A Study of Cryptographic Algorithms and its analysis on Data Security during Transmission
Sachin Pandey1 , Rajendra Gupta2 , Pratima Gautam3
Section:Survey Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 976-980, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.976980
Online published on Mar 31, 2019
Copyright © Sachin Pandey, Rajendra Gupta, Pratima Gautam . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Sachin Pandey, Rajendra Gupta, Pratima Gautam, “A Study of Cryptographic Algorithms and its analysis on Data Security during Transmission,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.976-980, 2019.
MLA Style Citation: Sachin Pandey, Rajendra Gupta, Pratima Gautam "A Study of Cryptographic Algorithms and its analysis on Data Security during Transmission." International Journal of Computer Sciences and Engineering 7.3 (2019): 976-980.
APA Style Citation: Sachin Pandey, Rajendra Gupta, Pratima Gautam, (2019). A Study of Cryptographic Algorithms and its analysis on Data Security during Transmission. International Journal of Computer Sciences and Engineering, 7(3), 976-980.
BibTex Style Citation:
@article{Pandey_2019,
author = {Sachin Pandey, Rajendra Gupta, Pratima Gautam},
title = {A Study of Cryptographic Algorithms and its analysis on Data Security during Transmission},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {976-980},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3950},
doi = {https://doi.org/10.26438/ijcse/v7i3.976980}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.976980}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3950
TI - A Study of Cryptographic Algorithms and its analysis on Data Security during Transmission
T2 - International Journal of Computer Sciences and Engineering
AU - Sachin Pandey, Rajendra Gupta, Pratima Gautam
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 976-980
IS - 3
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
450 | 404 downloads | 169 downloads |
Abstract
The cryptographic cipher is the terminology used for securing the web user data over the network. It is closely related to the discipline of cryptology and cryptanalysis. Using mathematical equations, the cryptography make sure the data when transferred over network is not altered. The important things for the study of mathematical equations on data security, it is almost not possible to break the encryption algorithm without knowing the correct key value. This paper focuses on the study of cryptographic algorithms and its functioning over the data transmission. The throughput is calculated for encryption algorithms during encrypting of text data in different time period and it is found that the Diffie-Hellman Key Exchange Algorithm shows better performance as compared to other studied algorithms.
Key-Words / Index Term
Cryptographic algorithm, Cipher, Diffie-Hellman Key Exchange Algorithm
References
[1] Chia Long Wu, Chen HaoHu,“Computational Complexity Theoretical Analyses on Cryptographic Algorithms for Computer Security Application”, Innovations in Bio-Inspired computing and Applications(IBICA), 2018, pp. 307 – 311.
[2] Qing Liu, Yunfei Li, Lin Hao, “On the Design and Implementation of an Efficient RSA Variant”, Advanced Computer Theory and Engineering (ICACTE), 2017, pp.533-536.
[3] Mandal, B.K., Bhattacharyya, Bandyopadhyay S.K., “Designing and Performance Analysis of a Proposed Symmetric Cryptography Algorithm”, Communication Systems and Network Technologies (CSNT), 2017, pp. 453 – 461.
[4] Wang, Suli, Liu, Ganlai, “File encryption and decryption system based on RSA algorithm”, Computational and Information Sciences (ICCIS), 2016, pp. 797 – 800.
[5] Da Silva, J.C.L, "Factoring Semi primes and Possible Implications for RSA”, Electrical and Electronics Engineers in Israel (IEEEI), 2016, pp.182–183.
[6] Geethavani, B., Prasad, E.V. Roopa, R. “A new approach for secure data transfer in audio signals using DWT”, Sept 2016, pp. 1-6.
[7] Nagar, S.A., Alshamma, S., “High speed implementation of RSA algorithm with modified keys exchange", Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 639 – 642, 2016.
[8] Chong Fu, Zhi-liang Zhu, “An Efficient Implementation of RSA Digital Signature", Wireless Communications, Networking and Mobile Computing, Oct. 2016, pp.1-4.
[9] DiaaSalama, HatemAbdual Kader, MohiyHadhoud “Studying the Effects of Most Common Encryption Algorithms, International Arab Journal of e-Technology”, Vol. 2, No. 1, January 2017
[10] Turki Al-Somani,Khalid Al-Zamil, “Performance Evaluation of Three Encryption/Decryption Algorithms on the SunOS and Linux Operating Systems”, vol. 4, issue – 6, 2015, pp. 34-45
[11] Hongwei Si, YoulinCai, Zhimei Cheng, “An Improved RSA Signature Algorithm Based on Complex Numeric Operation Function", Challenges in Environmental Science and Computer Engineering (CESCE), 2016, pp.397–400.
[12] Wenxue Tan,Wang Xiping, Jinju Xi, Meisen Pan, “A mechanism of quantitating the security strength of RSA key”, Electronic Commerce and Security (ISECS), 2015, pp. 357 – 361.
[13] Dhakar, R.S. Gupta, A.K. Sharma, P., “Modified RSA Encryption Algorithm (MREA)”, Advanced Computing & Communication Technologies (ACCT), 2015, pp. 426–429.
[14] Abdel-Karim Al Tamimi, "Performance Analysis of Data Encryption Algorithms", International Conference on Information and Communication Technologies, 2015, pp. 219-232.
[15] Li Dongjiang,Wang Yandan, Chen Hong, “The research on key generation in RSA public- key cryptosystem”, 2016, pp. 578–580.