pp. 148-152, Newton, Massachusetts, sep. 27-28,2001.

[7]. Marshall D.Abrams, Harold J.podell on Cryptograohy.

[8]. Anoop Ms, “public key cryptography Applications Algorithms and Mathematical Explanations”

[9]. http:// en.wikipedia.org/wiki/information security

[10]. http:// en.wikipedia.org/wiki/Encryption

[11]. “Information security principles and practice”, mark stamp.