Performance Analysis of Cryptography Algorithms

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Study and Performance Analysis of Cryptography Algorithms

Today’s world, for secure data transmission via Internet or any public network, there is no alternative to cryptography. The role of Cryptography is most important in the field of network security. The main goal of cryptography is Confidentiality, Integrity, Authentication, Nonrepudiation. Cryptography is widely used by governmental and intelligence agencies around the world to safe transmissio...

متن کامل

Performance of Various Algorithms Used in Cryptography

Performance of cryptosystems is a very important process in measuring the performance of Cryptosystems. Communication is the basic process of exchanging information. The effectiveness of computer communication is mainly based on the security aspects. Security of information transmitted over the network is becoming tougher in spite of the availability of many cryptographic algorithms. This paper...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography

In the era of information technology, security is essential to transmit confidential information (like credit card details, banking transactions etc) over the unsecured network like internet. It is possibility that the information that is being transferred through network of computers or internet being read by other people. For this we need an efficient and secure way to protect our data. Crypt...

متن کامل

Stream Cipher and Block Cipher Based Performance Analysis of Symmetric Cryptography Algorithms: AES and DES

Dr. Preeti Mehta, Ms. Monika Bansal, Ms. Akanksha Upadhyaya 1, 2, 3 Department of MCA, Rukmini Devi Institute of Advanced Studies Abstract— Security and risk management are considered to be data centric. Data, systems and network can be protected for three possible outcomes: confidentiality, integrity and availability. In today’s scenario security of data has become an important issue. Most of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2012

ISSN: 0975-8887

DOI: 10.5120/7483-0576