A Comparison of Different Cryptography Algorithms in regards of Data Security

Research Topics
FAQ
Publication Ethics
Copyright Infragmentation
[featured_image]
Download
Download is available until [expire_date]
  • Version
  • Download 49
  • File Size 560.95 KB
  • File Count 1
  • Create Date 07/06/2023
  • Last Updated 07/06/2023

A Comparison of Different Cryptography Algorithms in regards of Data Security

A Comparison of Different Cryptography Algorithms in regards of Data Security

Aviral Jain, Simardeep Singh, Rajdeep Deb, Shery Manchanda, Dr. Vasudha Vashisht

Amity School of Engineering & Technology

AMITY UNIVERSITY, UP

Noida, India

 

ABSTRACT–Organizations all over the world generate a tremendous amount of data on a daily basis since the birth of the World Wide Web and the emergence of ecommerce applications and social networks. The most fundamental difficulty in ensuring secure data transfer over the internet is information security. Network security challenges are also growing more significant as society transitions to the digital information era. It is necessary to safeguard computer and network security, which are crucial challenges. In this paper, we draw a comparison between encryption methods and present an overview of data security and numerous strategies for improving network security, such as cryptography. The rapid advancement of this technology will be critical in the future years. Individuals' data in the cloud is confidential, and it can be hacked by attackers while being shared with the intended receiver. The desire for honesty, privacy, fortification, isolation, and handling processes is increasing. This paper briefly discussed Asymmetric and Symmetric algorithms, their shortcomings andexperimented on how fast and secured both the algorithms are. Future scope of this experimentation is immense, more research can be done in developing new algorithms, which provides best of both worlds or research can also be done on perfecting the previous algorithms more and more.

 

Keywords: Security, Threats, Cryptography, Encryption, Decryption, Cryptography, Symmetric key , 2’s Complement encryption, Data Security, Encryption, Decryption