[PDF][PDF] Critical analysis of various symmetric key cryptographic algorithms

P Nema, MA Rizvi - International Journal on Recent and Innovation …, 2015 - academia.edu
Current era is digital and has elite advancement in technology, almost in every field things
are becoming technology friendly. It is the need to provide security to sensitive information in …

[引用][C] Comparative analysis on different parameters of encryption algorithms for information security

MA Mushtaque - International journal of computer sciences and …, 2014

Critical analysis of cryptographic algorithms

M AlRoubiei, T AlYarubi… - 2020 8th International …, 2020 - ieeexplore.ieee.org
Security is the most important role in data communication due to the increase of the
intruder's possibility of alteration and eavesdropping to the sensitive data. Hence …

Performance analysis of cryptographic algorithms for selecting better utilization on resource constraint devices

ME Haque, SM Zobaed, MU Islam… - 2018 21st International …, 2018 - ieeexplore.ieee.org
In this paper, we provide a comprehensive performance evaluation of popular symmetric
and asymmetric key encryption algorithms to selecting better utilization on resource …

A performance based comparison of various symmetric cryptographic algorithms in run-time scenario

P Kumar, S Rawat, T Choudhury… - … System Modeling & …, 2016 - ieeexplore.ieee.org
Today, with a wide use of internet all across the globe where it has become a significant tool
of commerce, security and protection of information becomes a vital issue to deal with …

Comprehensive study of symmetric key and asymmetric key encryption algorithms

MB Yassein, S Aljawarneh… - … on engineering and …, 2017 - ieeexplore.ieee.org
Cloud computing emerged in the last years to handle systems with large-scale services
sharing between vast numbers of users. It provides enormous storage for data and …

[引用][C] Performance and efficiency analysis of different block cipher algorithms of symmetric key cryptography

MI Alam, MR Khan - International Journal of Advanced Research in …, 2013

Performance evaluation of aes, arc2, blowfish, cast and des3 for standalone systems: Symmetric keying algorithms

A Kubadia, D Idnani, Y Jain - 2019 3rd International …, 2019 - ieeexplore.ieee.org
The paper presents a comparative analysis of different symmetric keying cryptographic
algorithms. The algorithms under study are AES, ARC2, Blowfish, CAST and DES3, and the …

A survey on current key issues and status in cryptography

MGV Kumar, US Ragupathy - 2016 International Conference …, 2016 - ieeexplore.ieee.org
Internet applications are increased and growing at very fast. Owing towards the
technological development, secured way of data transmission over the internet is becoming …

Analysis of encryption techniques for secure communication

SD Sanap, V More - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
The process of digitization observed among various industries has led to significant amount
of collection, processing, sharing and alteration of data. The rapid continuous increase in …