It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

Comparative Analysis of Various Cryptographic Algorithms | Kumar | INTERNATIONAL JOURNAL OF COMPUTERS & DISTRIBUTED SYSTEMS

Comparative Analysis of Various Cryptographic Algorithms

Satish Kumar

Abstract


Does increased security provide comfort to fearful people? Or does security provide some very basic protections that we are inexperienced to believe that we don't need? During this time when the Internet provides essential communication between millions of people and is being increasingly used as a tool for commerce, trading, research & banking, security becomes a tremendously important issue to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. This paper has two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and second is to offer a way to compare the myriad cryptographic algorithms in use today.


Keywords


Cryptography; Encryption; Decryption; Key- Setup; Throughput; Cores.

Full Text:

PDF

References


http://www.garykessler.net/library/crypto.html.

“Cryptographic Approach to Privacy-Friendly Tags”, Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, NTT Laboratories Nippon Telegraph and Telephone Corporation, Japan.

“The MARS Encryption Algorithm”, Carolynn Burwick, Don Coppersmith, Edward D’Avignon, Rosario Gennaro, Charanjit Jutla, Mohammad Peyravia, David Safford, Nevenko Zunic.

http://www.cree.com/~/media/Files/Cree/Lighting /Options/RC6.pdf

“The Security of RC6 block cipher”, Scott Contini, Ronald L. Rivest, M.J.B Robshaw.

“FPGA-based Cryptography for Internet Security”, Viktor K. Prasanna and Andreas Dandalis, Department of EE-Systems University of Southern California.

“A compact FPGA-based architecture for elliptic curve cryptography over prime fields” , Jo Vliegen_y, Nele Mentens_y, Jan Genoey, An Braekenz, Serge Kuberaz, Abdellah Touhafizx and Ingrid Verbauwhede.


Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

@ 2010 onward COUNCIL FOR INNOVATIVE RESEARCH

All rights reserved with Journal Manager CIR.

To make sure that you can receive messages from us, please add our domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.

For any Technical Support editor@cirworld.com, editorcir@gmail.com