Open Access   Article Go Back

A Study of Cryptographic Algorithms and its analysis on Data Security during Transmission

Sachin Pandey1 , Rajendra Gupta2 , Pratima Gautam3

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 976-980, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.976980

Online published on Mar 31, 2019

Copyright © Sachin Pandey, Rajendra Gupta, Pratima Gautam . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sachin Pandey, Rajendra Gupta, Pratima Gautam, “A Study of Cryptographic Algorithms and its analysis on Data Security during Transmission,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.976-980, 2019.

MLA Style Citation: Sachin Pandey, Rajendra Gupta, Pratima Gautam "A Study of Cryptographic Algorithms and its analysis on Data Security during Transmission." International Journal of Computer Sciences and Engineering 7.3 (2019): 976-980.

APA Style Citation: Sachin Pandey, Rajendra Gupta, Pratima Gautam, (2019). A Study of Cryptographic Algorithms and its analysis on Data Security during Transmission. International Journal of Computer Sciences and Engineering, 7(3), 976-980.

BibTex Style Citation:
@article{Pandey_2019,
author = {Sachin Pandey, Rajendra Gupta, Pratima Gautam},
title = {A Study of Cryptographic Algorithms and its analysis on Data Security during Transmission},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {976-980},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3950},
doi = {https://doi.org/10.26438/ijcse/v7i3.976980}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.976980}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3950
TI - A Study of Cryptographic Algorithms and its analysis on Data Security during Transmission
T2 - International Journal of Computer Sciences and Engineering
AU - Sachin Pandey, Rajendra Gupta, Pratima Gautam
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 976-980
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
392 379 downloads 152 downloads
  
  
           

Abstract

The cryptographic cipher is the terminology used for securing the web user data over the network. It is closely related to the discipline of cryptology and cryptanalysis. Using mathematical equations, the cryptography make sure the data when transferred over network is not altered. The important things for the study of mathematical equations on data security, it is almost not possible to break the encryption algorithm without knowing the correct key value. This paper focuses on the study of cryptographic algorithms and its functioning over the data transmission. The throughput is calculated for encryption algorithms during encrypting of text data in different time period and it is found that the Diffie-Hellman Key Exchange Algorithm shows better performance as compared to other studied algorithms.

Key-Words / Index Term

Cryptographic algorithm, Cipher, Diffie-Hellman Key Exchange Algorithm

References

[1] Chia Long Wu, Chen HaoHu,“Computational Complexity Theoretical Analyses on Cryptographic Algorithms for Computer Security Application”, Innovations in Bio-Inspired computing and Applications(IBICA), 2018, pp. 307 – 311.
[2] Qing Liu, Yunfei Li, Lin Hao, “On the Design and Implementation of an Efficient RSA Variant”, Advanced Computer Theory and Engineering (ICACTE), 2017, pp.533-536.
[3] Mandal, B.K., Bhattacharyya, Bandyopadhyay S.K., “Designing and Performance Analysis of a Proposed Symmetric Cryptography Algorithm”, Communication Systems and Network Technologies (CSNT), 2017, pp. 453 – 461.
[4] Wang, Suli, Liu, Ganlai, “File encryption and decryption system based on RSA algorithm”, Computational and Information Sciences (ICCIS), 2016, pp. 797 – 800.
[5] Da Silva, J.C.L, "Factoring Semi primes and Possible Implications for RSA”, Electrical and Electronics Engineers in Israel (IEEEI), 2016, pp.182–183.
[6] Geethavani, B., Prasad, E.V. Roopa, R. “A new approach for secure data transfer in audio signals using DWT”, Sept 2016, pp. 1-6.
[7] Nagar, S.A., Alshamma, S., “High speed implementation of RSA algorithm with modified keys exchange", Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 639 – 642, 2016.
[8] Chong Fu, Zhi-liang Zhu, “An Efficient Implementation of RSA Digital Signature", Wireless Communications, Networking and Mobile Computing, Oct. 2016, pp.1-4.
[9] DiaaSalama, HatemAbdual Kader, MohiyHadhoud “Studying the Effects of Most Common Encryption Algorithms, International Arab Journal of e-Technology”, Vol. 2, No. 1, January 2017
[10] Turki Al-Somani,Khalid Al-Zamil, “Performance Evaluation of Three Encryption/Decryption Algorithms on the SunOS and Linux Operating Systems”, vol. 4, issue – 6, 2015, pp. 34-45
[11] Hongwei Si, YoulinCai, Zhimei Cheng, “An Improved RSA Signature Algorithm Based on Complex Numeric Operation Function", Challenges in Environmental Science and Computer Engineering (CESCE), 2016, pp.397–400.
[12] Wenxue Tan,Wang Xiping, Jinju Xi, Meisen Pan, “A mechanism of quantitating the security strength of RSA key”, Electronic Commerce and Security (ISECS), 2015, pp. 357 – 361.
[13] Dhakar, R.S. Gupta, A.K. Sharma, P., “Modified RSA Encryption Algorithm (MREA)”, Advanced Computing & Communication Technologies (ACCT), 2015, pp. 426–429.
[14] Abdel-Karim Al Tamimi, "Performance Analysis of Data Encryption Algorithms", International Conference on Information and Communication Technologies, 2015, pp. 219-232.
[15] Li Dongjiang,Wang Yandan, Chen Hong, “The research on key generation in RSA public- key cryptosystem”, 2016, pp. 578–580.