Pages

This tutorial covers the basics of the science of cryptography. It explains how programmers and network professionals can use cryptography to maintain the privacy of computer data. Starting with the origins of cryptography, it moves on to explain cryptosystems, various traditional and modern ciphers, public key encryption, data integration, message authentication, and digital signatures.

Tuesday 29 October 2019

[e-Journal Cryptography] Improvement in the Performance and Security of Advanced Encryption Standard Using AES

Improvement in the Performance and Security of Advanced Encryption Standard Using AES Algorithm and Comparison with Blowfish
Amit Verma 1*
, Simarpreet Kaur 1, Bharti Chhabra 3
1M. Tech. Research Scholar, Computer Science & Engineering, Chandigarh Engineering College
3Assistant Professor, Computer Science& Engineering, Chandigarh Engineering College, Landran, Punjab, India
1* Professor and Head of Department, Computer Science& Engineering, Chandigarh Engineering College, Landran, Punjab,
IndiaDramitverma.cu@gmail.com


Abstract- Background\Objective: - The origin of cryptography is found in Roman and Egyptian culture. Cryptography is a thousand years old process to encrypt the messages. In its ancient form, people use cryptography to hide their messages that they want to keep secret from others by substituting the part of the message with symbols, numbers or pictures. With the increase in technology the need of cryptography is also increased which gives rise to new cryptographic algorithms such as DES, 3DES, AES and Blowfish

Source: https://pdfs.semanticscholar.org


0 comments:

Post a Comment