earticle

논문검색

Analysis of Various Cryptography Techniques : A Survey

초록

영어

Maintaining the confidentiality of data during communication has always been a prime concern of many researchers. Several encryption mechanisms have been developed in order to protect the secret data from the access of unauthorized users. Encryption can be thought of as a set of instruction used for conversion of data from a readable state to nonsense form. An encryption scheme is said to be effective if it provides high security, low computational time and high brute force search time for hackers. This paper is an effort to compare all the text based encryption schemes mentioned in literature. These schemes are implemented in MATLAB-2010 and their efficacy is compared based on various performance metrics such as time complexity, Correlation, Key sensitivity analysis, Differential attack analysis and Entropy. These results can be fruitful for researchers working in this direction.

목차

Abstract
 1. Introduction
 2. Techniques Used
  2.1. Visual Cryptography
  2.2. Hierarchical Cryptography
  2.3. RC4
  2.4. Elliptic Curve Cryptography (ECC)
  2.5. Vignere Table
  2.6. Diffie Hellman
  2.7. RSA
  2.8. DES
  2.9. IDEA
  2.10. AES
 3. Experiments and Security Analysis
  3.1. Experimental Setup
  3.2. Performance Analysis Tests and Parameters
 4. Results
  4.1. Visual Assessment
  4.2. Key-space Analysis
  4.3. Correlation Analysis
  4.4. Key Sensitivity Analysis
  4.5. Information Entropy Analysis
  4.6. Computational Speed Analysis
 5. Conclusion
 References

저자정보

  • Neha Tayal YMCA University of Science and Technology, Faridabad
  • Ritesh Bansal YMCA University of Science and Technology, Faridabad
  • Shailender Gupta YMCA University of Science and Technology, Faridabad
  • Sangeeta Dhall YMCA University of Science and Technology, Faridabad

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.