IJSTR

International Journal of Scientific & Technology Research

Home Contact Us
ARCHIVES
ISSN 2277-8616











 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

IJSTR >> Volume 2- Issue 12, December 2013 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Survey On Some Encryption Algorithms And Verification Of RSA Technique

[Full Text]

 

AUTHOR(S)

Abdul Hai Al Hadi

 

KEYWORDS

Index Terms: Encryption, Secret key encryption, Public key encryption, DES, 3DES, Blowfish, CAST, RSA encryption.

 

ABSTRACT

Abstract: Information security becomes much important in data storage and transmission. The term information security refers to the processes and methodologies which are designed and implemented to protect data from unauthorized access, use, misuse, disclosure, modification or disruption. Encryption algorithm play important roles in information security. This paper provides case study of five encryption algorithms: DES, 3DES, Blowfish, CAST, RSA and also provides encryption and decryption data by using the RSA asymmetric encryption algorithm. Simulation has been conducted using C language. Experimental results are given to analyses the implementation of RSA algorithm.

 

REFERENCES

[1]. Shashi Mertra Seth, Rajan Mishra, “Comparative Analysis” of Encryption Algorithoms For Comunication”, IJCST VOL.2, Issue 2, June 2011.

[2]. Erik Olson, Woojin Yu, “Eneryption for Mobil;e Compoting”

[3]. Dr.S.A.M Rizvi, Dr.Syed Zeeshan Hussain and Neeta Wadhwa, “A Comparative Study of Two Symentirc Encryption Algorithoms Across Different Platfroms”

[4]. Abdel-Karim AI Tamimi, “Perpormance Analysis of Data Encryption Algorithom”

[5]. M A Matin, Md. Monir Hossain2, Md Foizul Islam2, Muhammad Nazrul Islam2, M Mofazzal Hossain3 “Performance Evaluation of Symmetric Encryption Algorithm in MANET and WLAN”

[6]. P.Ruangchaijatupon, P.Krishnamurthy, “Encryption and power consumption in wireless LANs-n,” The Third IEEE workshop on wireless LANS, pp. 148-152, Newton, Massachusetts, sep. 27-28,2001.

[7]. Marshall D.Abrams, Harold J.podell on Cryptograohy.

[8]. Anoop Ms, “public key cryptography Applications Algorithms and Mathematical Explanations”

[9]. http:// en.wikipedia.org/wiki/information security

[10]. http:// en.wikipedia.org/wiki/Encryption

[11]. “Information security principles and practice”, mark stamp.