Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Evolution of Cryptographic Algorithms and Performance Parameters

View through CrossRef
Internet and networks applications are growing very fast. Most of confidential data is circulated through networks as electronic data for achieving faster communication. In data communication Information Security became a major problem. The information is sensitive part of the organization. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays an inevitable role in information security systems. Cryptographic ciphers have an important role for providing security to these confidential data against unauthorized attacks. Though security is an important factor, there are various factors that can affect the performance and selection of cryptographic algorithms during the practical implementation of these cryptographic ciphers for various applications. This paper discuss about the data and procedures for selecting cryptographic algorithms with respect to performance.
Title: Evolution of Cryptographic Algorithms and Performance Parameters
Description:
Internet and networks applications are growing very fast.
Most of confidential data is circulated through networks as electronic data for achieving faster communication.
In data communication Information Security became a major problem.
The information is sensitive part of the organization.
Any loss or threat to information can prove to be great loss to the organization.
Encryption technique plays an inevitable role in information security systems.
Cryptographic ciphers have an important role for providing security to these confidential data against unauthorized attacks.
Though security is an important factor, there are various factors that can affect the performance and selection of cryptographic algorithms during the practical implementation of these cryptographic ciphers for various applications.
This paper discuss about the data and procedures for selecting cryptographic algorithms with respect to performance.

Related Results

A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...
A NEW PROPOSED LIGHTWEIGHT CIPHER
A NEW PROPOSED LIGHTWEIGHT CIPHER
Modern cryptography algorithm development has favored hardware optimization in computer systems. This is especially important for fitting cryptographic protocols onto devices with ...
Factorial number system for nonlinear substitutions generation
Factorial number system for nonlinear substitutions generation
Modern cryptographic applications use cryptographic algorithms with a symmetric key. They provide high conversion rates and resistance to crypto-graphic attacks. To complicate the ...
On the practical usage of genetic algorithms in ecology and evolution
On the practical usage of genetic algorithms in ecology and evolution
Summary Genetic algorithms are a heuristic global optimisation technique mimicking the action of natural selection to solve hard optimisation problems, which has enjoyed growing u...
Next-generation cryptographic techniques for robust network security
Next-generation cryptographic techniques for robust network security
Cryptography is a key enabling tool in digital security that is needed to protect information, secure communication, and ensure the integrity between connected networks. As cyberse...
Potential Vulnerabilities of Cryptographic Primitives in Modern Blockchain Platforms
Potential Vulnerabilities of Cryptographic Primitives in Modern Blockchain Platforms
Today, blockchain technologies are a separate, rapidly developing area. With rapid development, they open up a number of scientific problems. One of these problems is the problem o...

Back to Top