Abstract | ||
---|---|---|
Information Security has become an important issue in modern world as the popularity and infiltration of internet commerce and communication technologies has emerged, making them a prospective medium to the security threats. To surmount these security threats modern data communications uses cryptography an effective, efficient and essential component for secure transmission of information by implementing security parameter counting Confidentiality, Authentication, accountability, and accuracy. To achieve data security different cryptographic algorithms (Symmetric & Asymmetric) are used that jumbles data in to scribbled format that can only be reversed by the user that have to desire key. This paper presents a comprehensive comparative analysis of different existing cryptographic algorithms (symmetric) based on their Architecture, Scalability, Flexibility, Reliability, Security and Limitation that are essential for secure communication (Wired or Wireless). |
Year | Venue | Field |
---|---|---|
2014 | International Journal of Computer Applications | Security convergence,Security through obscurity,Computer science,Computer security,Information security,Computer network,Security service,Security association,Cloud computing security,Security information and event management,Computer security model |
DocType | Volume | Issue |
Journal | abs/1405.0398 | 20 |
ISSN | Citations | PageRank |
International Journal of Computer Applications 61.20 (2013) | 7 | 0.75 |
References | Authors | |
8 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mansoor Ebrahim | 1 | 22 | 5.25 |
Shujaat Khan | 2 | 38 | 9.56 |
Umer Bin Khalid | 3 | 9 | 1.16 |