Comparative Analysis of Cryptographic Algorithms in Securing Data



Download 0,5 Mb.
Pdf ko'rish
bet1/11
Sana31.12.2021
Hajmi0,5 Mb.
#251786
  1   2   3   4   5   6   7   8   9   10   11
Bog'liq
IJETT-V58P223



See discussions, stats, and author profiles for this publication at: 

https://www.researchgate.net/publication/333755102

Comparative Analysis of Cryptographic Algorithms in Securing Data

Article

 · April 2018

CITATIONS

0

READS



1,263

2 authors:

Some of the authors of this publication are also working on these related projects:

A Medical Document Classification System for Heart Disease Diagnosis Using Naïve Bayesian Classifier

 

View project



Power System Optimization

 

View project



Taylor Onate Egerton

Rivers State University



30

 

PUBLICATIONS



   

20

 

CITATIONS



   

SEE PROFILE

Victor Emmah

Rivers State University of Science and Technology



8

 

PUBLICATIONS



   

13

 

CITATIONS



   

SEE PROFILE

All content following this page was uploaded by 

Taylor Onate Egerton

 on 13 June 2019.

The user has requested enhancement of the downloaded file.




International Journal of Engineering Trends and Technology (IJETT) – Volume 58 Issue 3 – April 2018 

ISSN: 2231-5381                                  

http://www.ijettjournal.org

                             Page 118 

Comparative Analysis of Cryptographic 

Algorithms in Securing Data 



 

1

Taylor, Onate E.



2

Emmah, Victor T.

 

Department of Computer Science, Rivers State University, Port Harcourt, Nigeria 

 

 



 

AbstractDespite  the  numerous  cryptographic 

algorithms being implemented in our world today, we 

still  encounter  issues  of  their  usage.  While  some  are 

very  efficient  in  communication  across  networks, 

others  are  better  in  file  encryption  such  as  images, 

text files etc. The efficiency of these algorithms varies 

based  on  the  purpose  of  encryption.  This  paper 

focuses  on  the  comparative  analysis  of  modern 

cryptographic 

algorithm. 

In 

this 

paper, 

we 

analyzedthe  Advance  Encryption  Algorithm  (AES), 

Data Encryption Algorithm (DES), and Rivest Shamir 

Alderman  (RSA)  and  compare  them  based  on  the 

following  parameters  namely:  computation  time, 

memory  utilization  and  security  level.  A  simulation 

program was developed to make the comparisons and 

result  obtained  shows  that  AES  is  a  better  solution 

based  on  computation  time,  memory  utilization  and 

security level. 

 


Download 0,5 Mb.

Do'stlaringiz bilan baham:
  1   2   3   4   5   6   7   8   9   10   11




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish