Journal article

A Comparative Study of Cryptographic Algorithms A Comparative Study of Cryptographic Algorithms

Hussain Dar M, Mittal P, Kumar V ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 3 (2014) pp. 274-2277

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.
Sign in to save reference

Abstract

-Cryptography is the art and science of keeping massages secure. It is the study of techniques related to aspects of information security such as information privacy, integrity, authentication and non-repudiation. Cryptography is almost synonymous with encryption i.e. the conversion of plain text to a cryptic text to secure it against unauthorized users. Encryption techniques are typically divided into two generic types: symmetric key encryption and asymmetric key encryption. Encryption methods in which both the sender and receiver share the same key are referred to as symmetric key encryption schemes. Encryption methods in which encryption and decryption are performed using the different keys, one a public key and one a private key are referred to as asymmetric key encryption schemes. This paper provides a performance comparison between four popular and commonly used encryption algorithms: DES, 3DES, AES, and RSA. DES, 3DES, and AES are symmetric key encryption algorithms while as RSA is an asymmetric key encryption algorithm.

Author-supplied keywords

  • -Cryptography
  • 3DES
  • AES
  • DES
  • RSA

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

There are no full text links

Authors

  • Manzoor Hussain Dar

  • Pardeep Mittal

  • Vinod Kumar

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free