Download PDFOpen PDF in browser

Comparative Analysis of Cryptographic Algorithms in Computer Network

EasyChair Preprint no. 10218

6 pagesDate: May 21, 2023

Abstract

One technique to ensure the security and privacy of the user's data as well as the secrecy, authentication, integrity, availability, and identification of the data user is through the use of cryptography. The most valuable term in the realm of communication systems nowadays is security. One of the most secure technologies for delivering data to a valid user is cryptography, which transforms regular plain text into cipher text. Security come with a variety of technologies and approaches. Regarding different parameters, we give performance and comparison. It is possible to express the encryption ratio as a minimal, moderate, or maximal value.  The Visual Studio. All the results of the experiment are implemented using net packages. Based on the quantity of keys, cryptography techniques can be classified as either symmetric or asymmetric. While asymmetric algorithms employ different keys for encryption and decryption, symmetric algorithms use the same key for both operations. The most popular symmetric algorithms are Blowfish, Data Encryption Standard (DES), and Advanced Encryption Standard (AES). Elliptic Curve Cryptography, Diffie-Hellman, and RSA are examples of asymmetric algorithms (ECC). A cryptographic algorithm's key size, complexity, and attack resistance all affect how effective it is. In computer networks, cryptographic techniques are frequently used to protect data while it is in motion and at rest, such as during online transactions, mail delivery, and file storage.

Keyphrases: 1.Symmetric Key Encryption, 2.Asymmetric Key Encryption, 3.Cryptanalysis

BibTeX entry
BibTeX does not have the right entry for preprints. This is a hack for producing the correct reference:
@Booklet{EasyChair:10218,
  author = {Ankit Kumar Soni and Gautam Kumar and Priya Kumari and Arpita Nayak and Arpita Arpita},
  title = {Comparative Analysis of Cryptographic Algorithms in Computer Network},
  howpublished = {EasyChair Preprint no. 10218},

  year = {EasyChair, 2023}}
Download PDFOpen PDF in browser