Analysis of Cryptography Techniques
Abstract
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
Keywords
Asymmetric key cryptography, Symmetric key cryptography, RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography).
Full Text:
PDFReferences
. A. Perrig, J. Stankovic, and D. Wagner, “Security In Wireless Sensor Networks,” ACM, Vol. 47, No.653.2004.
. F. Amin, A. H. Jahangir and H. Rasifard, “Analysis Of Publickey Cryptography For Wireless Sensor Networks Security,” In Proceedings of World Academy of Science, Engineering and Technology, ISSN 1 307-6884,2008.
VM Agrawal, H Chauhan. "An Overview of security issues in Mobile Ad hoc Networks",INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND SCIENCES 1 (1), 9-17
DOI: http://dx.doi.org/10.26472/ijrae.v1i2.3
Refbacks
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
- » —
Copyright (c) 2015 INTERNATIONAL JOURNAL OF RESEARCH IN ADVANCE ENGINEERING

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.